tag:blogger.com,1999:blog-12471261068931100672024-03-13T14:47:18.052-07:00CYBER CRIME AGAINST WOMEN IN INDIA AND THE LAWSBEING A VICTIM OF CYBER CRIME COULD BE MOST TRAUMATIC EXPERIENCE FOR A WOMAN.WHY DOES IT HAPPEN?HOW DOES IT HAPPEN? WHO DOES IT? WHAT ARE THE PENAL LAWS? HOW TO MAKE USE OF THESE LAWS? THIS BLOG WILL SERVE THE PURPOSE TO SPREAD AWARENESS REGARDING THE ISSUE.PLEASE NOTE THAT EVERY ARTICLE OR COMMENT MADE HEREIN IS COPYRIGHTED AND THEREFORE, REMAINS THE PROPERTY OF ADVOCATE DEBARATI HALDER.advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.comBlogger111125tag:blogger.com,1999:blog-1247126106893110067.post-52793635012413905442021-10-13T03:47:00.016-07:002021-10-13T03:51:37.044-07:00Data theft during festivals post pandemic: why we need to be aware by Dr.Debarati HalderCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<div><br /><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-C4cHfr3fP3A/YWa4WGpxrdI/AAAAAAAABJU/HvpOCLEwgh8XJZfZsFQy3VHuorxuFxqogCLcBGAsYHQ/s1200/Durga-Puja.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="800" data-original-width="1200" height="181" src="https://1.bp.blogspot.com/-C4cHfr3fP3A/YWa4WGpxrdI/AAAAAAAABJU/HvpOCLEwgh8XJZfZsFQy3VHuorxuFxqogCLcBGAsYHQ/w320-h181/Durga-Puja.jpg" width="320" /></a></div><br /><div style="text-align: center;">Image courtesy : Internet </div></div><div style="text-align: center;"><br /></div><div style="text-align: left;"><p class="MsoNormal" style="text-align: justify;"></p><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">2021 October promises to be different than October 2020.
The difference is being felt already and it is not because of the increase in
the number of vaccinated people who may win over pandemic, but because of the
ever growing percentage of cyber-crimes, especially cyber monetary crimes.
Several researches have shown that pandemic related lockdown has pushed people
to go on a buying spree. Given the situation, people have invested more on
online shopping. The festival periods are the chosen periods for pumping up
sale. In 2020, people could not invest more in the festival related shopping
which includes paying for vacations, apparels and accessories.<span style="mso-spacerun: yes;"> </span>2021 sees the graph slowly rising.
Governments have eased restrictions and this has further encouraged people to
venture out from their homes, visit more shops physically as well as virtually.
But people have understood the value of plastic money better than before.<span style="mso-spacerun: yes;"> </span>Ecommerce platforms are booming with offers
and consumers are buying heartfull. Most of the ecommerce platforms have
offered their own applications to be downloaded in Android phones so that the
consumers do not venture out to other links. There is unique blending of
application of social engineering, artificial intelligence, business analytical
skills and most importantly data polling which makes the e commerce platforms
unique in their own spheres. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">The e-commerce platforms are the chosen platforms for
consumer data theft.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Why do our phones showcase us our secret plans? <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Many have asked me why and how their devices “secretly
spy” on their buying plans and how the social media platforms, popup ads show
exactly the staff that these consumers/customers are looking for. The answer
is: NO! The devices are inanimate objects and they cannot spy on our plans
unless there is a human made mechanism to share our plans. Here we need to look
into the consumer behavior on the cyber space: time and again the internet
companies have tried to shred off liability of breaching the privacy of their
subscribers/customers. If we look into the consumer behavior on the cyber
space, we may be able to understand that the internet companies are not
completely wrong. One cannot have the search engines activated unless the said
person is using some personally identifiable unique identification data which
may include the phone number or the email id. Most of us do not log out of our
email ids after we have finished our “search”. <span style="mso-spacerun: yes;"> </span>We neither log off from our social media
accounts when we are doing a virtual window shopping. Not to forget that social
media companies are deeply connected with the e-commerce platforms: they are
even more deeply connected with the search engines as well. This makes the
entire search- history of the respective consumers reflect on the digital
platforms that are being used by the said consumers. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">The banking data leak?<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Quite in the same way consumers/customers leave their
banking digital footprints on the e-commerce platforms. When we use any online
payment modes, the e-commerce platforms record the said mode for future
commercial transaction purposes. The card/payment app etc., that may have been
used by the consumers/customers may also be recorded by the e commerce
platforms. But if seen minutely, the customers are ‘asked’ to consent for
‘remembering’ the payment systems. Such payments through cards or net-banking
or through any other digital payment mode further goes through other payment
gateways which will also remember the amount paid, the unique customer id that
the banking card displays and other related sensitive personal financial data
of the customer/consumers. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Several researches and
cyber-crime analysis have shown that the festival times may be considered as
the peak times for<span style="mso-spacerun: yes;"> </span>monetary crimes on
the cyber space because<span style="mso-spacerun: yes;"> </span>there may be
heavy flow of commercial transactions on e-commerce platforms and there may be
almost nil ‘monitoring’ in this regard. Added with this, it has also been
noticed by some that personal details of women customers may become the highest
‘valued’ data in this regard. The profile of the female customer along with the
banking details and the stuff that she chooses to purchase may all be linked
for an entirely different and unethical business that would add profit for some
in the deep dark net world.<span style="mso-spacerun: yes;">
</span>Unfortunately it may become a herculean task to detect the mastermind of
the entire data theft as the crime detection agency may need to investigate
through multiple layers of virtual platforms, majority of which may deny their
liability siting the negligence of the customer. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">The legal recourse? <span style="mso-spacerun: yes;"> </span><o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">We need to look into EU General Data Protection Regulation
(EU GDPR) for understanding the universal rules in this regard. Chapter 3 of
the EU GDPR discusses in detail about the rights of the data subjects and clearly
mentions that there should be restrictions in sharing personal data of the data
owner with multiple stakeholders when the data owner has not given any explicit
permission for the same. Interpreting this, it may be understood that social
engineering is never permitted under the EU GDPR even if the consumer/customer
has ‘voluntarily’ consented for recording of his/her online payment mode by the
e-commerce platforms. India still does not have any dedicated data privacy
protection laws. Resultant, we need to look at scattered laws and rules
mentioned in different statutes and legal provisions. The Consumer Protection
Act, 2019 does not specifically protect consumer’s rights against such kinds of
data privacy infringements. Information Technology Act, 2000(amended in 2008)
very loosely touches upon the issue of consumer data privacy under S.72A which
states as follows:<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Save
as otherwise provided in this Act or any other law for the time being in force,
any person including an intermediary who, while providing services under the
terms of lawful contract, has secured access to any material containing
personal information about another person, with the intent to cause or knowing
that he is likely to cause wrongful loss or wrongful gain discloses, without
the consent of the person concerned, or in breach of a lawful contract, such
material to any other person, shall be punished with imprisonment for a term
which may extend to three years, or with fine which may extend to five lakh
rupees, or with both.</span></i><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">But again, we must understand that the scope of this
provision to prevent sharing of the banking/financial and sensitive personal
data by the internet companies becomes extremely limited especially when they
come up with strong plea of no liability towards willful causing of loss and
ignorance of the behavior of the consumers in spite of giving the later opportunities
to protect their data and profiles through different privacy control mechanisms.
However, this doesn’t mean that the victim does not have legal recourse. The internet
companies may need to clearly establish that they were absolutely ignorant of
the probable loss that may be caused to the victim due to recording the banking
details, consumer habits of the later. They must also establish that their data
processing and recording mechanisms are secured and cannot be infringed by
perpetrators. This claim of the internet companies must also be adhering to the
principles set in S.43A of the Information Technology Act, 2000(amended in
2008) which speaks about the responsibilities of the body corporates. <span style="mso-spacerun: yes;"> </span>Otherwise, they may need to undergo the legal
recourses that the present Indian legal system offers for penalizing the
internet companies.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">It is hoped that India enacts a full-fledged data
privacy law which will protect the rights of the general individuals including
the consumers. But till then, we the general users of the information and digital
communication technology need to be aware of the risks and rights available to
us.<o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;"> Please note:
Please do not violate the copyright of
this writeup. Please site it as Halder Debarati ( October, 2021) "Data theft
during festivals post pandemic: why we need to be aware." Available @https://debaraticyberspace.blogspot.com/2021/10/data-theft-during-festivals-post.html <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p><br /><p></p></div><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-84811064127926253622021-09-07T23:17:00.002-07:002021-09-07T23:18:37.457-07:00Hurray … I am vaccinated: know the risks for updating vaccine-posts CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<div><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-ZeuWFKo5PNg/YThUiUIOZhI/AAAAAAAABHo/3GtDNcIF2EgJD0c38d_fCEZzcoTGYEOhwCLcBGAsYHQ/s976/_114241106_vaccineillus976_rtrs.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="549" data-original-width="976" height="180" src="https://1.bp.blogspot.com/-ZeuWFKo5PNg/YThUiUIOZhI/AAAAAAAABHo/3GtDNcIF2EgJD0c38d_fCEZzcoTGYEOhwCLcBGAsYHQ/s320/_114241106_vaccineillus976_rtrs.jpg" width="320" /></a></div><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> </span><span> Image courtesy : Internet </span><br /><div><br /><div><br /></div><div><br /></div><div><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">As on first week of September, 2021, India has
reportedly vaccinated more than 67, 09, 59,968 people and several of them have
also got fully vaccinated. Noticeably Covid vaccination drive is being conducted
by the government and it necessarily includes sharing of certain sensitive
personal data that have been included in the Aadhar data of every individual.
Expectantly vaccination data is connected with the personal information
including health information of the beneficiary as well. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Let me now explain how we the beneficiaries of Covid
vaccination drive have knowingly shared our personal data and have invited
risks of privacy infringement.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">In 2020 when I was affected by Covid and wanted to be
reassured that I am carrying the virus, I had sought for Covid testing like
millions of us who have survived Covid. The government testing agencies were
over flowing and this had happened in all cities across India. Medical shops
got many of us connected with private labs who would be testing us ‘at the
earliest’ to help us recover faster. Several people reported that even though
they did not have symptoms, they were tested positive. Everyone suspected foul
play, but we had to accept that the pandemic has touched all of us very dearly.
Whether it was government labs or private labs, the individuals who would be
taking the swab test were directed to mandatorily collect Aadhar data of the
persons who were taking the tests. There were series of data sharing from private
agencies to government agencies and in majority of the cases the data owners
were never asked for their explicit permission for sharing their data. Added
with this, we the general users of social media companies have shared about our
levels of infections and recovery on social media platforms without giving it a
thought that we are generating data that have potential to put us on risk for
numerous kinds of cybercrimes including ransom attacks, bullying, stalking and
doxing to name a few. During the very first phase of Covid-19 we have seen
social exclusion with the Covid 19 victims and their families. There had been
several cases of shaming on the social media for victims of Covid-19. Somehow
such ‘harassments’ of victims of Covid and their families may be attributed to
the data generated by people who had been infected and survived Covid. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Most of us would never understand how such data
sharing would have affected us. Resultant, most people have shared about their
vaccination details, which should have been considered as part of sensitive
personal health data. Let me explain how we have unknowingly shared such data
and have invited risks: <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Many people who had vaccine may have taken selfies or
may have allowed their family members to take photographs of being vaccinated.
These images may have been immediately shared on social media profiles with
date of vaccination and the name of the vaccine. Further, several vaccination
centers had also offered galleries for taking photographs. Some may argue that
vaccine beneficiaries may not have shared the personal data including secret
numbers or registration details that may be availed from the government
platforms. But not to forget, this is an age of social engineering.<span style="mso-spacerun: yes;"> </span>Hackers and ransom attackers are smart to
connect facial images, geo-locations, Aadhar details with date and time stamp
to access sensitive personal data stored on platforms which may not provide
much security to the privacy of the data owners. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Such apprehensions are not
baseless. In December, 2020, <span style="mso-spacerun: yes;"> </span>Pfitzer had
reportedly shared the bad news of being targeted by cyber criminals.<a href="file:///D:/ccvcmag/ccvcblog/vaccination%20data.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
Again, in June, 2021 news about possible hacking of CoWin platform made the
government to consider for investigation of the entire issue.<a href="file:///D:/ccvcmag/ccvcblog/vaccination%20data.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a> <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">Why we need to be considered
for this issue and what does the law say? The answer basically centers on the
liability of the websites/social media companies to protect our data. Two issues
must be understood here: the liability of the companies/body corporates (especially
the vaccine production companies and the vaccine administering stakeholders) in
whose data base our sensitive health data including the vaccine data is being
stored, and <span style="mso-spacerun: yes;"> </span>the liability of the social
media companies on whose platform we are sharing our own data in the form of
selfies, pictures etc. S.43A of the Information Technology Act, 2000(amended in
2008) makes the body corporates liable for protection of the data of the
clients/customers/beneficiaries. If the integrity and confidentiality of the
data is infringed, the body corporates need to compensate the damages. There may
be huge legal battles for this and body corporates may always prima facie deny
their negligence. Not to forget, they may outsource the entire work of data
generation, data storing and maintaining the confidentiality of the data to the
third parties and resultant, they may need to face layers of liability charges.
This does not happen in case of social media companies. The later have explicit
policies and agreement clauses that majority of the users of the platforms
ignore. These clauses and policies clearly demonstrate the company’s due
diligence clauses. In other words, the companies very clearly state that they
will remove some posts if the same are offensive and fall within their own
category of offensive posts. They would also bear the liability of securing confidentiality
of <span style="mso-spacerun: yes;"> </span>the profiles. But they would not take
any liability if the users themselves “knowingly” post something which is self-damaging.
For understanding this, we have take close look on S.79 of the Information
Technology Act, 2000(amended in 2008) which elaborates website liabilities and
immunity clauses for the websites from third party liabilities. In short,
websites will not be liable for any ransom attack, hacking or any other forms
of online harassment if the users “knowingly” upload some contents which may
attract perpetrators. “Knowingly” here corresponds with the meaning of “awareness”.
The websites expect their users to be aware of the risks of posting certain
contents which would be self-damaging. <span style="mso-spacerun: yes;"> </span><o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;">We should rejoice the winning
over the pandemic but not at the cost of our privacy and security. Be aware,
stay safe and spread positive awareness.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: normal; margin-bottom: 0cm;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 12pt; mso-ansi-language: EN-US;">Please note: Please note: Please<span style="mso-spacerun: yes;"> </span>do not violate the copyright of this writeup.
Please site it as Halder Debarati (2021)</span><span lang="EN-US" style="font-size: 12pt;"> </span><b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 12pt; mso-ansi-language: EN-US;">Hurray … I am
vaccinated: know the risks for updating vaccine-posts</span></i></b><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 12pt; mso-ansi-language: EN-US;"> @https://debaraticyberspace.blogspot.com/2021/09/hurray-i-am-vaccinated-know-risks-for.html <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<div style="mso-element: footnote-list;"><!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/ccvcmag/ccvcblog/vaccination%20data.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="font-family: "Times New Roman",serif;"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Times New Roman",serif; font-size: 10pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></span></a><span style="font-family: "Times New Roman",serif;"> </span><span lang="EN-US" style="font-family: "Times New Roman",serif; mso-ansi-language: EN-US;">See in
Stubbs.J(2021) Hackers steal Pfizer/BioNTech COVID-19 vaccine data in Europe,
companies say . published in <span class="MsoHyperlink"><a href="https://www.reuters.com/article/uk-ema-cyber/hackers-steal-pfizer-biontech-covid-19-vaccine-data-in-europe-companies-say-idUKKBN28J1VF%20on%20December%2010,2020">https://www.reuters.com/article/uk-ema-cyber/hackers-steal-pfizer-biontech-covid-19-vaccine-data-in-europe-companies-say-idUKKBN28J1VF
on December 10,2020</a></span>. <o:p></o:p></span></p>
</div>
<div id="ftn2" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/ccvcmag/ccvcblog/vaccination%20data.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="font-family: "Times New Roman",serif;"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Times New Roman",serif; font-size: 10pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></span></a><span style="font-family: "Times New Roman",serif;"> </span><span lang="EN-US" style="font-family: "Times New Roman",serif; mso-ansi-language: EN-US;">See for
more in Jaswal M(June 2021) Claims of Cowin system, hacking, data breach
baseless: Health ministry . Available @ <a href="https://www.livemint.com/news/india/claims-of-cowin-system-hacking-data-breach-baseless-health-ministry-11623489372000.html">https://www.livemint.com/news/india/claims-of-cowin-system-hacking-data-breach-baseless-health-ministry-11623489372000.html</a>
published on June 12,2021<o:p></o:p></span></p>
</div>
</div><br /></div></div><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-78417491846656995672021-04-22T00:58:00.000-07:002021-04-22T00:58:33.816-07:00Is using electronic payment mode mandatory? CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<div><br /></div><div><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">We are facing challenge of Covid-19 restrictions. A whole
generation is facing another unique challenge. Many senior citizens and people
from socio-backward classes and communities are unable to exercise their basic
right to life because they may be unable to use the electronic payment
mechanisms.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">By the end of 1990’s
electronic commerce started getting popularity and almost by the first half of
the millennium, banks of several countries had expanded their services for
electronic money transactions. Soon plastic money in the forms of ATM, credit,
debit cards etc., were introduced and the smart generation started relying more
on plastic money rather than carrying currency in their wallets. But this
proved dangerous for majority. There were physical theft of wallets and the
cards, misuse of the cards, hacking of e banking systems which directly
affected the card operating systems, ATM machines were unauthorizedly accessed,
spycams were installed in the machines to detect the banking information including
the passwords etc. Senior citizens were worst affected as most of them in
countries like India could not operate the e-banking system or the cards:
either they could not understand the operational mechanisms or they were not
physically able to conduct the entire transactions either through the ATMs, or
through their smart devices. This was due to generation gap. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">With the advancement of technology, e wallets were
introduced. Through online banking mechanisms, one can deposit a particular
amount of money in e—wallets. However, this would not be operating as a single
and independent device or mechanism. Users may connect their valid government
identity proofs with e-wallets. Such e-wallets may necessarily be used through computers,
smart phones etc.<a href="file:///D:/popular/cyber%20security%20presentations/cyber%20law%20blogs/digital%20transactions%20a%20must.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
Everything remains virtual except the device/s that will help a user to access
the online transaction mechanisms. It has been continuously stated that plastic
money, e-wallets and e-banking systems are safe and better than carrying the
currency.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">But do we really know who is safeguarding our money in
this system? A few provisions Chapter III of our very own Information
Technology Act, 2000(amended in 2008) would make this clear. Chapter III discusses
about electronic governance. S.6A of the Information Technology Act (IT Act),
2000, amended in 2008 is noteworthy here: it says as follows:<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span style="background: white; color: black; font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;">6A Delivery of services by service provider. -</span></i><i style="mso-bidi-font-style: normal;"><span style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><o:p></o:p></span></i></p>
<p class="MsoNormal" style="background: white; line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span style="color: black; font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><a href="https://indiankanoon.org/doc/120008673/"><span style="color: #1100cc;">(1)</span></a> The appropriate Government may, for
the purposes of this Chapter and for <b style="mso-bidi-font-weight: normal;">efficient
delivery of services to the public through electronic means</b> authorise, by
order, any service provider to set-up, maintain and upgrade the computerised
facilities and perform such other services as it may specify by notification in
the Official Gazette. Explanation. -For the purposes of this section, service
provider so authorised includes any individual, private agency, private
company, partnership firm, sole proprietor firm or any such other body or
agency which has been granted permission by the appropriate Government to offer
services through electronic means in accordance with the policy governing such
service sector.<o:p></o:p></span></i></p>
<p class="MsoNormal" style="background: white; line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span style="color: black; font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><a href="https://indiankanoon.org/doc/155743372/"><span style="color: #1100cc;">(2)</span></a> The appropriate Government may also authorise
any service provider authorised under sub-section (1) to collect, retain and
appropriate such service charges, as may be prescribed by the appropriate
Government for the purpose of providing such services, from the person availing
such service.<o:p></o:p></span></i></p>
<p class="MsoNormal" style="background: white; line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span style="color: black; font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><a href="https://indiankanoon.org/doc/16740139/"><span style="color: #1100cc;">(3)</span></a> Subject to the provisions of sub-section (2), the
appropriate Government may authorise the service providers to collect, retain
and appropriate service charges under this section notwithstanding the fact
that there is no express provision under the Act, rule, regulation or
notification under which the service is provided to collect, retain and
appropriate e-service charges by the service providers.<o:p></o:p></span></i></p>
<p class="MsoNormal" style="background: white; line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span style="color: black; font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN;"><a href="https://indiankanoon.org/doc/187576713/"><span style="color: #1100cc;">(4)</span></a> The appropriate Government shall, by
notification in the Official Gazette, specify the scale of service charges
which may be charged and collected by the service providers under this section:
Provided that the appropriate Government may specify different scale of service
charges for different types of services.<o:p></o:p></span></i></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Online transactions for e-commerce purposes are
directly connected with the concept of service delivery by service providers.
S.6A has got two main component parts: (i) authorization to the service
providers by the government to set up provisions for delivery of services in
the electronic mode; and (ii) collection of service charges by the service
charges. Whenever we get to see a smooth or a bumpy operation of services from
the banks or from any other government or corporate authorities, we must know
that there is a secret team behind that government department, bank or the
corporate authority. They may be independent agencies who are commissioned by
such government /bank/corporate authorities. These ‘secret teams’ perform all
the technical functions for economic transactions, maintenance of the records
for money transactions, maintenance of cyber security issues etc., <span style="mso-spacerun: yes;"> </span>and they are duty bound to not to violate the confidentiality
of the user-data. Intact there are layers of contracts between the actual user
and the bank/government/company, between such service provider and the actual
users and the government etc. We know only the first layer of contracts and agreements
between us, the actual users and the bank/government /company etc., who are
providing us certain services or even goods. But there are several examples of
violating the agreements and contracts. These ‘service providers’ know us more
than we know ourselves because they know our bank details, our spending habits
and even our location data too. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Considering the risk for breaching of confidentiality
in all such cases S.7A of the IT Act, 2000(amended in 2008) has prescribed for
auditing of documents etc., maintained in electronic forms. This Section says
as follows: <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">“7A
Audit of documents, etc., maintained in electronic form. -Where in any law for
the time being in force, there is a provision for audit of documents, records
or information, that provision shall also be applicable for audit of documents,
records or information processed and maintained in the electronic form.”<o:p></o:p></span></i></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">But this is hugely neglected by many stakeholders and
this loophole creates several data breaching related legal issues. The Indian
legislature has also brought in the Intermediary guidelines Rules, 2021 which
also shifts the liability for data protection for intermediaries in certain
cases. <o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">However, we must not forget that there is digital
divide in our societies. Adults including men, women and people belonging to
LGBTQ communities may not always access information and digital communication
systems and services. This is a universal problem. Women may not be empowered
to use electronic devices in socio-economically backward classes and
communities. Not to forget that even though Indian constitution mandates for
equal pay for all, women may not always get equal pay in unorganized sectors. Many
households in India as well as in many Asian countries do not allow women to
take any decision related to family-finances. <span style="mso-spacerun: yes;"> </span>But there are situations when people are
forced to use electronic payment/transaction systems. Covid-19 pandemic is one
such situation where the WHO advised to reduce usage of anything which may
transmit the viruses from people to people: reduction of usage of currency
notes were also suggested as it was understood that the materials in the
currency notes may get wet with sweat, saliva etc., and this may be extremely
dangerous since it might increase the risk of spreading of pandemic. But there
are new researches coming up every day which are suggesting how to take
precautions while dealing with papers (including materials which are used to
make currency notes) or clothes during pandemic times.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">In all such cases, aren’t our constitutional rights
get violated if the government or any other stakeholder insists on
e-transactions? It actually does.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Answer to this question may be found in S.9 of the IT
Act, 2000(amended in 2008). This says as follows:<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Sections
6, 7 and 8 not to confer right to insist document should be accepted in electronic
form.-Nothing contained in sections 6, 7 and 8 <b style="mso-bidi-font-weight: normal;">shall confer a right upon any person to insist </b>that any Ministry or
Department of the Central Government or the State Government or any authority
or body established by or under any law or controlled or funded by the Central
or State Government <b style="mso-bidi-font-weight: normal;">should accept,
issue, create, retain and preserve any document in the form of electronic
records or effect any monetary transaction in the electronic form</b></span></i><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">.<o:p></o:p></span></p>
<p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Nonetheless, the above mentioned provision empowers all
who may not be able to use or who may want to refuse the use of electronic
payment system. But this may not always be considered as the Rule: this is
rather <i style="mso-bidi-font-style: normal;">Exceptio probat regulam</i> (an
exception proves the rule) in the era of internet. Even though the government
and other corporate stakeholders may extend their services on humanitarian grounds
to help those who may not be able to use the digital payment systems or the
e-wallets etc., people’s trust may easily be broken by gross misuse of the
powers that such ‘helpers’ may have: ATM debit cards may be stolen, data may be
compromised, e-wallets may be illegally operated by such ‘volunteers’ who may want
to gain illegal and unethical profits at the cost of innocent people.</span></p>
<div style="mso-element: footnote-list;"><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">It will take longer time to make people from all
backgrounds aware about electronic payment modes. It will probably take even
longer to control cyber criminality targeting vulnerable people. One must not
violate the legal norms and constitutional principles to make the right to life
of others almost unachievable. Vulnerable groups including senior citizens,
disabled people, socio-economically backward communities, women and children
must be given enough protection to gain their trust so that all can survive and
win o</span><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">ver </span><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">adverse situations.</span><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"> <o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Please note: Please do not violate the copyright of this writeup. Please site it as Halder Debarati (2021) Is using electronic payment mode mandatory? Published @ </span><span style="background-color: white; color: rgba(0, 0, 0, 0.52); font-family: Roboto, RobotoDraft, Helvetica, Arial, sans-serif; font-size: 14px; text-align: left;">https://debaraticyberspace.blogspot.com/2021/04/is-using-electronic-payment-mode.html on 22-04-2021</span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;"><br /></span></p>
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/popular/cyber%20security%20presentations/cyber%20law%20blogs/digital%20transactions%20a%20must.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> https://economictimes.indiatimes.com/definition/e-wallets<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></p>
</div>
</div><br /></div><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-2095487596684803472020-11-08T08:00:00.021-08:002020-11-08T08:02:52.309-08:00Plight of "Punita" : A common tale of 'powerless' women victims of trolling CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/-vDmTvARnsdY/X6gWWfrjRcI/AAAAAAAAA2w/sGk8Q14gwy0KBQzl_bABWQiXpCom10qwgCLcBGAsYHQ/s1040/cyber_3228.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="487" data-original-width="1040" src="https://1.bp.blogspot.com/-vDmTvARnsdY/X6gWWfrjRcI/AAAAAAAAA2w/sGk8Q14gwy0KBQzl_bABWQiXpCom10qwgCLcBGAsYHQ/s320/cyber_3228.jpg" width="320" /></a></div><div style="text-align: center;">Image courtesy : Internet </div><div><br /><div><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">In 2012 “Nirbhaya” a young female paramedic was
brutally gang raped in a cold December night in Delhi, India. Within a few days
the police nabbed the offenders and arrested them. All 6 of them were from
northern parts of India who came down to Delhi for making their living. All of
them were working as transport workers including driver, conductor, cleaner
etc. Within a few days of their arrest, the victim died because of the impact
of the assault and internal injuries. The charges against the accused were
enhanced from rape to include murder under the Indian Penal Code. Among the 6 accused
persons, the prime accused committed suicide. Even though the case was taken
over by fast track trial court, it took around 10 months for the trial court to
convict the accused and award death penalty to the surviving 5 accused. The
death penalty was upheld by the Supreme Court of India in 2017. In between one
of the accused pleaded to be considered as minor and was declared as minor and
hence was dealt under the Juvenile justice administration system. However
neither the Supreme Court, nor the high court prevented the accused persons
from exercising their rights to appeal against the capital sentence. The
Supreme Court considered this case as rarest of rare cases. Except the minor,
other convicted accused did not however succeed in their respective pleas to
the Supreme Court to reverse the sentence to life imprisonment and the
President for mercy petition.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn1" name="_ftnref1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[1]</span></span><!--[endif]--></span></a> All four of the adult convicts were hanged in
the wee hours of 20<sup>th</sup> March, 2020. Immediately after this the Covid
19 lockdown was clamped strictly almost all over the world preventing several
litigants, victims to approach the courts as courts also suffered due to
pandemic. <o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">None of the convicted persons in
NIrbhaya case came from socio-economically forward class. Except one, others
did not complete their basic education as well.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn2" name="_ftnref2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[2]</span></span><!--[endif]--></span></a>
Some researches including the controversial India’s Daughter documentary<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn3" name="_ftnref3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[3]</span></span><!--[endif]--></span></a>
claimed that lack of education could have been the main reason to defy the laws
for violating women in this regard. While almost all such researches and
findings were concerned about the perpetrators, not many looked into the fate
of the wives of such sex offenders who may not have received primary education
and may not have been allowed to access justice for themselves because of being
women and living in patriarchal societies. Punita, wife of Akshay Thakur, who
was one of the convicts, tried her level best to convince the courts and the
society at large in her own way that if
her husband was hanged, she and her minor son would have to die. On the final
day of hearing she was seen shouting, crying, beating herself and fainting
before the Supreme Court building. Her actions attracted media and she was
probably encouraged to continue to do what she was doing because that would add
more TRP to the stories that were being made on Nirbhaya sentencing. Soon she
made headlines in almost all domestic and foreign news channels and she was
center of debates for and against death penalty. Simultaneously she was
targeted by internet trolls vigorously.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn4" name="_ftnref4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[4]</span></span><!--[endif]--></span></a>
<o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">In the recently held 9<sup>th</sup>
international victimology conference organized by Jindal institute of
Behavioral Sciences<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn5" name="_ftnref5" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[5]</span></span><!--[endif]--></span></a>
I had addressed the issue of cyber victimization of Punita through my paper
titled</span><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%;"> </span><span style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%;">“</span><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Critical
analysis of the case of wife of Nirbhaya rape convict: therapeutic
jurisprudence & cyber victimological perspectives”. While the media could successfully (and
probably rightly) generate public sympathy for the rape victim and her family,
they generated extreme hatred to Punita because she was apparently ‘supporting
her husband’. The internet platforms added fuel to the fire in this hate
campaign. If one sees the news reports on Punita Devi on the social media
handles of the news media channels, one would get to see that the comments
posted about her and opinion generated on her created extremely negative
profile of hers which would go a long way to prevent her from getting any job
in any private or public sector. It was a visual victimization of Punita on
cyber space which still exists on cyber space and will be existing forever. In
my earlier research on visual victimization of women on cyber space, I had
observed that the victims of such visual victimizations may now know about
their online victimization because they may never get access to the internet
and digital communication media as their urban counterparts may get, which may
eventually help the later to reach the criminal justice machinery to remove
these contents.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn6" name="_ftnref6" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[6]</span></span><!--[endif]--></span></a>
<o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"> Women such as Punita are often seen as
‘co-accused’ by the public at large. Coming from socio-economically backward
communities and being educationally challenged, most wives of sex offenders in
several Asian countries (where patriarchy rules), may not be allowed to access
justice for themselves. Apparently she approached the family court in her
native district for divorce because the Hindu Marriage Act under S.13B(2ii)
allows women to get ‘quick’ divorce under special grounds which includes
conviction of husband for rape, sodomy, bestiality etc.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn7" name="_ftnref7" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[7]</span></span><!--[endif]--></span></a>
But she was too late in approaching the court. She did not want to live as a
widow of a hanged rapist. She preferred to be a divorcee. Women in such
situations are blamed by the families and public at large for failing to
satisfy their husbands sexually and materialistically which may have encouraged
the later to go ahead for raping and sexually assaulting other women. These
women cannot go ahead for divorce while the trial is on because this would not
only attract social taboo, it will also push such women to extreme poverty:
they have to leave the matrimonial homes, they may not be accepted in their
parental homes and they may not get any financial support from anyone. <o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><b><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">How can
Therapeutic Jurisprudence help?</span></b><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"> Justice Krishna Iyer a legendary judge who introduced new paradigm
to reformative justice in India mentioned about applying Therapeutic
jurisprudence in the prisons for reforming the prisoners in 1970’s.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn8" name="_ftnref8" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[8]</span></span><!--[endif]--></span></a>
But after him we did not get to see the
use of the term by the judges while dealing with reformative criminal
jurisprudence in India. In numbers of my researches however I have shown that
the concept of Therapeutic Jurisprudence has submissively influenced the Indian
judges.<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn9" name="_ftnref9" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[9]</span></span><!--[endif]--></span></a>
The spirit of Therapeutic Jurisprudence may help wives of sex offenders
especially in countries like India. In my earlier research titled “Free Legal Aid for women and
Therapeutic Jurisprudence: A critical examination of the Indian model”,<a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftn10" name="_ftnref10" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 107%;">[10]</span></span><!--[endif]--></span></a>
which was published In the edited book
volume titled Methodology And Practice Of Therapeutic Jurisprudence Research edited
by Stobbs Nigel, Bartel Lorana & Vols.M , I had observed that women
especially from socioeconomically backward communities may not be permitted to
access justice even if the legal counseling
is freely available through free legal aid clinics. This situation may
be improved by vigorous campaigning by legal aid volunteers and law students.
The law students, practitioners and judges must be sensitized about Therapeutic
jurisprudence and law’s therapeutic effects which may bring tremendous change
in women empowerment. Wives of sex offenders go through tremendous
traumatization primarily because they feel cheated in their marriages and then
feel threatened when it comes to social security for them. As such, mental
wellbeing of these women are least taken care of when the court decides to charge
the husbands, i.e. the accused in sex offences. In my presentation in the
international victimology conference mentioned above, I have proposed that
courts must consider to parallelly counsel such wives through free legal aid
cells so that they may be made aware about their rights for divorce,
matrimonial alimony, child custody and maintenance for child. <o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Further, I have also proposed that
courts must suomotu consider to pass restraining order for the media houses
regarding airing the images of grieving wives, who may or may not be
accompanied by their children. These women do not make any ‘drama’ to stall the
execution of sentences for supporting their husbands. They express their anger,
frustration and fear for their own future which is dependent on the longevity
of their husbands. Unfortunately their expression of fear, frustration etc are
hugely consumed sadistically by the society at large and due to the non-ending
presence of the clippings on the internet, such women may be profiled in a
negative way. I have proposed that the scope of Right to be forgotten must be
expanded in such cases which the courts must take up extending the power of
judicial intervention for ensuring the privacy rights of women. Interestingly
many courts across the globe are shifting burden to the website companies for
not removing objectionable contents especially when it comes privacy of women
and children. India has laws for website liabilities in this regard under S.79
of the Information Technology Act, 2000(amended in 2008). This provision read
with Information Technology (reasonable security practices and procedures and
sensitive personal data or information ) Rules 2011 mandates that web companies
shall be held liable if they do not take down objectionable contents within due
time. This brings two major points to be considered: who reports it? Whether
this can be considered as ‘protected speech and expression’. Indian judicial
understanding regarding freedom of speech on internet is expanding and courts
have started using judicial discretion to not to consider each and every speech
as speech falling outside the purview of Article 19(1)(A) of the Indian
constitution which guarantees freedom of speech and expression as a fundamental
right. It is obvious that women such as Punita would not know about such legal
jurisprudence. The courts therefore must consider adding this issue in the bag
of ‘reformative and rehabilitative considerations’ when awarding the sentences
(including life sentence or capital sentences). This may go a long way to prevent secondary
victimization of the wives of sex offenders who are ‘innocent victims’ of the
entire situation. <o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">It is therefore hoped that if the
issue of online as well as real life victimization of the wives of the
convicted sex offenders are seen from the Therapeutic Jurisprudential aspects,
the rights of women to access justice, rehabilitation and privacy may be
secured.<o:p></o:p></span></p><p class="MsoNormal" style="line-height: 200%; text-align: justify;"><span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"> </span></p><p class="MsoNormal" style="text-align: justify;">
</p><div><!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref1" name="_ftn1" title=""></a>Prof(Dr) Debarati Halder, LL.B, LL.M,
Ph.D(Law)(NLSIU) is a Professor at Unitedoworld School of Law, Karnavati
University, Gujarat, India. She is the founder of Centre for Cyber Victim
Counselling (<a href="http://www.cybervictims.org/">www.cybervictims.org</a>)
and the India chapter head of International Society of Therapeutic
Jurisprudence. She is the pioneer in introducing Therapeutic Jurisprudence as a
part of credit course in legal education in India. She can be reached
@debaratihalder@gmail.com <o:p></o:p></p>
<p class="MsoFootnoteText"><o:p> </o:p></p>
<p class="MsoFootnoteText"><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span>
<span lang="EN-US">See for more in PTI(2020)</span><span lang="EN-US"> </span><span lang="EN-US">Nirbhaya
case convicts to be hanged at 5.30 a.m. as Supreme Court dismisses plea against
rejection of mercy petition. Published on March 20.2020 in The Hindu. URL: </span><a href="https://www.thehindu.com/news/national/nirbhaya-case-convicts-to-be-hanged-as-supreme-court-dismisses-plea-against-rejection-of-mercy-petition/article31114747.ece"><span lang="EN-US">https://www.thehindu.com/news/national/nirbhaya-case-convicts-to-be-hanged-as-supreme-court-dismisses-plea-against-rejection-of-mercy-petition/article31114747.ece</span></a><span lang="EN-US"> Accessed on 21.03.2020<o:p></o:p></span></p>
</div>
<div id="ftn2">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref2" name="_ftn2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></a> For
more, see in Profiles: Who were the Delhi gang rape convicts?. Published in
https://www.bbc.com/news/world-asia-india-23434888#:~:text=Courts%20convicted%20six%20people%20for,student%20in%20a%20moving%20bus.
On March 20. 2020, accessed on 21.03.2020 <span lang="EN-US"><o:p></o:p></span></p>
</div>
<div id="ftn3">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref3" name="_ftn3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></a> <span lang="EN-US">For more, see in Banned film India's
Daughter shown in rapists' slum<o:p></o:p></span></p>
<p class="MsoFootnoteText"><span lang="EN-US">.
Published in</span><span lang="EN-US"> </span><span lang="EN-US">https://www.bbc.com/news/world-asia-india-31865477 . On March13. 2015,
accessed on 21.03.2020<o:p></o:p></span></p>
</div>
<div id="ftn4">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref4" name="_ftn4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></a> <span lang="EN-US">For example see the comments @</span><span lang="EN-US"> </span><a href="https://www.youtube.com/watch?v=rzwPrx1l9Hg"><span lang="EN-US">https://www.youtube.com/watch?v=rzwPrx1l9Hg</span></a><span lang="EN-US"> Accessed on 29.10.2020<o:p></o:p></span></p>
</div>
<div id="ftn5">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref5" name="_ftn5" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></a> <span lang="EN-US">The conference proceedings and my
presentation are available @</span><span lang="EN-US"> </span><a href="https://www.youtube.com/watch?v=c9__aYyD9cA"><span lang="EN-US">https://www.youtube.com/watch?v=c9__aYyD9cA</span></a><span lang="EN-US"> <o:p></o:p></span></p>
</div>
<div id="ftn6">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref6" name="_ftn6" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></a> Halder
D., & Jaishankar, K. (2014). Online Victimization of Andaman Jarawa Tribal
Women: An Analysis of the Human Safari<span style="font-family: "Tahoma",sans-serif;">
</span>YouTube Videos (2012) and its Effects. British Journal of Criminology,
54(4), 673-688. (Impact factor 1.556). DOI: 10.1093/bjc/azu026.<span lang="EN-US"><o:p></o:p></span></p>
</div>
<div id="ftn7">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref7" name="_ftn7" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[7]</span></span><!--[endif]--></span></a> <span lang="EN-US">Section 13(2)(ii) in The Hindu
Marriage Act, 1955 states <o:p></o:p></span></p>
<p class="MsoFootnoteText"><span lang="EN-US"> “A wife may also present a petition for the
dissolution of her marriage by a decree of divorce on the ground………. that the
husband has, since the solemnisation of the marriage, been guilty of rape,
sodomy or bestiality”<o:p></o:p></span></p>
</div>
<div id="ftn8">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref8" name="_ftn8" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[8]</span></span><!--[endif]--></span></a> <span lang="EN-US">See for more in Md Ghiasuddin vs
State of AP</span><span lang="EN-US"> </span><span lang="EN-US">. reported in (1977) 3 SCC 287. Available at: www.indiankanoon.org/<o:p></o:p></span></p>
<p class="MsoFootnoteText"><span lang="EN-US">doc/1850315/,<o:p></o:p></span></p>
</div>
<div id="ftn9">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref9" name="_ftn9" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[9]</span></span><!--[endif]--></span></a> <span lang="EN-US">See Halder, Debarati, Why Law Fails
to Be Therapeutic in Spite of Therapeutic Judicial Efforts: A Critical Analysis
of Indian Legal Education From the Therapeutic Jurisprudence Perspective
(October 28, 2018). Unitedworld Law Journal, Vol 2, Issue: I, ISSN: 2457-0427,
(2018) pp 173-182, Available at SSRN: https://ssrn.com/abstract=3274175<o:p></o:p></span></p>
</div>
<div id="ftn10">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref10" name="_ftn10" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[10]</span></span><!--[endif]--></span></a> Halder,
D. (2019), Free Legal Aid for women and Therapeutic Jurisprudence: A critical
examination of the Indian model. In Stobbs Nigel, Bartel Lorana & Vols.M
(eds.), Methodology And Practice Of Therapeutic Jurisprudence Research. USA:
Carolina Academy Press.<span lang="EN-US"><o:p></o:p></span></p>
</div>
</div><p class="MsoNormal" style="text-align: justify; text-indent: 36.0pt;"><span lang="EN-US" style="mso-ansi-language: EN-US;"></span></p><p class="MsoNormal" style="line-height: 200%;"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 200%;">Please do not violate the copyright of this blog. Please cite it as “Halder Debarati. (2020), Plight of "Punita" : A common tale of 'powerless' women victims of trolling" November, 8, 2020,
published in http://debaraticyberspace.blogspot.com<o:p></o:p></span></p>
<p class="MsoNormal" style="text-align: justify;"><span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p> </o:p></span></p>
<div style="mso-element: footnote-list;"><!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;"><p class="MsoFootnoteText"><o:p> </o:p></p>
<p class="MsoFootnoteText"><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span>
<span lang="EN-US" style="mso-ansi-language: EN-US;">See for more in PTI(2020)</span><span lang="EN-US"> </span><span lang="EN-US" style="mso-ansi-language: EN-US;">Nirbhaya
case convicts to be hanged at 5.30 a.m. as Supreme Court dismisses plea against
rejection of mercy petition. Published on March 20.2020 in The Hindu. URL: </span><a href="https://www.thehindu.com/news/national/nirbhaya-case-convicts-to-be-hanged-as-supreme-court-dismisses-plea-against-rejection-of-mercy-petition/article31114747.ece"><span lang="EN-US" style="mso-ansi-language: EN-US;">https://www.thehindu.com/news/national/nirbhaya-case-convicts-to-be-hanged-as-supreme-court-dismisses-plea-against-rejection-of-mercy-petition/article31114747.ece</span></a><span lang="EN-US" style="mso-ansi-language: EN-US;"> Accessed on 21.03.2020<o:p></o:p></span></p>
</div>
<div id="ftn2" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a> For
more, see in Profiles: Who were the Delhi gang rape convicts?. Published in
https://www.bbc.com/news/world-asia-india-23434888#:~:text=Courts%20convicted%20six%20people%20for,student%20in%20a%20moving%20bus.
On March 20. 2020, accessed on 21.03.2020 <span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></p>
</div>
<div id="ftn3" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For more, see in Banned film India's
Daughter shown in rapists' slum<o:p></o:p></span></p>
<p class="MsoFootnoteText"><span lang="EN-US" style="mso-ansi-language: EN-US;">.
Published in</span><span lang="EN-US"> </span><span lang="EN-US" style="mso-ansi-language: EN-US;">https://www.bbc.com/news/world-asia-india-31865477 . On March13. 2015,
accessed on 21.03.2020<o:p></o:p></span></p>
</div>
<div id="ftn4" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref4" name="_ftn4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For example see the comments @</span><span lang="EN-US"> </span><a href="https://www.youtube.com/watch?v=rzwPrx1l9Hg"><span lang="EN-US" style="mso-ansi-language: EN-US;">https://www.youtube.com/watch?v=rzwPrx1l9Hg</span></a><span lang="EN-US" style="mso-ansi-language: EN-US;"> Accessed on 29.10.2020<o:p></o:p></span></p>
</div>
<div id="ftn5" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref5" name="_ftn5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">The conference proceedings and my
presentation are available @</span><span lang="EN-US"> </span><a href="https://www.youtube.com/watch?v=c9__aYyD9cA"><span lang="EN-US" style="mso-ansi-language: EN-US;">https://www.youtube.com/watch?v=c9__aYyD9cA</span></a><span lang="EN-US" style="mso-ansi-language: EN-US;"> <o:p></o:p></span></p>
</div>
<div id="ftn6" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref6" name="_ftn6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></span></a> Halder
D., & Jaishankar, K. (2014). Online Victimization of Andaman Jarawa Tribal
Women: An Analysis of the Human Safari<span style="font-family: "Tahoma",sans-serif;">
</span>YouTube Videos (2012) and its Effects. British Journal of Criminology,
54(4), 673-688. (Impact factor 1.556). DOI: 10.1093/bjc/azu026.<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></p>
</div>
<div id="ftn7" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref7" name="_ftn7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[7]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">Section 13(2)(ii) in The Hindu
Marriage Act, 1955 states <o:p></o:p></span></p>
<p class="MsoFootnoteText"><span lang="EN-US" style="mso-ansi-language: EN-US;"><span style="mso-spacerun: yes;"> </span>“A wife may also present a petition for the
dissolution of her marriage by a decree of divorce on the ground………. that the
husband has, since the solemnisation of the marriage, been guilty of rape,
sodomy or bestiality”<o:p></o:p></span></p>
</div>
<div id="ftn8" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref8" name="_ftn8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[8]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See for more in Md Ghiasuddin vs
State of AP</span><span lang="EN-US"> </span><span lang="EN-US" style="mso-ansi-language: EN-US;">. reported in (1977) 3 SCC 287. Available at: www.indiankanoon.org/<o:p></o:p></span></p>
<p class="MsoFootnoteText"><span lang="EN-US" style="mso-ansi-language: EN-US;">doc/1850315/,<o:p></o:p></span></p>
</div>
<div id="ftn9" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref9" name="_ftn9" style="mso-footnote-id: ftn9;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[9]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See Halder, Debarati, Why Law Fails
to Be Therapeutic in Spite of Therapeutic Judicial Efforts: A Critical Analysis
of Indian Legal Education From the Therapeutic Jurisprudence Perspective
(October 28, 2018). Unitedworld Law Journal, Vol 2, Issue: I, ISSN: 2457-0427,
(2018) pp 173-182, Available at SSRN: https://ssrn.com/abstract=3274175<o:p></o:p></span></p>
</div>
<div id="ftn10" style="mso-element: footnote;">
<p class="MsoFootnoteText"><a href="file:///D:/doibipractical/ccvc/blogwomen/blog2020/debarati%20halder%20sex%20offenders%20wife%20cyber%20victimisation.docx#_ftnref10" name="_ftn10" style="mso-footnote-id: ftn10;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[10]</span></span><!--[endif]--></span></span></a> Halder,
D. (2019), Free Legal Aid for women and Therapeutic Jurisprudence: A critical
examination of the Indian model. In Stobbs Nigel, Bartel Lorana & Vols.M
(eds.), Methodology And Practice Of Therapeutic Jurisprudence Research. USA:
Carolina Academy Press.<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></p>
</div>
</div><br /></div></div><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-75115104050025473422020-05-02T06:14:00.001-07:002020-05-02T06:58:34.215-07:00Covid-19 lock down and cyber victimization of women by Dr.Debarati HalderCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<div align="center" class="MsoNormal" style="text-align: center;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Since 16<sup>th</sup> March, 2020 most of the
countries started planning for partial lockdown for preventing the fast
spreading of Covid -19. By 22<sup>nd</sup> March, most of the countries in
Europe, Asia, Africa and in the USA , Australia etc called for total lock down.
India was no exception. Almost all universities, colleges, schools and other
workplaces faced the impact of lockdown. People including adults and children
became extremely confused as there was no specific indication as when worldwide
lock down would be lifted. Europe saw a rapid increase of the Covid-positive
patients. USA joined soon. Many Asian countries including India could not
afford to let people do their business as usual. Indian government called for a
lockdown period for 15 days first. But before the finishing the of 2 weeks
period, the government had to reconsider and extended the lockdown period till
3<sup>rd</sup> May, 2020. However, several State governments in India are
considering for further extension because the numbers of Covid 19 patients are
increasing. Schools and universities
decided to conduct online classes with huge preference to Zoom. Adults and
children shifted more to online entertainment because television industry came
to a standstill due to lockdown as well. However, the tele industry did
consider sharing old versions of the daily soaps. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">While people went in lockdown, many took to internet
to entertain each other : social media sites including Facebook, Instagram,
YouTube, TikTok, and digital and internet communication apps like WhatsApp etc soon saw a flood of user generated
contents which are now hugely consumed by others. Not all of these user
generated contents are actually for entertainment for all. There were several
contents which were and are still being made specifically to target and harass women and girls. The
first platform that started getting contents for gender harassment, especially
harassment to women was Zoom app which was being used by most of the
educational institutes and workplaces for holding online meetings, classes,
webinars etc. In several cases it was seen that Zoom meetings were
unauthorizedly accessed by unwanted persons who started posting harassing,
sexually explicit comments, disrupted meetings with exposing private parts,
showing masturbation etc. Soon Zoom authorities came with a pubic declaration
that cyber security and safety measures of the platform were not strong enough
to tackle such sudden huge use.<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftn1" name="_ftnref1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 107%;">[1]</span></span><!--[endif]--></span></a>
Who could actually be held responsible for such unauthorized access then? The
web platform implied that organizers of the zoom meetings and classes must take
precautionary measures. But were we really ready and aware and to take such
precautionary measures? Probably no. The
Zoom app mismanagement actually led to four kinds online crimes :<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b><span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Unauthorized access to the meetings<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b><span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Data privacy infringement <o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b><span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Creation of sexually explicit contents <o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b><span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Making gestures etc to harm the modesty of women <o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">While<b> </b>this is just one kind of offence, online
harassment of women did not remain restricted to this only. Given the fact that
during lockdown most of the stakeholders of criminal justice machinery
including the police and courts and the web companies are working with limited
man power and infrastructure facilities, perpetrators have taken this time to
escalate harassment. The communication apps like Whatsapp, Facebook messenger
etc are now flooding with online bullying. This is seen especially in the
school and college groups. These platforms have become chosen platforms for throwing
harsh, insulting, intimidating comments towards classmates, batchmates and also
towards the teachers, especially female teachers, colleagues and users. I
myself had been targeted by some bullies and stalkers on Facebook messenger and WhatsApp as well. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Apart from this, the other patterns of online
harassment which has raised to a maximum height during the Covid -19 lockdown
stage, that came in my observation is creation of impersonating profiles on
social media. We must however appreciate the fact that impersonation by using
unique identities have been considered as an offence Under S.66C of the Information
Technology Act, 2000(amended in 2008), which speaks about punishment for
identity theft and says <i>“whoever, fraudulently or dishonestly make use of
the electronic signature, password or any other unique identification feature
of any other person, shall be punished with imprisonment of either description
for a term which may extend to three years and shall also be liable to fine
which may extend to rupees one lakh”<o:p></o:p></i></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Several of such impersonating profiles are of the
nature of revenge porn. some may also
fall in the category of sexually explicit and voyeuristic contents , but may
not have the <i>mens rea</i> as that of revenge porn ( the element of revenge
taking mentality is not present), especially since these images may have been
captured in the public places or may have been collected from other profiles
etc.<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftn2" name="_ftnref2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 107%;">[2]</span></span><!--[endif]--></span></a>
TikTok and YouTube are of no exception in this matter. People are restricted in
their homes; they have taken to TikTok content creations which may include
uploading contents including women doing different activities, that may have been captured in public places.
Consider videos showcasing women cooking and sweating, eating at weddings,
resting at home by lying down or in a leisure posture, women and girls walking
on the roads, at college/school campuses, working in a working place etc:
TikTok content creators may take such
audio visual images, pickup any specific posture of women that may be consumed
more by viewers and may upload such clippings with texts (sometimes sexually explicit)
and background sounds that may be available on Tiktok or may be created by the
users . </span><span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">One
must not forget that TikTok was questioned earlier on their lack of due diligence
for not taking down abusive contents earlier by Supreme court of India: Google
Play services removed TikTok from their platform as well. But soon TikTok
cleared all legal hassles and came back in android services again. <a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftn3" name="_ftnref3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-size: 16pt; line-height: 107%;">[3]</span></span><!--[endif]--></span></a>
No doubt, the App is back again for being (mis)used to harm the modesty of
women and infringing the privacy of women and children during quarantine time
when the victims may feel more restrained to reach out to criminal justice machinery
and the websites. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">But we
should not think that this is an exclusive problem of India only. I did get to
hear about sudden growth of online harassment targeting women from different regions
of the world: be it USA, Australia, South Africa, UK , Ireland or even our neighbouring
countries like Nepal, Bangladesh or SriLanka .women, including working women,
volunteers who may have come to different Asian countries from the US etc, health
workers, law students and professionals, every where women are facing similar
problems to reach out to criminal justice system to report crimes. Even if they
may reach out, the police and the courts and the websites as well are not in a
position to offer a quick help.<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftn4" name="_ftnref4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-size: 16pt; line-height: 107%;">[4]</span></span><!--[endif]--></span></a>
<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Several
stakeholders may provide several suggestions to stay safe online and maintain the
hygiene of the devices to save ourselves, especially women from rising level of
cyber crimes during lock down period. But
are we concerned about the mental health conditions and impact of victimisation
of online harassment on women during lock down? Several women may be living
with abusive partners, husbands who may have cheated on them, or even other
women family members who may have been victimised online and who may in order
to share the trauma, disclosed the victimisation to the former. Unlike trauma
that may generate from physical harassments, online harassments during lock
down may bring unique traumatising effects. Devices handled by women may be
detained and they may not be allowed to
contact anyone in case the harasser spreads his vicious net to reach out to
husband or other male members of the family. Victim women may even go to the
extent of self-harming too. They may even try to destroy the evidences of
online harassment by deleting the contents from their phones if the harassment
is in the nature of bullying or threatening message etc. In case of revenge
porn content or in the case of non-consensual image sharing, victims may even
try to block the profiles without saving the evidences. In several other cases,
they may take up irrational coping mechanism like counter bullying or
contacting the perpetrator asking him to take down the contents. they may even
try to contact amateur hackers, which may prove extremely dangerous for them. Emotionally
such women victims may become completely withdrawn and may even show aggressiveness
as well. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">What could
be done in such situations as lock down in India has been extended for the
third time. My opinion in this regard is as follows: <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; font-size: 16.0pt; line-height: 200%;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">The police
control rooms in each district must open a dedicated 24-hour service unit
specially equipped with infrastructure and properly trained police personnel
who may handle such digital harassment cases and evidences to receive
complaints from the victims, especially women victims of online harassment. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; font-size: 16.0pt; line-height: 200%;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Some types
of online offences have been recognised by our domestic laws; some however have
not received any focussed laws. But that does not mean that only offences that
may contain complaints towards creating porn contents, threatening and
defamatory contents etc, may be given priority and FIR may be registered for
such offences which may fall within the meaning of cognizable offences. The
police must entertain all complaints and must guide the victims in all cases. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; font-size: 16.0pt; line-height: 200%;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Police
may rope in NGOs, cyber crime and cyber law experts to create an expert
committee in every district and metropolitan area to provide immediate counselling
to the victim as how to save the evidences of online harassments and how to
share the same with the police for the purpose of investigation. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; font-size: 16.0pt; line-height: 200%;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Victims may
get an immediate feel of relief when they are told that their complaints are
registered. The police therefore must not neglect to look into each type of
compliant. Such gestures from the police may prevent the women victims from committing
self harm or from taking any irrational steps to saver their reputation and that
of their families.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="font-family: "wingdings"; font-size: 16.0pt; line-height: 200%;">Ø<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;"> </span></span><!--[endif]--><span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Courts
and prosecutors must also consider extending their support whereby judicial
magistrates may join such endeavours to support the victims. We should remember
that it is only adults, but children may also be involved as victims as well as
perpetrators. Unless the courts are extending supports through electronic
mediums, it would become extremely difficult to win the trust of victims as
well as general public for Criminal Justice machinery at this time of lock
down. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Last but not
the least, we must not forget that in cases of online harassment of women, web companies
are the foremost liable sectors. The Due diligence clause must not be suspended
due to lock down. The web companies must consider each and every take down
request and reports on objectionable contents and must adhere to Indian legal understanding
for restricting the access to such contents. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Indeed,
the Lock down period is a testing time for the entire human civilization. But if
we do not restrict unethical and illegal usage of information technology, the
impact of online harassment may be more traumatizing than the Covid-19 experience.
<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Stay
safe, stay strong and do not misuse the Information and digital communication technology.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "georgia" , serif; font-size: 16.0pt; line-height: 200%;">Please note : Do not violate
copyright of this blog. If you would like to use information provided in this
blog for your own assignment/writeup/project/blog/article, please cite it as
“Halder Debarati. (2020), "Covid-19 lock down and cyber victimization of women" “May 2<sup>nd</sup>, 2020, published in http://debaraticyberspace.blogspot.com<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
</div>
<div>
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<br />
<div id="ftn1">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftnref1" name="_ftn1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , sans-serif; font-size: 10.0pt; line-height: 107%;">[1]</span></span><!--[endif]--></span></a> See https://www.financialexpress.com/industry/technology/govt-of-india-issues-advisory-says-zoom-not-secure-video-conferencing-platform/1930509/<o:p></o:p></div>
</div>
<div id="ftn2">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftnref2" name="_ftn2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , sans-serif; font-size: 10.0pt; line-height: 107%;">[2]</span></span><!--[endif]--></span></a> Halder.D(2017)
Criminalising Revenge Porn: Why Stakeholders Must Not Be Happy With Present
Legal Setup. Published in Livelaw.in magazine @<o:p></o:p></div>
<div class="MsoFootnoteText">
https://www.livelaw.in/criminalising-revenge-porn-stakeholders-must-not-happy-present-legal-setup/<o:p></o:p></div>
</div>
<div id="ftn3">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftnref3" name="_ftn3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , sans-serif; font-size: 10.0pt; line-height: 107%;">[3]</span></span><!--[endif]--></span></a> https://www.indiatoday.in/technology/features/story/tiktok-is-back-on-app-stores-from-ban-to-court-order-here-s-everything-you-need-to-know-1513644-2019-04-30<o:p></o:p></div>
</div>
<div id="ftn4">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/blogwomen/blog2020/online%20harassmentduring%20lockdown.docx#_ftnref4" name="_ftn4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , sans-serif; font-size: 10.0pt; line-height: 107%;">[4]</span></span><!--[endif]--></span></a> For
more, see https://kathmandupost.com/national/2020/04/23/how-one-pokhara-resident-led-a-smear-campaign-to-get-an-american-kicked-out-of-the-country<o:p></o:p></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-14230398159270034592019-10-28T11:39:00.000-07:002019-10-28T11:39:24.980-07:00YouTube, YouTubers and violation of privacy of women and children: The drama unfoldsCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<br />
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-33fC2pyum1Y/Xbcz6ylC7nI/AAAAAAAAAlQ/xJHQn9DQ7KcEgLkdOOqGTq2n6k1z5-JYwCLcBGAsYHQ/s1600/YouGTUbe.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="225" data-original-width="225" src="https://1.bp.blogspot.com/-33fC2pyum1Y/Xbcz6ylC7nI/AAAAAAAAAlQ/xJHQn9DQ7KcEgLkdOOqGTq2n6k1z5-JYwCLcBGAsYHQ/s1600/YouGTUbe.png" /></a></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">In recent
years YouTube has won millions of hearts in India as a social media platform
especially among women. This is because unlike other social media websites, YouTube
has provided a platform to earn money based upon views and subscribers.
Contents uploaded by users may be varied: it can be home decor, power point
presentations of simplified versions of undergraduate subjects, subject lectures
by professional teachers or amateur subject experts, cooking recipes, Do It
Yourself (DIYs), home organisations, daily routines of home makers, technological
solutions, how to do stuffs etc . Several women have used YouTube to earn money
generated through the revenue that YouTube promises once the user can reach some
criteria like getting 1000 subscribers or 4000 watch hours etc. <a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
YouTube however would not lead the user to create contents that may earn more
watch hours or subscribers. Users may go for market survey to understand which
sorts of videos may attract more views, ,more subscribers etc. mostly new users
including men and women may try to create videos on anything that they feel
proper to share to the world. YouGTube , like Facebook and Instagram has
features for allowing users to create videos for private sharing. This enables
the users to share the video which may be watched only by those whom the
creator chooses. The users may however go for wide circulation of their contents
by not only making the videos public, but also by going live<span style="mso-spacerun: yes;"> </span>whereby the users may directly communicate
with their subscribers or may share information while live.<span style="mso-spacerun: yes;"> </span>Even though going Live may be a feature specifically
for improving the relationship between the user and his/her subscribers, live
videos can be watched by the world wide audience even if they are not
subscribers to that particular user. <span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span>Here, YouTube may not play a vital role to
restrict uploading and sharing the contents unless the subscribers or <span style="mso-spacerun: yes;"> </span>viewers may flag the content as inappropriate.<span style="mso-spacerun: yes;"> </span>In short, YouTube may actually provide a wide
platform to share anything including bullying videos, mashed up videos, child and
woman abuse videos, birthing videos, adult sexual interaction videos and so on.
While the adult sexual videos and birthing videos may not be universally accessible
unless the user logs in to his/her YouTube accounts, other sorts of videos are accessible
to all irrespective of age. YouTube however uses the due diligence clause to
escape from any third party liability by providing notification which restricts
children from viewing adult sexual contents or violent contents which may
traumatise children. Hardly this <span style="mso-spacerun: yes;"> </span>has any
practical implication because children may access these videos by using email
ids which may be created on the basis of fake age , or may even log in through
their parents’ or friends’ email /YouTube ids. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">My
attention here is however attracted to the contents shared by YouTubers: I have
been an avid watcher of YouTube since many years now. I have been following the
changing trends of users in uploading the contents. Earlier it was more on
creating mashed up videos which may have the potentials of violating the copyrights.
Such videos have also been silently encouraged by actors, singers and producers
because these actually publicize their work even though it may violate the
laws. <a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
But slowly, the content creators, especially women started becoming reviewers
of products on YouTube as well. This included using of cosmetics, kitchen wares
organisers etc that may be shown in the daily routine videos, home organisation
videos or make up tutorials.<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a>
<span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span>Users
not only get views and subscribers as may be needed for fulfilling the YouTube
monetising criteria, they may also be connected with the brands manufacturing
the products or dealers of the products who may wish to showcase their products
through these non-professional videos. Several urban and rural women home
makers have actually benefitted from this: consider Youtubers like Radhika Real
Vlogs,<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn4" name="_ftnref4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a>
or simplelivingwithringlejain<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn5" name="_ftnref5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a>
who may be rural homemakers, but may have made a moderate to comfortable living
because of their YouTube videos advertising about different brands including retailer
brands. <span style="mso-spacerun: yes;"> </span>Nonetheless, these YouTubers may
also be victims of bullying and trolling for the quality of their videos, their
pronunciation, lifestyle and even house decorations. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">While
these women may have made a landmark professional/personal achievement because
of YouTube, they may unknowingly violate privacy of their own children or even
spouses or other family members as they may be showing and informing the
worldwide audience about their family members who may not may consent for such
wide distribution of images of themselves. These YouTube videos may also be the
subject matter of bullying and ridiculing the children of such YouTubers since
these may stay on worldwide web for long time. YouTube videos may also create
severe domestic violence for several reasons which include live fights between
spouses which may be captured by third party YouTubers for fun and uploaded and
circulated for getting more views; or airing of grievances by women YouTubers
against the other spouses, without knowing the far-reaching consequences etc.
These videos may attract huge views and opinions, comments in the nature of cyber
bullying and also trolling targeting the YouTuber concerned or supporters of
the same. Consider the case of two specific Youtubers from Delhi, who are
spouses in real life : the wife is a senior YouTuber whereas the husband is a
recent Youtuber: They had severe altercations and started living apart. But this
was not enough: both used YouTube to throw insults and humiliating words to
each other and their teen daughter was allegedly dragged in between. The recent
reports suggested that the teenager girl who <span style="mso-spacerun: yes;"> </span>was staying with her father for couple of
months after the separation, was beaten by the latter while on live and her
t-shirt was torn in a manner which would show her inner wares.<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn6" name="_ftnref6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></span></a>
The girl was beaten because she wanted to visit her mother. This video became
viral as several supporters of the wife started showing the clippings through
their own channels. Some had also informed ChildLine and the police who had rescued
the teenager and sent her to her maternal grandmother.<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn7" name="_ftnref7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[7]</span></span><!--[endif]--></span></span></a>
<span style="mso-spacerun: yes;"> </span>There are several other YouTubers who
started discussing about incident using the profile name of the husband wife
duo.<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftn8" name="_ftnref8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[8]</span></span><!--[endif]--></span></span></a>
While the news report published in the local news media suggested that the
teenager was often beaten by both the parents when they were drunk and she was
forced to come on live which she refused many times, the news clipping did not
mention about the name of the girl and that of her parents as S.21 of the
Juvenile Justice Care and protection Act, 2015 prohibits publication of the identity
of the child in need of care and protection or child in conflict with law. The
provision reads as below:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<i><span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">S.21.
Prohibition of publication of name, etc., of juvenile in conflict with law or
child in need of care and protection involved in any proceeding under the Act.-1.
No report in any newspaper, magazine, news-sheet or visual media of any inquiry
regarding a juvenile in conflict with law or a child in need of care and
protection under this Act shall disclose the name, address or school or any
other particulars calculated to lead to the identification of the juvenile or
child nor shall any picture of any such juvenile or child be published:
Provided that for reasons to be recorded in writing, the authority holding the
inquiry may permit such disclosure, if in its opinion such disclosure is in the
interest of the juvenile or the child. 2. Any person who contravenes the
provisions of sub-section (1), shall be liable to a penalty which may extend to
twenty-five thousand rupees.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">Now, let
us understand the scope of this provision in the light of this particular case:
the first subsection prohibits any report including news report, inquiry etc
from disclosing the name, information etc of the concerned child. The second
proviso extends the scope to ‘anyone’ who may contravene the prohibitory scope
of S.21. Seen from the perspective of electronic media and the concept of
citizen journalism, which gives every one right to share information, the term ‘anyone’
may literally include anyone including the good Samaritans who may have wanted
to alert the concerned authorities, share their opinion against such acts of
women and child abuse. Further, note the words “<i>any other particulars
calculated to lead to the identification of the juvenile or child nor shall any
picture of any such juvenile or child be published” </i>mentioned in the first
sub clause. This may include the name of the concerned child and names of the
parents. But apparently, this provision became a just a paper tiger in this
case because those who had watched or subscribed to the videos of the couple
had already known about the identity of the teenager because of the daily Lives
put up by the parents and discussion about the girl in the videos posted by
them. If one visits the comment section of the recent videos of both the
parents in the recent past, it would be seen that commenters have taken the
name of the girl, asked about her whereabouts and in some cases, some had also
suggested about her changed behaviour after she had stayed with her respective
parents separately. Nothing is confidential for those thousands of worldwide audiences
now who had watched the parents daily and who had also witnessed the Live video
where the girl was beaten up by the father. <span style="mso-spacerun: yes;"> </span>In spite of repeated request by the mother of
the girl, several YouTubers still did not take down videos mentioning about the
name of the father (which broadly falls within the meaning of “<i>any other
particulars calculated to lead to the identification of the juvenile or child”</i>)
when this writeup was published. While the Juvenile Justice Care and Protection
and Act provides a base rule, the concerned YouTubers may not be held solely
responsible because the parents already violated the privacy of the teenager
and encouraged thousands to watch the couple fight which had every potential to
attract penal provisions for using words etc for harming the modesty of the wife
under S.509 Indian Penal Code as well as defamation of both the wife and the
husband under Sections 499 and 500 of the Indian Penal Code. YouTube on the
other hand has not taken down the videos of either of the spouses or that of
the other YouTubers <span style="mso-spacerun: yes;"> </span>which may showcase the
names of the parents and the child because it is guided by First Amendment of
the US which may hardly be affected unless YouTube has been approached to take
the videos down by concerned stakeholders. <span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">It is now
a typical love triangle of three parties : YouTube, which is loved by all for
providing such an open platform for airing opinions and consumption of real
life family dramas, the YouTubers who may expect to get support, views,
popularity and money because of participating in the trolling and independent
discussions on such issues which may rip open privacy of general individuals including
children and criminal justice machinery, most of whom may never know how to
manage legalities of YouTube videos because they are completely ignorant of
this new type of electronic media. <span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">But this is
not a unique incident that attracts the attention of legal researchers,
especially privacy law and speech law researchers. YouTubers, especially women YouTubers
continue to violate privacy knowingly or unknowingly and provide more opportunity
to trolls, bullies and offline perpetrators to victimise them because they may
not be aware about the netiquettes of YouTube. Time has come that YouTube users
become cautious of the contents uploaded by them and legalities attached with
such uploading and sharing. In this festive season YouTube content uploading
and sharing may have seen a steep rise. But it is upon YouTubers to control
what must be shared and may not. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;">YouTube
is more powerful than televisions, more demanded than movies and more
devastating than what is generally apprehended. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 16.0pt; line-height: 150%;"></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify;">
<span style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 150%;">Please note:
Do not violate copyright of this blog. If you would like to use information
provided in this blog for your own assignment/writeup/project/blog/article,
please cite it as “Halder D. (2019), "</span> <span style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 150%;">YouTube, YouTubers and violation
of privacy of women and children: The drama unfolds” Published in <a href="http://debaraticyberspace.blogspot.com/">http://debaraticyberspace.blogspot.com</a>
on 28-10-2019<o:p></o:p></span></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For <span style="mso-spacerun: yes;"> </span>more, see https://support.google.com/youtube/answer/72851<o:p></o:p></span></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a> For
example see Halder D., & Jaishankar K. (2016) Celebrities and Cyber Crimes:
An Analysis of the Victimization of Female Film Stars on the Internet. Temida -
The journal on victimization, human rights and gender. 19(3-4), 355-372<o:p></o:p></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a> For
example see <a href="https://www.youtube.com/watch?v=52c7V2yeRlo">https://www.youtube.com/watch?v=52c7V2yeRlo</a>
<span style="mso-spacerun: yes;"> </span>, <a href="https://www.youtube.com/watch?v=wYdX1uZe1FM">https://www.youtube.com/watch?v=wYdX1uZe1FM</a>
<span style="mso-spacerun: yes;"> </span>, <a href="https://www.youtube.com/watch?v=3yuvcKc30ss">https://www.youtube.com/watch?v=3yuvcKc30ss</a>
<a href="https://www.youtube.com/watch?v=IdA6BZJvaEU">https://www.youtube.com/watch?v=IdA6BZJvaEU</a>
etc. <o:p></o:p></div>
</div>
<div id="ftn4" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref4" name="_ftn4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a> <a href="https://www.youtube.com/watch?v=bkcMmd-b1-Y">https://www.youtube.com/watch?v=bkcMmd-b1-Y</a>
<o:p></o:p></div>
</div>
<div id="ftn5" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref5" name="_ftn5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a> <a href="https://www.youtube.com/watch?v=6Po5tE2qKxM">https://www.youtube.com/watch?v=6Po5tE2qKxM</a>
<o:p></o:p></div>
</div>
<div id="ftn6" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref6" name="_ftn6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></span></a> See
for better understanding of the case in <a href="https://www.amarujala.com/delhi-ncr/faridabad/drunk-parents-beat-student-faridabad-news-noi468791969">https://www.amarujala.com/delhi-ncr/faridabad/drunk-parents-beat-student-faridabad-news-noi468791969</a>
<o:p></o:p></div>
</div>
<div id="ftn7" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref7" name="_ftn7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[7]</span></span><!--[endif]--></span></span></a> See
<a href="https://www.youtube.com/watch?v=LNG3lousHu4&t=167s">https://www.youtube.com/watch?v=LNG3lousHu4&t=167s</a>
where the Youtuber had informed that she called the police to report the video
and provided the link of the media report of the incident. <o:p></o:p></div>
</div>
<div id="ftn8" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/doibipractical/ccvc/cybermagazine/october2019/YouTube.docx#_ftnref8" name="_ftn8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[8]</span></span><!--[endif]--></span></span></a> For
example, see <a href="https://www.youtube.com/watch?v=xWS8FAa-MC4&t=48s">https://www.youtube.com/watch?v=xWS8FAa-MC4&t=48s</a>
. <a href="https://www.youtube.com/watch?v=MdrSLYGOTpE&t=14s">https://www.youtube.com/watch?v=MdrSLYGOTpE&t=14s</a>
<o:p></o:p></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-714260498958546972019-09-01T11:10:00.000-07:002019-09-01T11:10:37.201-07:003 ways how Artificial Intelligence may make women land in troubleCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<img alt="Image result for artificial intelligence free images" src="https://media.istockphoto.com/photos/blue-digital-computer-brain-on-circuit-board-with-glows-and-flares-picture-id871148930?k=6&m=871148930&s=612x612&w=0&h=I8TnWBHr0UG8bRF43ZfkZoqYPZlWeTKcflvhS9PwgAY=" /><br />
<div class="MsoNormal" style="line-height: 200%; text-align: center;">
<span lang="EN-US" style="font-family: "Times New Roman", serif; line-height: 200%;"><i><span style="font-size: x-small;">Image curtsy : Google </span></i></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;"><br /></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Information communication technology and digital
communication technology have opened up new vistas for human relationships. The
innovative technology with the help of Artifical Intelligence (AI) can now read
minds,<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftn1" name="_ftnref1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></a> predict
illness,<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftn2" name="_ftnref2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 115%;">[2]</span></span><!--[endif]--></span></a> predict
crime occurrence,<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftn3" name="_ftnref3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 115%;">[3]</span></span><!--[endif]--></span></a>
enhance the professional and social network, and help in better analytical
understanding of subjects. But it can also leave devastating impacts on human
life. It can alter the data (including personal data), harm social reputation
and can even instigate victims to take extreme steps like committing suicide.<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftn4" name="_ftnref4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 115%;">[4]</span></span><!--[endif]--></span></a>
All these may be done by positive and negative usage of
artificial intelligence which plays the base role for empowering Apps which in
turn may be used for positive and negative usages. Artificial Intelligence (AI) has been used by
web companies like Facebook for facial recognition of users earlier. AI has
also been used for companies (other than web companies) for processing employee
data. In short, AI has been used to access private information of individuals
either consensually or without consent. Here are three ways as how AI may
create an uncomfortable situation for women specifically in India :<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-fareast-font-family: "Times New Roman";">1.<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Facial
Recognition Apps and harassment of women: Remember the time when Facebook suddenly
started asking for nude photos individuals for upgrading their own safety
system apparently for providing safety mechanisms for subscribers?<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftn5" name="_ftnref5" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 115%;">[5]</span></span><!--[endif]--></span></a> This
project was intended to build up a safety mechanism against revenge porn with
the help of Artificial Intelligence. Facebook wanted to empower their
subscribers, especially women to report revenge porn. But before that, the
company wanted to ensure that the revenge porn content showcased the image that
belonged to the victim specifically. The facial recognition app, the skin
texture, hair color, biometric recognition technology would be matching both
the images (the nude picture of the victim and the revenge porn content created
by the perpetrator) and would be identifying the revenge porn content as illegal.
But this project received stern objections because there were more possibilities
of misuse of nude photos than positive use of the same. Facebook -Cambridge analytica
case did prove that nothing is impossible when it comes to preservation of data
by body-corporates and data of individuals is always profitable and the security
of the same is vulnerable. But this may
not seem to be as dangerous as misuse of Face App may seem to be . FaceApp is
basically used to change the face structure of the person whose photograph
would be used in this App. It can change the texture of the skin and density of
hair including facial hair. In July,
2019, FaceApp became the center of concern for Indian cyber security
stakeholders especially when several celebrities started using FaceApp and
started showcasing their changed faces on Instagram. While FaceApp was basically being used for
fun purposes, it may also throw challenges for data safety and security of
person concerned. FaceApp helps to change the structure of faces. But we should
not forget that the altered facial image can be saved in devices and cloud of
different individuals. This altered image may be used for several illegal
activities. Predators may unauthorizedly access the social media profiles and
change facial images of the victims to create fake profiles; they may also use
such images to create a completely new impersonating profile to harass women.
Altered facial images of women may also be used for revenge purposes especially
when the victim is looking for opportunities in the entertainment or
advertisement sector where her appearance may be considered as her biggest
asset. Apart from this, FaceApp may be used to attract bullies and trolls to
intensify victimization of women.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-fareast-font-family: "Times New Roman";">2.<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Bringing
back the memory: No one, but the web companies clearly remember what we posted
in last summer. Every day social media companies would show what was posted by
the user a year back or a couple of years back and would gently remind the user
that he/she can share the said post as a memory. How does it happen? The web
companies look for algorithm and the highest likes and comments for posts on
daily or even hourly basis. When the posts earn more likes and comments, the AI
decides to bring it forth. In certain situations, such refreshing of memories
might not be ‘wanted’ at all especially when the victim might had a bitter
ending of the relationship with persons in the said image or the text in
question may no longer evoke good memories, but rather traumatize the victim
more. But machine intelligence does not fail the company: it is a matter of
consent and choice after all. But consider if the account is unauthorizedly accessed:
the hacker may get to know something from the past which the victim may never
wanted the hacker to know.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-fareast-font-family: "Times New Roman";">3.<span style="font-family: "Times New Roman"; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Reminding
the user about best low prices : AI runs over the internet like blood vessels
carrying oxygen all over the body. When a user decides to compare prices of any
product or services, AI helps to share the same almost always on any platform
the user would be visiting. It might be extremely embarrassing for any woman if
such searches start showing results when she is surfing the social media or
even the search engine with a friend or another individual. Nothing is left by
the AI from prices of lipsticks, hotels at cheaper rate, flight details to last
watched videos on how to conceive. This might also make women face
discrimination, office bullying and harassment due to several reasons. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">These are but some of the many ways as how AI may make
women to land in trouble. AI is necessarily connected with data privacy protection
policies of web companies. The EU General Data Protection Regulation, 2018
provides that personal data may not be processed without the consent of the
owner of the data.<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftn6" name="_ftnref6" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 16pt; line-height: 115%;">[6]</span></span><!--[endif]--></span></a>
But in this case, there can be legal tangles as web companies may claim that they do not breach the data
confidentiality or transfer the data to any other jurisdiction, neither they
process the data without proper authorization. Here, multiple stakeholders may
be involved which may include the original owner of the content or the picture
which may have been processed for the purpose of harassment : the perpetrator,
who may have carried out changes on the data using the AI supported Apps,
perpetrators who may have unauthorizedly
stored the altered contents, picture or information or may have used the
altered information, picture for creating impersonating profile etc. As per
Indian legal understanding, altering, modifying etc of contents/ information/ image
/images without proper authorization of the original owner of the information etc may attract penal provisions
under the Information Technology Act, 2000 (amended in 2008): these provisions
may include Ss 43 (Penalty and compensation for damage to computer, computer
system etc, ), 66 (computer related offences, 66C (punishment for identity
theft) and 66D (punishment by cheating by impersonation by using computer
resource etc. This may also attract penal provisions for Copy Right violation
as well. Further, the web companies may be narrowly be liable for protecting
data properly under several provisions including S.43A which speaks about body
corporates liability to protect data. But irrespective of existing provisions,
web companies may always escape the clutches of law due to due diligence clause
and on the question of consent expressly or impliedly provided by the woman
victim concerned. In the EU, courts are becoming more and more concerned about
policy violations by web companies to fool the users. In India too, the courts
must throw light on the web companies responsibility as data repository. Regulations
like Data protection Bill, 2018 must be considered with utmost care. These may
have the key to solve problems of online victimization of women.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;">Also, women users need to be extremely cautious about
machine intelligence. Awareness must be spread about how the hidden ‘safety valves’
of the web companies (which may actually make the web companies more powerful
against claims of lack of due diligence) may be used properly. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 16.0pt; line-height: 200%; mso-ansi-language: EN-US;"> </span><span lang="EN-US" style="font-family: "Times New Roman", serif; font-size: 12pt; line-height: 32px;">Please do not violate the copy right of this blog. If you need to use this blog for your writeup/assignment/project , then please cite it as Halder Debarati(2019) </span><span style="font-family: "Times New Roman", serif; font-size: 12pt;"><b>3 ways how Artificial Intelligence may make women land in trouble. Published in </b></span><span style="font-family: Georgia, serif; font-size: 14pt;">in http://debaraticyberspace.blogspot.com</span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
</div>
<div>
<!--[if !supportFootnotes]--><br clear="all" />
<div id="ftn6">
<div class="MsoFootnoteText">
<span lang="EN-US">2019<o:p></o:p></span></div>
</div>
</div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia",serif; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"><o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN-US;"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman",serif; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN-US;"><br /></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<br />
<div>
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1">
<div class="MsoFootnoteText">
<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftnref1" name="_ftn1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></a> <span lang="EN-US">For example, see Nosta John (2019) A.I.
Can Now Read Your Thoughts—And Turn Them Into Words and Images. Published @</span><span lang="EN-US"> </span><a href="https://fortune.com/2019/05/07/artificial-intelligence-mind-reading-technology/"><span lang="EN-US">https://fortune.com/2019/05/07/artificial-intelligence-mind-reading-technology/</span></a><span lang="EN-US"> on May 7, 2019<o:p></o:p></span></div>
</div>
<div id="ftn2">
<div class="MsoFootnoteText">
<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftnref2" name="_ftn2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></a>
For example, see PTI (2019), These AI tools can predict early death risk due to
chronic diseases <o:p></o:p></div>
<div class="MsoFootnoteText">
Published
@//economictimes.indiatimes.com/articleshow/68611835.cms?from=mdr&utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
on March 28, 2019<span lang="EN-US"><o:p></o:p></span></div>
</div>
<div id="ftn3">
<div class="MsoFootnoteText">
<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftnref3" name="_ftn3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></a> <span lang="EN-US">Dearden Lizzi (2017)</span><span lang="EN-US"> </span><span lang="EN-US">How
technology is allowing police to predict where and when crime will happen.
Published @</span><span lang="EN-US"> </span><a href="https://www.independent.co.uk/news/uk/home-news/police-big-data-technology-predict-crime-hotspot-mapping-rusi-report-research-minority-report-a7963706.html?fbclid=IwAR334Z4-1KlkK5Xrt_R6IUaU7K35bANkPLc3RAUhHUeEf-eerZseEJbSofo"><span lang="EN-US">https://www.independent.co.uk/news/uk/home-news/police-big-data-technology-predict-crime-hotspot-mapping-rusi-report-research-minority-report-a7963706.html?fbclid=IwAR334Z4-1KlkK5Xrt_R6IUaU7K35bANkPLc3RAUhHUeEf-eerZseEJbSofo</span></a><span lang="EN-US"> on October 7, 2017</span></div>
</div>
<div id="ftn4">
<div class="MsoFootnoteText">
<span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span>
<span lang="EN-US">Halder D., & Jaishankar, K
(2016.) Cyber crimes against women in India.<o:p></o:p></span></div>
<div class="MsoFootnoteText">
<span lang="EN-US">New
Delhi: SAGE Publications. ISBN: 9789385985775<o:p></o:p></span></div>
</div>
<div id="ftn5">
<div class="MsoFootnoteText">
<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftnref5" name="_ftn5" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></a>
See for example Solon Olivia (2017) Facebook asks users for nude photos in
project to combat 'revenge porn'. Published in <a href="https://www.theguardian.com/technology/2017/nov/07/facebook-revenge-porn-nude-photos">https://www.theguardian.com/technology/2017/nov/07/facebook-revenge-porn-nude-photos</a>
on November 7, 2017<o:p></o:p></div>
</div>
<div id="ftn6">
<div class="MsoFootnoteText">
<a href="file:///F:/doibi1/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/Faceapp/Faceapp%20and%20online%20harassment.docx#_ftnref6" name="_ftn6" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri",sans-serif; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></a> <span lang="EN-US">For more, see S.7 of the EU GDPR .
URL: </span><a href="https://gdpr-info.eu/art-7-gdpr/"><span lang="EN-US">https://gdpr-info.eu/art-7-gdpr/</span></a><span lang="EN-US"> Accessed on 17-08-2019<o:p></o:p></span></div>
</div>
</div>
<br />
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-84136420482226930652019-05-24T18:45:00.000-07:002019-05-24T18:45:15.468-07:00Mamata Banerjee, Priyanka Chopra and Aishwariya Rai : What bonds them together and why CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-RFXECnlOt5M/XOicPET4NuI/AAAAAAAAAhE/XU0MqVn8oz4n1n8Fp9ol7H1qsP_OXJEuwCLcBGAs/s1600/priyanka-chopra-1557425830.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="361" data-original-width="527" height="219" src="https://1.bp.blogspot.com/-RFXECnlOt5M/XOicPET4NuI/AAAAAAAAAhE/XU0MqVn8oz4n1n8Fp9ol7H1qsP_OXJEuwCLcBGAs/s320/priyanka-chopra-1557425830.jpg" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-1jIegUS_iNA/XOicRdk3KyI/AAAAAAAAAhI/jvsKpD2HpEwjPAajf46VNdVYoSwol4QsQCLcBGAs/s1600/download2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="168" data-original-width="300" src="https://1.bp.blogspot.com/-1jIegUS_iNA/XOicRdk3KyI/AAAAAAAAAhI/jvsKpD2HpEwjPAajf46VNdVYoSwol4QsQCLcBGAs/s1600/download2.jpg" /></a></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">On 14-05-2019 the Supreme Court of India created one
more example of broadening the freedom of speech when it ordered for the
immediate release of Priaynka Sharma, a BJP
activist. Sharma had allegedly posted a meme of Mamta Banerjee which contained
morphed picture of Mamata Banerjee on
Priayanka Chopra’s image that was taken
in Met Gala, 2019. Chopra was heavily trolled for her attire and make-up and
several people started created memes with Chopra’s picture. The Supreme Court on an appeal by the brother
of Sharma ordered for an immediate release of Sharma (who was arrested by the
West Bengal police) emphasizing the fact that she should apologies to Banerjee
because it has hurt her. The court also mentioned that freedom of speech cannot
be unfettered when it infringes other’s right.<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftn1" name="_ftnref1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></a>
As per the news reports, she was however
released after 24 hours.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">This is not the first time in India that someone got
arrested for ‘posting’ images/comments etc on social media which apparently
questions/defames/teases political personalities including members of the
ruling government party. After the
coming into effect of the amended version of
Information technology Act, 2000 (amended in 2008), S.66A (which prescribed
punishment for offensive, annoying etc. speech) has been over and again used by
the police to arrest individuals who had posted comments which apparently
questioned/ridiculed/defamed/teased political personalities. Before S.66A could
have been properly interpreted, <a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftn2" name="_ftnref2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 115%;">[2]</span></span><!--[endif]--></span></a>
the Supreme Court felt that the provision was being grossly misused for the ill
drafting and in Shreya Singhal vs Union of India, the apex court ruled it
unconstitutional. In the recent Mamata
Banerjee meme case, Supreme court stuck to its earlier understanding that no
arbitrary arrest may be made for posting contents on social media targeting
particular political personalities (including those in the ruling government
parties) because this hampers freedom of speech. Let me also state here that Banerjee has
sister -politician who had been ‘victims’ of memes : she is none other than
German chancellor Angela Merkel whose
latest memes appeared with Narendra Modi
when the BJP official website got hacked. There is rarely any information available
whether Merkel had made the police arrest the individuals who had been creating
or sharing the memes including the morphed images of Merkel. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">My concern here however does not cover the repetition
of the act of Mamata Banerjee government in arresting individuals targeting
political personalities including herself.
I look at the issue from two perspectives here: (i) morphing the image
of a woman and thereby creating/distributing/sharing the same as a
non-consensual image (and not nonconsensual pornography); (ii) who should be
ideally liable and under which law, and whether this issue attracts any legal
liablity or not. As the reports and
the image in question (which is still
available when we search with key words such <i>Mamata Banerjee meme</i> ) suggests , it was not one, but two women
were targeted : Priyanka Chopra, the original person in the image, who was
heavily trolled because of her Met Gala, 2019
attire and Mamata Banerjee,
whose face was morphed with the picture
of Priyanka Chopra . Priyanka Chopra has not yet filed any police complaint for
trolling; neither she has filed any complaint for morphing her picture. It was not the same case for Banerjee: she made it sure that the individual who
shared the image should get arrested
under several provisions of Information Technology Act, 2000 (amended in
2008) including S.500 of the Indian Penal Code which prescribes punishment for
defamation. The news reports however did not mention about the specific
provisions of IT Act under which she was arrested. Noticeably, neither
Information Technology Act, nor Indian Penal Code recognizes any offence of’ <b>‘morphing’</b>. The term does not find any
mention in any law. Further, the existing laws neither specifically focuses
attention for creation of <i>morphed </i>image of women for
damaging her reputation. However<i>,
cutting and pasting</i> of face is
holistically addressed under several laws including Indecent Representation of
women prevention Act (especially when the content is used to show case women in
an indecent manner), S.509 of the IPC (which prescribes punishment for word,
gesture, or any act made to insult the modesty of a woman), Ss66D( Punishment
for cheating by personation by using computer resource) 66E Punishment for
violation of privacy) etc, which may be coupled with Ss..</span><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">
</span><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">67 (Punishment for publishing or
transmitting obscene material in electronic form) or 67A ( Punishment for
publishing or transmitting of material containing sexually explicit act, etc.,
in electronic form), (this is especially when the image or related text
suggests sexual offences ) or S.354 C IPC (which prescribes punishment for
voyeurism targeting women). A minute scrutiny of these provisions may suggest
that they may loosely skirt around the
concept of anti-defamation law as well especially when the reputation of the
targeted victim is at stake due to the content
created/transmitted . <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">In this political memes targeting women (and
ridiculing them), one more celebrity woman Aishwarya Rai now joins with Mamata Banerjee and Priyanka Chopra. Rai was
featured in a meme created and shared by
another actor from the film industry who, the media reports suggest, had an
emotional bondage with Aishwarya Rai before she got married to her present
husband Abhishek Bacchan. Rai’s meme showcases not one , but three photos with texts which had been the center of
debate and ‘amusement’ for many. The first photo shows Rai with Salman Khan, a
prominent actor of Bollywood who had a relationship with Rai many years back
when she was a debutant in Bollywood. She reportedly came out of the
relationship because of physical abuses and harassment. This photo has a
caption which reads ‘opinion poll’. The next is with Vivek Oberoi, who has
allegedly created the meme. This has a caption which reads ‘exit poll’ and the
last in the line is Rai’s family photo with her husband and daughter, which
reads ‘result’. Noticeably, this meme attracted attention of many because this centered
around a celebrity woman actor who is supposed to be one of world’s most
beautiful women. She has been trolled many times earlier. But this is probably
the first time that she, her husband and
her minor daughter are pulled in for political meme. Oberoi was slammed by many
of his fellow Bollywood women actors who considered this as disgraceful,
classless, disgusting etc.<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftn3" name="_ftnref3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 115%;">[3]</span></span><!--[endif]--></span></a>
While accepting the fact that Rai is a favorite subject for trolls for many
years, what no one understood in this was, Rai’s daughter does not deserve this
as a child. Even though as a celebrity child, she and her mother had been trolled; could anyone understand how
her right to privacy and basic child rights have been violated ? That’s the
curse of being the daughter of a celebrity mother which follows all children of
all women celebrities including women actors, politicians, sports persons etc.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">As such, both Mamata Bannerjee , Priayanka Chopra and Aishwarya Rai could have availed
any of these laws mentioned above if they were <b><i>not</i></b> public figures and if
the photographs that had been the major issue here, had been their
personal photographs or it would have
been created specifically for sexual gratification which happens to most of the
women actors.<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftn4" name="_ftnref4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 115%;">[4]</span></span><!--[endif]--></span></a>
<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Then in that case, if the photographs were their personal
properties, could they have pursued the police for arrest? We have to turn our attention to chapter IV of
the Copyright Act, 1957 for this : three sub clauses of S.17 attract my
attention here which are as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">17. First owner of copyright.— Subject to the
provisions of this Act, the author of a work shall be the first<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">owner of the copyright therein:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Provided that—<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">(a) in the case of a literary, dramatic or artistic
work made by the author in the course of his<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">employment by the proprietor of a newspaper, magazine
or similar periodical under a contract of<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">service or apprenticeship, for the purpose of
publication in a newspaper, magazine or similar<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">periodical, the said proprietor shall, in the absence
of any agreement to the contrary, be the first<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">owner of the copyright in the work in so far as the
copyright relates to the publication of the work<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">in any newspaper, magazine or similar periodical, or
to the reproduction of the work for the<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">purpose of its being so published, but in all other
respects the author shall be the first owner of the<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">copyright in the work;<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"> </span></i><i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">(b) subject to the provisions of clause (a), in the
case of a photograph taken, or a painting or portrait<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">drawn, or an engraving or a cinematograph film made,
for valuable consideration at the instance of<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">any person, such person shall, in the absence of any
agreement to the contrary, be the first owner of<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">the copyright therein;<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">(c) in the case of a work made in the course of the
author’s employment under a contract of service or apprenticeship, to which
clause (a) or clause (b) does not apply, the employer shall, in the absence of
any agreement to the contrary, be the first owner of the copyright therein;<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Neither Priyanka
Chopra, nor Mamata Banerjee claimed that the photographs in question were their
personal photographs which they ‘owned’ as per Copyright Act. The photographs
were then properties of different persons or agencies who probably had captured
both the women with consent. Given this
fact, neither (especially Banerjee) may proceed to complaint for arresting
unless it has harmed her reputation or caused her financial loss or caused
grave threat. Here, we must note that the Supreme Court has very narrowly
touched upon the private sentiment of
Banerjee when it stated that such production and sharing of photograph
may have infringed her right (not any specific right, but understandably it was
largely right to reputation under Right to Life with dignity). But what the court failed to note here was
the liability of the website where it was published and shared. Websites like
Facebook however may not count this as impersonation (again we have to go back
to the understanding as who is ‘owner’ of the photograph) unless the image has been
used to grossly defame the person whose photo is involved. The websites would
neither recognize this as offensive if seen from the perspective of US laws of
Freedom of speech which is extremely broad. This has been the major concern for
many women victims of morphing, revenge porn and nonconsensual porn throughout
the world. In India the due diligence
clause under S. 79 of the Information Technology Act (exemptions from liability
of intermediary in certain cases) had been a major savvier for US based web companies like Facebook or
Twitter when it comes to liability of websites for offences including
generating /continuing the harassment of women for nonconsensual photographs. There is however one more solution from EU :
Article 13 of the EU directives on Copyright in the single market<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftn5" name="_ftnref5" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 14pt; line-height: 115%;">[5]</span></span><!--[endif]--></span></a>
which makes the websites liable for illegal hosting of contents if they do not
acquire license from the right holders of such contents. This means that the
third party liability in offensive and illegal content sharing becomes more
stringent as per the EU copyright Law. But in India such laws are not yet
implemented or executed. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">What we see from
the above discussion is, Supreme Court has yet again broadened the meaning of
freedom of speech, but failed to provide guidelines which may have strengthened
rights of women who may be victimized by way of morphing in general. The court
was in a hurry to undo the wrong of a political persona and the police who may
have acted under her direction. But failed to create a lasting (and impressive)
interpretation of laws which could have
saved millions of women victims of nonconsensual images.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">*<i><b><u>Please note : Please do not violate the copyright of this blog. If you need to share/use this blog for your writeup/project/story, please cite it as Halder.Debarati (2019)</u></b></i></span><i><b><u><span style="text-align: center;">Mamata Banerjee, Priyanka Chopra and Aishwariya
Rai </span><span style="text-align: center;"> </span><span style="text-align: center;">: What bonds them together and why. Published in </span><span style="font-family: Georgia, serif; font-size: 16pt;">http://debaraticyberspace.blogspot.com</span></u></b></i></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<span lang="EN-US"><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<br />
<div>
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1">
<div class="MsoFootnoteText">
<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftnref1" name="_ftn1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></a> <span lang="EN-US">Singh V.P. (2019) Mamta Banerjee
Meme: What For Did The SC Ask Priyanka Sharma To Apologise?<o:p></o:p></span></div>
<div class="MsoFootnoteText">
<a href="https://www.livelaw.in/columns/mamta-banerjee-meme-what-for-did-the-sc-ask-priyanka-sharma-to-apologise-145069"><span lang="EN-US">https://www.livelaw.in/columns/mamta-banerjee-meme-what-for-did-the-sc-ask-priyanka-sharma-to-apologise-145069</span></a><span lang="EN-US"> . Published on May 15, 2019<o:p></o:p></span></div>
</div>
<div id="ftn2">
<div class="MsoFootnoteText">
<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftnref2" name="_ftn2" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></a> See
Mamata Banerjee meme: SC grants bail to BJP worker Priyanka Sharma, asks her to
apologise after release. Published in <a href="https://www.indiatoday.in/elections/lok-sabha-2019/story/mamata-banerjee-meme-bjp-worker-bail-west-bengal-priyanka-supreme-court-1524467-2019-05-14%20%20%20on%20May%2014">https://www.indiatoday.in/elections/lok-sabha-2019/story/mamata-banerjee-meme-bjp-worker-bail-west-bengal-priyanka-supreme-court-1524467-2019-05-14 on May 14</a>, 2019. <span lang="EN-US"><o:p></o:p></span></div>
</div>
<div id="ftn3">
<div class="MsoFootnoteText">
<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftnref3" name="_ftn3" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></a> <span lang="EN-US">See ET online (2019)Vivek Oberoi
tweet Aishwarya Rai's meme; Sonam Kapoor, Jwala Gutta lash out at actor <o:p></o:p></span></div>
<div class="MsoFootnoteText">
<br /></div>
<div class="MsoFootnoteText">
<span lang="EN-US">Published
@//economictimes.indiatimes.com/articleshow/69413084.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
on May 21, 2019. Accessed on May 21, 2019<o:p></o:p></span></div>
</div>
<div id="ftn4">
<div class="MsoFootnoteText">
<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftnref4" name="_ftn4" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></a>
Halder D., & Jaishankar K. (2016) Celebrities and Cyber Crimes: An<o:p></o:p></div>
<div class="MsoFootnoteText">
Analysis of the Victimization of Female Film Stars on
the Internet. Temida<o:p></o:p></div>
<div class="MsoFootnoteText">
- The journal on victimization, human rights and
gender. 19(3-4), 355-372.<o:p></o:p></div>
<div class="MsoFootnoteText">
ISSN: 14506637<span lang="EN-US"><o:p></o:p></span></div>
</div>
<div id="ftn5">
<div class="MsoFootnoteText">
<a href="file:///F:/LEGAL%20ARTICLE/working%20papers/cybercrimearticles/proposed%20article/2019/nonconsensualpicturemorphng%20copyright%20aw/mamata%20banerjee%20meme.docx#_ftnref5" name="_ftn5" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></a> See
Art 13 in the DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL<o:p></o:p></div>
<div class="MsoFootnoteText">
on copyright in the Digital Single Market @ <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52016PC0593">https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52016PC0593</a>
<span lang="EN-US"><o:p></o:p></span></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-75760076594305291722019-04-29T04:09:00.001-07:002019-04-29T04:09:56.880-07:00WhatsApp reporting of women and child abuse videos: The common understanding versus the realityCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-cehlOItRS04/XMbYaRhM-ZI/AAAAAAAAAfo/DFBBQtxUV0kSCzW4qRiQvsx9Px0Jd2dXgCLcBGAs/s1600/whatsapp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="225" data-original-width="225" src="https://3.bp.blogspot.com/-cehlOItRS04/XMbYaRhM-ZI/AAAAAAAAAfo/DFBBQtxUV0kSCzW4qRiQvsx9Px0Jd2dXgCLcBGAs/s1600/whatsapp.jpg" /></a></div>
<div style="text-align: center;">
Image credit : Google</div>
<br />
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Couple of days ago my friend shared an alarming news
with me on Facebook about WhatsApp. It says that several cyber security think
tanks including Cyber Peace Foundation are now finding out how WhatsApp groups
are circulating child sexual abuse videos and how these contents are growing
viral.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> This
is not an uncommon incident now. In 2015 from Centre for Cyber Victim
Counselling, we had done an empirical research titled <b style="mso-bidi-font-weight: normal;">“Harassment via WhatsApp in Urban and Rural India: A Baseline Survey
Report (2015).<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></b></span><!--[endif]--></span></span></a></b>
This research was conducted in three cities namely Tirunelveli, Kolkata and
Delhi with responders from the age group of 19-40. Even though this research
did not include survey on WhatsApp groups , but it did emphasize on personal
harassment or receiving of the sexually explicit images, harassing videos of
others etc. Some of the findings of this report are as follows:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">32.8%
stated that they are aware of the safety tools in WhatsApp and 42.7% said they
feel it is safer than other internet communication services. 41.2% stated that
they were not aware of the safety tools and 13.7% stated that they don’t feel
that WhatsApp is safer than other internet communication services. 1.5% did not
want to tell about their knowledge of awareness regarding safety tools in
WhatsApp and 11.5% did not want to tell about their feelings whether WhatsApp
is safer than other internet communication services. 24.4% stated that they
have heard about the safety tools in WhatsApp but have no direct knowledge
about it. 32.1% stated that they have heard about other internet communication
services, but they do not have direct knowledge, whether WhatsApp is safer
because they do not use other services.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">In
answer to the question whether they had received any sexually explicit or
obscene images including videos/images of rape, sexual abuse of women or children
or men or LGBT people etc, among the 131 respondents, 11.5% stated that they
had received sexually explicit or obscene images, 51.9% stated they did not
receive such images and 2.3% did not want to answer. 34.4% stated that they are
not aware of being targeted with such images because they do not use WhatsApp
or have stopped using the services.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">This
suggests that WhatsApp had been a “chosen platform” by predators since long. <o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"><span style="mso-spacerun: yes;"> </span>But why
WhatsApp has become more dearer to predators than other social media websites
like Facebook or Instagram especially for those including pedophiliacs or
persons who<span style="mso-spacerun: yes;"> </span>create and circulate abusive
videos including sexual abuse videos of women <span style="mso-spacerun: yes;"> </span>? <span style="mso-spacerun: yes;"> </span>Let’s
have a reality check about WhatsApp here:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 200%; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">What is WhatsApp and how it works</span></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">: As we had mentioned in the research report, WhatsApp
messenger was started approximately in 2009 in the US by Jan Koumand Brian
Action as a “better SMS alternative” (WhatsApp, 2014) and it is available for iPhone,
Blackberry, Android, Windows phone, Nokia etc. This app uses the user’s phone number
as the basic verification mode and it does not support calls via VoIP
(Schrittwieser,Fr¨uhwirt, Kieseberg, Leithner, Mulazzani, Huber, & Weippl,
2014). Some of the basic features of WhatsApp include status update, profile
picture update, uploading of address book (Schrittwieser, et. al., 2014),
options to create/join groups (Terpstra, 2013), updates about location,
uploading and circulating photos and videos and voice recordings. Typically
WhatsApp verification may include a three stage procedure which involves (i)
logging on to the download page of WhatsApp @ https://www.whatsapp.com/download/
and clicking on the chosen device icon and start downloading; (ii) the server
then sends a 4-digit PIN number by SMS to the prospective user’s phone by SMS
for verification and authentication (Schrittwieser, et. al., 2014), (iii) the
user copies the code to the WhatsApp’s application graphical user interface
(GUI) and after cross checking by the WhatsApp server the app gets activated on
the phone of the user (Schrittwieser, et. al., 2014). Once connected with
WhatsApp, the user can get the information about other WhatsApp users by simply
checking his/her phone address book or call log history or Gmail address book.
This is because WhatsApp may access the user’s contact list or address book to
keep track of other mobile phone numbers who use the WhatsApp services and may
store this information on the server (WhatsApp, 2014, see sub- para B in Para
3) to get people connected instantly, profile pictures of other users and one
WhatsApp user may get instantly connected to others through the server.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn4" name="_ftnref4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">How do users create network on WhatsApp and how the
groups may be busted? <o:p></o:p></span></b></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">After downloading the app and activating the same, the
user may get connected to his friends or like minded people by doing a simple
search in his phone address book. Other numbers with WhatsApp applications may
show up. Users may choose to circulate their messages in several ways through
WhatsApp :<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 72.0pt; mso-add-space: auto; mso-list: l3 level1 lfo4; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">ü<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">By
using <b style="mso-bidi-font-weight: normal;">broadcasting feature</b> whereby a
single text/audio visual <span style="mso-spacerun: yes;"> </span>message may be
conveyed to a batch of people : The Boradcasting list may be created as below:<o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://3.bp.blogspot.com/-bBJl1LZBp9w/XMbYwO1ILoI/AAAAAAAAAfw/0BwPlZ_FFCMzRqu8Fv_19J-cbAi9W2hlACLcBGAs/s1600/whatsap%2Bbroadcasting.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="584" data-original-width="1251" height="149" src="https://3.bp.blogspot.com/-bBJl1LZBp9w/XMbYwO1ILoI/AAAAAAAAAfw/0BwPlZ_FFCMzRqu8Fv_19J-cbAi9W2hlACLcBGAs/s320/whatsap%2Bbroadcasting.JPG" width="320" /></a></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 72pt; text-align: center; text-indent: -18pt;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Image source : WhatsApp</span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 72.0pt; mso-add-space: auto; mso-list: l3 level1 lfo4; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">ü<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">By
forwarding the message to maximum five recipients at one time. Now, this “forwarding”
may reach a wider recipient list if it is done in a <b style="mso-bidi-font-weight: normal;">group</b>. <span style="mso-spacerun: yes;"> </span>WhatsApp group can be
created<span style="mso-spacerun: yes;"> </span>by any individual by going to
the chat tab and creating a new group. <o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-rWGM6PuU3Yo/XMbZy2pCZiI/AAAAAAAAAgA/gUj9m2U82u4SQaBC66B4Qs4L-jxWs1hQgCEwYBhgL/s1600/privacy%2Bgroups.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="582" data-original-width="935" height="199" src="https://1.bp.blogspot.com/-rWGM6PuU3Yo/XMbZy2pCZiI/AAAAAAAAAgA/gUj9m2U82u4SQaBC66B4Qs4L-jxWs1hQgCEwYBhgL/s320/privacy%2Bgroups.JPG" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
Image source: WhatsApp</div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Interestingly,
WhatsApp groups can be private or be public as well</span></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">. Most of the groups who circulate images /contents of
sexual abuse including <span style="mso-spacerun: yes;"> </span>for self-gratification
or group gratification, may keep their group <b style="mso-bidi-font-weight: normal;">private</b> so that the group may not be disturbed by any 3<sup>rd</sup>
party monitoring authority including the police. These group members generally
may have a mutual understanding and trust whereby the contents shared by them
would not be reported outside. <span style="mso-spacerun: yes;"> </span>The
members may necessarily download /save the sexual abuse/harassment
videos/contents in their own devices<span style="mso-spacerun: yes;"> </span>for
individual gratification or for unethical gaining by further circulation as
well. The end to end encryption by WhatsApp may make it more favorable for such
group members to widely discuss and circulate such contents. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Public
groups</span></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"> on the other
hand are more open groups where people may join for discussions and it may not
necessarily private for those whom the admin/s have invited or made them join. Unlike
the private groups, public groups may be monitored if any <span style="mso-spacerun: yes;"> </span>third party monitoring authority joins the
discussion in disguise or any other group member decides to bring in the police
or other monitoring stakeholders. In both these cases, admin’s responsibilities
have been scrutinized by courts in India. The recent report suggests that the courts
have held<span style="mso-spacerun: yes;"> </span>responsible for allowing to
spread seditious, inciting messages.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn5" name="_ftnref5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a> <span style="mso-spacerun: yes;"> </span>WhatsApp group members and admins have also
been booked for creating /circulating child sexual abuse materials for sexual
gratification.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn6" name="_ftnref6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">What if the group admin is an underage user?<o:p></o:p></span></b></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">It is important to know the age barrier about WhatsApp
users. There are infact not two, but three options given by WhatsApp. Lets check
it:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l2 level1 lfo3; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-fareast-font-family: "Times New Roman";"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">The
minimum age criterion for European region including European Union countries is
16.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l2 level1 lfo3; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-fareast-font-family: "Times New Roman";"><span style="mso-list: Ignore;">2.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">For
other countries the, the minimum age criteria is 13 unless the domestic laws of
the said countries have fixed a higher age for using of WhatsApp.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn7" name="_ftnref7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[7]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l2 level1 lfo3; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-fareast-font-family: "Times New Roman";"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Overlooking
both, a child can use the WhatsApp services of the parents if the parent allows
the child to use the services under his/her monitoring. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">This in fact shows that a
child may use WhatsApp, may create his/her own profile and may create contents
him/herself for private or public sharing on WhatsApp with whoever he/she
wants.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoListParagraph" style="line-height: 200%; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">What happens to the producer/distributor of the offensive
contents?<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">In broader understanding,
the child is legally permitted to create content<span style="mso-spacerun: yes;"> </span>which he/she thinks can be circulated. Now,
this has been a question for several courts : when a child is creating a sexting
content and circulating the same with fellow children (including his/her
boy/girl friend ), <span style="mso-spacerun: yes;"> </span>how the courts (and
the laws )would treat him/her ? Is he the perpetrator? Is he the victim? Or is
he a ‘child’ with no liabilities?<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn8" name="_ftnref8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[8]</span></span><!--[endif]--></span></span></a> <b style="mso-bidi-font-weight: normal;">S.67B of the Information technology Act,
2000(amended in 2008), Ss. 13 and 14 of the Protection of children from sexual
offences Act, 2012 clearly mention that “whoever’ creates, circulates, produces
etc<span style="mso-spacerun: yes;"> </span>contents depicting children in
sexually contents may be penalized. These cane be considered non-baliable, which
would suggest that the punishment can be heavier. <span style="mso-spacerun: yes;"> </span>Similarly, Ss. 67 and 67A of the Information Technology
Act, 2000(amended in 2008) also penalizes ‘anyone’ who creates, distributes
etc<span style="mso-spacerun: yes;"> </span>sexually explicit and obscene
materials. S. 354C of the Indian Penal Code also touches upon penalizing men
who<span style="mso-spacerun: yes;"> </span>private images of woman who would
not consent for sharing such contents with third parties . S.375 and 376 of the
Indian penal Code also touches upon capturing rape videos and storing or
circulating the same. These offences can also be non-bailable and can have
heavier punishments. <o:p></o:p></b></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">The contents that the children would have created also carries
significance</span></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">: if a
child creates a sexting video or sexual abuse video or a non consensual porn
image/content or<span style="mso-spacerun: yes;"> </span>even a revenge porn content
and sends it to his friend/s, the recipient may decide not to receive the
content if from the look at the content or the text attached with it, the recipient
feels that it should not be opened or should not be further circulated because
it contains ‘bad stuff’.<span style="mso-spacerun: yes;"> </span>WhatsApp is
smart enough to have created limited policy guideline and security feature
whereby one can report his/her child who may be using WhatsApp without parental
guidance<span style="mso-spacerun: yes;"> </span>and the parents feel that the
child may be doing /victimized due to illegal /risky contents and
connections.<span style="mso-spacerun: yes;"> </span>It says <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">“If your underage child created a WhatsApp account, you can show them
how to delete their account. You can learn how to delete an account in our Help
Center.If you'd like to report an account belonging to someone underage, please
send us an email. In your email, please provide the following documentation and
redact or hide any unrelated personal information:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Proof of ownership of the WhatsApp number (e.g., copy of
government-issued identification card and phone bill with the same name)<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Proof of parental authority (e.g., copy of birth or adoption certificate
for the underage child)<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Proof of child's date of birth (e.g., copy of birth or adoption
certificate for the underage child)<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">We'll promptly disable the WhatsApp account if it's reasonably
verifiable that the account belongs to your underage child. You won't receive
confirmation of this action. Our ability to review and take appropriate action
on a report significantly improves with the completeness of the information
requested above.</span></i><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"> “<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn9" name="_ftnref9" style="mso-footnote-id: ftn9;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[9]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Removal /deactivating of the
said account is however at the discretion of WhatsApp especially when they
would not be reasonably convinced .<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">But in case the reporting
individual is <b style="mso-bidi-font-weight: normal;">not the parent</b> of the
child who may be doing illegal stuff <span style="mso-spacerun: yes;"> </span>or
who may be a potential victim, WhatsApp suggests to contact the parents of the
child. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">For adult wrong doers</span></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">,
WhatsApp has a typical formula which is followed by almost all social media
companies : they would suggest to block the number so that the user of that
particular number would not be able to contact the blocker<span style="mso-spacerun: yes;"> </span>unless the earlier is being unblocked . Here
is what WhatsApp suggests regarding how to block a number:<o:p></o:p></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-xFAq9_fwvh8/XMbarCYvSsI/AAAAAAAAAgQ/A2HXo_Go4RUI6JIO6nwUA-6qMs4Zz_MAACLcBGAs/s1600/whatsappblock.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="521" data-original-width="707" height="235" src="https://2.bp.blogspot.com/-xFAq9_fwvh8/XMbarCYvSsI/AAAAAAAAAgQ/A2HXo_Go4RUI6JIO6nwUA-6qMs4Zz_MAACLcBGAs/s320/whatsappblock.JPG" width="320" /></a></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36pt; text-align: center;">
<span style="font-family: Times New Roman, serif;"><span style="font-size: 18.6667px;">Image source: WhatsApp</span></span></div>
<div class="MsoListParagraph" style="line-height: 200%; mso-list: l1 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: Wingdings; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";">
</span></span></span><!--[endif]--><b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">The producer/distributor of the offensive content has
been arrested. What about the offensive image?<o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">The above information would
not serve much purpose for blocking /reporting of the content unless the same
is considered as an offending <span style="mso-spacerun: yes;"> </span>subject through
a police report. In such case, the said content may be made disabled from their
own server, but they would rather work like email or SMS and would not access individual
devices to dig out the offensive content to block and disable it. In such case,
even if the persons (owning the WhatsApp numbers and profiles) may be blocked, <b style="mso-bidi-font-weight: normal;">the contents may keep on circulating</b>
unless these have been ‘ordered ‘ to be disabled from the server.<span style="mso-spacerun: yes;"> </span>This is how the objectionable contents float
from one device to another and reach out to millions after the original sender
may have deleted from his device to save himself or he may have been arrested
by the police.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-left: 36.0pt; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Nothing but a police report or a court order about the said content therefore could be the best answer for blocking the
content from being further circulated. But a few things can not be ignored when
this is suggested: the police must act accordingly to make WhatsApp delete the
content from its server and block the circulation whenever it appears on
WhatsApp from which ever device. But this may become a herculean task especially
when the police and the courts <span style="mso-spacerun: yes;"> </span>may
feel<span style="mso-spacerun: yes;"> </span>challenged due to lack of
infrastructure and proper laws. As long as this does not take place, WhatsApp
users have to be responsible enough to not to circulate such contents even if
they receive it from known or unknown numbers. Not to be forgotten, the police
may arrest individuals who may store child sexual harassment videos /images
unknowingly as well. But the unfortunate fact is this may not be the same for
adult sexual abuse cases. But if the users use WhatsApp responsibly, the problem
may definitely be address.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: 36.0pt;">
<span lang="EN-US" style="mso-ansi-language: EN-US;"><br /></span></div>
<div class="MsoNormal" style="margin-left: 36.0pt;">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Please note : Do not violate copyright of this
blog. If you would like to use information provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2019),
"</span><span lang="EN-US"> </span><span lang="EN-US" style="mso-ansi-language: EN-US;">WhatsApp reporting of women and child abuse videos:<span style="mso-spacerun: yes;"> </span>The common understanding vs the reality”<span style="mso-spacerun: yes;"> </span>29<sup>th</sup> April, 2019 , published in
http://debaraticyberspace.blogspot.com<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: 36.0pt;">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">Cuthbertson Anthony (2019). WHATSAPP
IS HOTBED FOR CHILD SEX ABUSE VIDEOS IN INDIA, STUDY FINDS. Published in <a href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-child-sex-abuse-videos-groups-india-a8885811.html?fbclid=IwAR251ajPe20Y7zcXtD2o1s0w--86-Pr5UrKHVgv7IF_7swAH_dvEGQTzcZQ">https://www.independent.co.uk/life-style/gadgets-and-tech/news/whatsapp-child-sex-abuse-videos-groups-india-a8885811.html?fbclid=IwAR251ajPe20Y7zcXtD2o1s0w--86-Pr5UrKHVgv7IF_7swAH_dvEGQTzcZQ</a>
on 26<sup>th</sup> April, 2019. Retrieved on 26<sup>th</sup> April, 2019<o:p></o:p></span></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a> Halder,
D., & Jaishankar, K. (2015). Harassment via WhatsApp in Urban<o:p></o:p></div>
<div class="MsoFootnoteText">
and Rural India: A Baseline Survey Report (2015).
Tirunelveli, India:<o:p></o:p></div>
<div class="MsoFootnoteText">
Centre for Cyber Victim Counselling. Available @ <a href="https://www.cybervictims.org/CCVCresearchreport2015.pdf">https://www.cybervictims.org/CCVCresearchreport2015.pdf</a>
Retrieved on 27.04.2019<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">Ibid <o:p></o:p></span></div>
</div>
<div id="ftn4" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref4" name="_ftn4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a> See
pp 2 in ibid<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn5" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref5" name="_ftn5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See WhatsApp ‘admin’ spends five
months in an Indian jail. Published in <a href="https://www.bbc.com/news/technology-44925166">https://www.bbc.com/news/technology-44925166</a>
Accessed on 22.04.2019<o:p></o:p></span></div>
</div>
<div id="ftn6" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref6" name="_ftn6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[6]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See Sandhya Nair (2018) WhatsApp
group sharing child porn busted, 5 held <o:p></o:p></span></div>
<div class="MsoFootnoteText">
<span lang="EN-US" style="mso-ansi-language: EN-US;">Published
in <a href="http://timesofindia.indiatimes.com/articleshow/65263327.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst">http://timesofindia.indiatimes.com/articleshow/65263327.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst</a>
Accessed on 22.04.2019<o:p></o:p></span></div>
</div>
<div id="ftn7" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref7" name="_ftn7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[7]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For more information see https://faq.whatsapp.com/en/general/26000151/?category=5245250<o:p></o:p></span></div>
</div>
<div id="ftn8" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref8" name="_ftn8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[8]</span></span><!--[endif]--></span></span></a> Halder,
D., & Jaishankar. (2013). Revenge Porn by Teens in the United<o:p></o:p></div>
<div class="MsoFootnoteText">
States and India: A Socio-legal Analysis.
International Annals of<o:p></o:p></div>
<div class="MsoFootnoteText">
Criminology, 51(1-2), 85-111. ISSN: 00034452 (UGC
Listed Journal)<o:p></o:p></div>
<div class="MsoFootnoteText">
<br /></div>
</div>
<div id="ftn9" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref9" name="_ftn9" style="mso-footnote-id: ftn9;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[9]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See</span><span lang="EN-US"> </span><span lang="EN-US" style="mso-ansi-language: EN-US;">https://faq.whatsapp.com/en/general/26000151/?category=5245250<o:p></o:p></span></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-90442021512180819052019-04-23T11:43:00.000-07:002019-04-23T11:43:10.192-07:00The TikTok ban : Why the ban may fail to prevent online victimization of women CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-93JekJIxsEc/XL9b6mS97JI/AAAAAAAAAfE/oo8zpVuyNTweCvjqoigDlaJfXQCN62RZgCLcBGAs/s1600/tik%2Btok%2Blogo_resources1-medium.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="405" data-original-width="540" height="240" src="https://1.bp.blogspot.com/-93JekJIxsEc/XL9b6mS97JI/AAAAAAAAAfE/oo8zpVuyNTweCvjqoigDlaJfXQCN62RZgCLcBGAs/s320/tik%2Btok%2Blogo_resources1-medium.jpg" width="320" /></a></div>
<br />
<h4 style="line-height: 200%; text-align: center;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">Image credit: Google </span></h4>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">On 24<sup>th</sup> April Madras High court would
decide on the plea of Bytedance, which owns TikTok regarding the much talked
about ban of the app. Tik Tok, , a nongaming app launched in 2019 has given a tough
competition in regard to its popularity to all the social media giants because
of the unique features <span style="mso-spacerun: yes;"> </span>which allows
users to create and share short videos with special effects. Teenagers and
adults <span style="mso-spacerun: yes;"> </span>in India loved the app because
unlike other social media platforms including YouTube, TikTok has simple
features to upload and publish videos. Unlike PubG however, this did not
necessarily have gaming features. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">In early April, 2019, the Madurai bench of Madras High
court had in an interim order directed the government stakeholders in the State
and Centre to ban the video app TikTok as the Public Interest Litigation in
this regard emphasized that it encourages pornography and underage users are vulnerable
to be exposed to sexually explicit contents, pornography etc, which may not be
good for their mental and physical health.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> Incidentally
the Madurai Bench of the Madras High court was the first court in India to take
<i style="mso-bidi-font-style: normal;">suo motu </i>cognizance in BlueWhale game
case and asked the Central government and the social media website, web
companies like Google etc to monitor what is being generated and catered to the
users through their platform.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
But in this case, the situation stands on a different platform: consequent to
the interim order, Google and Apple removed TikTok app <span style="mso-spacerun: yes;"> </span>from their Play Stores. <span style="mso-spacerun: yes;"> </span>Resultant, Bytedance had incurred huge loss.
But the later has now challenged this interim order on the ground that the
interim order was passed on the basis of ex parte hearing. The company had
stated that the app allows users to create videos and circulate them for fun
and amusement and it does not pose any threat to security of individuals.
Bytedance also stated that such bans are against right to speech and
expression.<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">We can see here two important points: <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><u><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">First</span></u></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;"> : before the governments took prohibitory actions
(like what happened for PubG ban in Gujarat, where police started arresting
those who downloaded and played PubG even after the ban order was conveyed to
the public)<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn4" name="_ftnref4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a>,
Web company like Google <span style="mso-spacerun: yes;"> </span>and phone and
software manufacturing company Apple had followed the mandates of S.79
(exemption of liability of intermediary in certain cases) and Rule 3 of<span style="mso-spacerun: yes;"> </span>Information technology (Intermediaries
guidelines) Rule, 2011 : specially mentionable are Rules 3(3) and 3(4) which
states as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">Rule 3(3) states that <i style="mso-bidi-font-style: normal;">The intermediary shall not knowingly host or publish any information or
shall not initiate the transmission, select the receiver of transmission, and
select or modify the information contained in the transmission as specified in
sub-rule (2): provided that the following actions by an intermediary shall not
amount to hosing, publishing, editing or storing of any such information as
specified in sub-rule: (2) — (a) temporary or transient or intermediate storage
of information automatically within the computer resource as an intrinsic
feature of such computer resource, involving no exercise of any human editorial
control, for onward transmission or communication to another computer resource;
(b) removal of access to any information, data or communication link by an
intermediary after such information, data or communication link comes to the
actual knowledge of a person authorised by the intermediary pursuant to any
order or direction as per the provisions of the Act;<o:p></o:p></i></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">And Rule 3(4) of the above rule states <i style="mso-bidi-font-style: normal;">The intermediary, on whose computer system
the information is stored or hosted or published, upon obtaining knowledge by
itself or been brought to actual knowledge by an affected person in writing or
through email signed with electronic signature about any such information as
mentioned in sub-rule (2) above, <b style="mso-bidi-font-weight: normal;">shall
act within thirty six hours</b> and where applicable, work with user or owner
of such information to disable such information that is in contravention of
sub-rule (2). <b style="mso-bidi-font-weight: normal;">Further the intermediary
shall preserve such information and associated records for at least ninety days
for investigation purposes.<o:p></o:p></b></i></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">These companies apparently did not want to invite any
more troubles like the past when they were repeatedly called by the court to
explain why they had not taken any action to block and ban contents and
materials victimizing children which are regularly shared through their
platforms. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">Second:
</span></b><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">Bytedance, the
parent company of TikTok has alleged that they were not heard by the court
before pronouncing the ban order. Apparently, they may become the first web company
to stress upon the point as why they should be banned when they have their
flagging system and they do take care of the contents that are flagged. This
case would make a history in India where the court has taken a decision
influenced by the happenings of the past, and the concerned web company
promises to break the glass ceiling because they know this is not the end. While
many information as how to use (activate/download) TikTok without Google/Apple
Play stores have started surfacing on internet,<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftn5" name="_ftnref5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a> my
concern is not how the app may or may not be downloaded legally or illegally. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">Exposing children to
pornography, using women as items of sexual gratification, grooming, creating “dangerous
contents” which may cause damage to public health, online victimization of
women and children etc would not stop if one video creating and sharing app is
banned. In that case, the courts must also consider picking up social media
giants Facebook, Twitter, YouTube, Instagram etc, and search engines like
Google for banning them because of their constant failure to monitor misogynist,
sexist, child abusive contents. All social media companies including YouTube
have data mined several images, contents and marked them as adult specific. Several
videos are not available unless the users verify their age. But how will you
search the needle in the hey stack? The courts could not yet make strict
regulations for virtual age verification by the web companies. The web
companies (hosted in US and other countries) are confused about the law
relating to pornography because India does not have any focused law defining pornography
still now. Further, the web companies also do not accept all contents (which
are alleged to be porn as per Indian understanding) as offensive because the
ever expanding free speech and expression jurisprudence of the US does not
allow the web companies to take down the contents unless it is gravely
threatening to the physical and virtual privacy <span style="mso-spacerun: yes;"> </span>and security of the person concerned or
damages the reputation of the woman (in case the victim is a woman). Children can
still be exposed to online dangers through Facebook, Instagram or YouTube.
Women are continued to be victimized through all pockets of internet. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 18.0pt; line-height: 200%; mso-ansi-language: EN-US;">As such, there may be practically
no solution for this and ban would encourage more law breaking. Google and
Apple had already shown that they are willing to follow the local laws (or
rather, not to fall in any legal tangles regarding web service providers
liability). It is expected that India creates focused laws to address different
emerging and existing types of online victimization and the same are implemented
in proper way. Otherwise, the orders of banning may lead to ground ZERO.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<br /></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<span lang="EN-US" style="font-family: "Times New Roman","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US;">Please note : Do not violate copyright of this blog.
If you would like to use information provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2019), "The
TikTok ban : Why it may fail to prevent online victimization of women” <span style="mso-spacerun: yes;"> </span>23<sup>rd</sup> April, 2019 , published in
http://debaraticyberspace.blogspot.com<o:p></o:p></span></div>
<div class="MsoNormal" style="text-indent: 36.0pt;">
<br /></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For more, see J.Sam Daniel (2019).
Ban TikTok, Its encouraging pornography : Madras High court to Centre.
Published in NDTV on April 4, 2019. URL <a href="https://www.ndtv.com/india-news/madras-high-court-directs-centre-to-prohibit-downloading-of-tik-tok-app-2017482">https://www.ndtv.com/india-news/madras-high-court-directs-centre-to-prohibit-downloading-of-tik-tok-app-2017482</a>
Accessed on 12.04.2019<o:p></o:p></span></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a> Halder,
D.(2018) The #Bluewhale challenge to the Indian judiciary: A<o:p></o:p></div>
<div class="MsoFootnoteText">
critical analysis of the response of the Indian higher
judiciary to risky<o:p></o:p></div>
<div class="MsoFootnoteText">
online contents with special reference to Bluewhale
Suicide game. In<o:p></o:p></div>
<div class="MsoFootnoteText">
Sourdin Tania & Zariski Archie (eds.), The
responsive judges. USA:Springer <span style="mso-spacerun: yes;"> </span>ISBN no.
978-981-13-1022-5 <span style="mso-spacerun: yes;"> </span>pp 259-276.<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See <span style="mso-spacerun: yes;"> </span>Live law news network (2019).</span><span lang="EN-US"> </span><span lang="EN-US" style="mso-ansi-language: EN-US;">TikTok Ban
: SC Says Ban Will Stand Lifted If Madras HC Fails To Decide On Interim Order
By April 24. Available @https://www.livelaw.in/top-stories/tiktok-ban-sc-says-ban-will-stand-lifted-if-madras-hc-fails-to-decide-on-interim-order-by-april-24-144438
. Publshed in on 22<sup>nd</sup> April, 2019. <span style="mso-spacerun: yes;"> </span>Accessed on 23<sup>rd</sup> April, 2019<o:p></o:p></span></div>
</div>
<div id="ftn4" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref4" name="_ftn4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[4]</span></span><!--[endif]--></span></span></a> See
Ahaskar Abhijit (2019). Why playing PUBG Mobile can get you arrested in Gujarat.
Published in <a href="https://www.livemint.com/news/india/why-playing-pubg-mobile-can-get-you-arrested-in-gujarat-1552849965539.html">https://www.livemint.com/news/india/why-playing-pubg-mobile-can-get-you-arrested-in-gujarat-1552849965539.html</a>
on 18th March, 2019. Accessed on 12.04.2019<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn5" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/whatsapp%20reporting.docx#_ftnref5" name="_ftn5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[5]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For example, see SC hearing on
TikTok: Why it is difficult to ban the app in India. Published in <a href="https://www.businesstoday.in/technology/internet/tiktok-ban-after-madras-hc-decision-reality-banned-apps-tiktok-pubg/story/339286.html%20%20%20on%20April%2022">https://www.businesstoday.in/technology/internet/tiktok-ban-after-madras-hc-decision-reality-banned-apps-tiktok-pubg/story/339286.html
<span style="mso-spacerun: yes;"> </span>on April 22</a>, 2019. Accessed on
22.04.2019<o:p></o:p></span></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-57920153183060352942019-03-12T06:51:00.001-07:002019-03-13T05:16:01.090-07:00Duping women in the name of matured friendship: The Pollachi sextortion caseCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Couple of days back I received a friends request on
FaceBook from a male profile whom I do not know either personally or through
any of my networks. But the profile was apparently very impressing : the man
was an alumni of Oxford University , works in Mercedes Benz company and he is
better looking than the average. From my
experience as a cybercrime victim counsellor , lawyer and a cyber right
activist for more than a decade now I
could understand that this may be one of many fake profiles that are created to
allure women (and not necessarily young
girls) to trap them and victimize them through online and offline crimes including
sexual crimes. It is an obvious phenomena now that women, especially educated
women are using social media like Facebook, Twitter, LinkedIn etc for expanding
their network for various purposes including
Job searching, getting connected with like-minded people, expanding their
research network , volunteering for social causes etc. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">In the recently held #Webwonderwomen award ceremony in
Delhi, the Ministry of Women and Child affairs awarded 30 women including myself
the <a href="https://www.ndtv.com/india-news/centre-honours-30-web-wonder-women-for-driving-reforms-via-social-media-2003833" target="_blank">#Webwonderwomen </a>award for positively using social media (especially
Twitter), spreading awareness about the social causes they are working on and
their real life support for women empowerment all across India. It was a joint
initiative of Ministry of Women and Child affairs, Twitter and Breakthrough India.
My fellow awardees work in different fields of public health, women’s health, right
to breast feeding, women empowerment, journalism especially for the causes of
women, proper nutrition for women, education for women and girls especially in
socio-economically backward sectors of the society, empowering women of all age
group from socio-economically backward sectors <span style="mso-spacerun: yes;"> </span>about their rights against domestic violence,
sexual reproduction rights etc.<span style="mso-spacerun: yes;"> </span>All of
them could actually make their journey stronger because of positive use of
social media. I too have been using Facebook, Twitter, LinkedIn etc<span style="mso-spacerun: yes;"> </span>to get connected with <span style="mso-spacerun: yes;"> </span>people who have become my knowledge partners,
mentors and friends in the field of law and policy especially for Cyber
Victimology, Cyber law for women, Cyber Criminology, Revenge Porn, Non
consensual porn,<span style="mso-spacerun: yes;"> </span>Women’s Rights, Child
Rights, Criminal law, Penology, Therapeutic Jurisprudence<span style="mso-spacerun: yes;"> </span>etc.<span style="mso-spacerun: yes;">
</span>It would not have been possible for me reach to the world about my work including
my pro bono work without social media and the friends that I have made. I
consider myself privileged to have 24 hours <span style="mso-spacerun: yes;"> </span>access to internet<span style="mso-spacerun: yes;"> </span>and a platform where I can share my opinion
bravely, gather information without any fear and build a reputation.<span style="mso-spacerun: yes;"> </span>Some of my fellow awardees <span style="mso-spacerun: yes;"> </span>could win this award staying in remote places
because they are well connected with the world through internet and social
media.<span style="mso-spacerun: yes;"> </span>Internet as such has given a
platform to earn money in a positive way too. Consider thousands of women who
make daily/weekly/monthly <span style="mso-spacerun: yes;"> </span>Vlogs and
upload it on Youtube . They have their recognition as “Youtuber” and YouTube
duly recognizes their “popularity” (marketability) by awarding and rewarding them.
<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">But still then, internet is <i style="mso-bidi-font-style: normal;">not safe</i> for women.<span style="mso-spacerun: yes;"> </span>The Pollachi
case proved it again. <span style="mso-spacerun: yes;"> </span>Pollachi is the
second largest town in Coimbatore district in Tamil Nadu. <span style="mso-spacerun: yes;"> </span>This place is famous for its world famous jaggery<span style="mso-spacerun: yes;"> </span>market and beautiful lush green agricultural
fields. One would actually not imagine that this can be a center for news on
cyber crimes against women, but it has now surfaced because of a brave young
woman who had lodged a complaint against <span style="mso-spacerun: yes;"> </span><i style="mso-bidi-font-style: normal;">the<span style="mso-spacerun: yes;"> </span>smart gang of men</i> who had been “enjoying”
sex by way of connecting with women through fake profiles (mostly of women),
grooming them to enter into chats and sharing more details, turning the chats
into typical sex chats and then alluring them to come and meet in person. In my
book Cyber crimes against women in India (coauthored with <span style="mso-spacerun: yes;"> </span>prof(Dr) Jaishankar, Halder D., &
Jaishankar K. (November 2016). Cyber Crime against Women in India. New Delhi:
SAGE. ISBN: 978-93-859857-7-5.) I had discussed about such kinds of grooming
and consequent victimization of women and this can be shown through the flow
chart as below: <o:p></o:p></span></div>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://4.bp.blogspot.com/--x5QFZttC-M/XIe2CWMhB7I/AAAAAAAAAeI/t8Nap-jM03AVpMGiJ6q3t23IIVX4tuocgCLcBGAs/s1600/Picture1flowchart.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" data-original-height="742" data-original-width="1350" height="218" src="https://4.bp.blogspot.com/--x5QFZttC-M/XIe2CWMhB7I/AAAAAAAAAeI/t8Nap-jM03AVpMGiJ6q3t23IIVX4tuocgCLcBGAs/s400/Picture1flowchart.jpg" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Image created by Dr.Debarati Halder </td></tr>
</tbody></table>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>This brave
woman was sexually harassed , molested and assaulted when she went to meet the
so called ‘friends’, who had been doing this to many women, recording their sexual
assault in their phones and threatening them to leak the clippings if they dare
to refuse their demands or to go to the police. The police has now arrested all
the four members of the gang applying provisions including Ss. 354A, B of the
Indian Penal Code , S.66E of the Information technology Act and S.4 of the <span style="mso-spacerun: yes;"> </span>Tamil Nadu Prohibition of harassment of women’s
Act. <a href="file:///E:/ccvc/blogwomen/blog2019/pollachi%20case.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></span></a>.
Let us see what do these provisions say and whether <span style="mso-spacerun: yes;"> </span>these Sections may play a pivotal role in
delivering justice to women victims such as this brave heart:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">S. 354A of the IPC says <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(1) “A man committing any of the following acts—<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(i) <span style="mso-spacerun: yes;"> </span>physical
contact and advances involving unwelcome and explicit sexual overtures; <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(ii) or a demand or request for sexual favours; <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(iii)or showing pornography against the will of a
woman; <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(iv) or making sexually coloured remarks, shall be
guilty of the offence of sexual harassment.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(2) Any man who commits the offence specified in
clause (i) or clause (ii) or clause (iii) of sub-section (1) shall be punished
with rigorous imprisonment for a term which may extend to three years, or with
fine, or with both.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Any man who commits the offence specified in clause
(iv) of sub-section (1) shall be punished with imprisonment of either description
for a term which may extend to one year, or with fine, or with both.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">S.354 B of the Indian Penal Code states that <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">“Any man who assaults or uses criminal force to any
woman or abets such act with the intention of disrobing or compelling her to be
naked, shall be punished with imprisonment of either description for a term which
shall not be less than three years but which may extend to seven years, and
shall also be liable to fine.”.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">S.66E of the Information technology Act 2000 (amended
in 2008) states as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;"> Punishment for violation of privacy. -Whoever,
intentionally or knowingly captures, publishes or transmits the image of a
private area of any person without his or her consent, under circumstances
violating the privacy of that person, shall be punished with imprisonment which
may extend to three years or with fine not exceeding two lakh rupees, or with
both. Explanation. -For the purposes of this section-<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(a) "transmit" means to electronically send
a visual image with the intent that it be viewed by a person or persons;<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(b) "capture", with respect to an image,
means to videotape, photograph, film or record by any means;<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(c) "private area" means the naked or
undergarment clad genitals, pubic area, buttocks or female breast;<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(d) "publishes" means reproduction in the
printed or electronic form and making it available for public; e) "under
circumstances violating privacy" means circumstances in which a person can
have a reasonable expectation that;-<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(i) he or she could disrobe in privacy, without being
concerned that an image of his private area was being captured; or<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">(ii) any part of his or her private area would not be
visible to the public, regardless of whether that person is in a public or
private place.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Section 4 of the Tamil Nadu Prohibition of Harassment
Act states as follows: <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Penalty for harassment of woman: Whoever commits or
participates in or abets harassment of woman in or within the precincts of any
educational institution, temple or other place of worship, bus stop, road,
railway station, cinema theatre, park, beach, place of festival, public service
vehicle or vessel or any other place shall be punished with imprisonment for a
term which may extend to three years and with fine which shall not be less than
ten thousand rupees."<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Noticeably, this provision may have been used for punishing the accused for committing the crime in the "specific place"; for secluding the victim from her 'comfort zone' where she could have raised an alarm for help and committing the crime in a place which may be a public place or a moving vehicle from where the victim may not escape easily. </span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">The other news report suggested that the District
Collector had ordered for detention of the accused under Goondas Act
(officially known as Tamil Nadu Prevention of<span style="mso-spacerun: yes;">
</span>Dangerous Activities of Bootleggers, Drug offenders, Goondas, Immoral
traffic offenders, Sand offenders, Slum grabbers, and Video pirates Act, 1985)
.<a href="file:///E:/ccvc/blogwomen/blog2019/pollachi%20case.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 115%;">[2]</span></span><!--[endif]--></span></span></a>
In my earlier blog I had explained how Goondas Act can be relevant in cyber
offences by stating that this law can be very relevant especially where crimes including
committing or attempting to commit extortion of money , threatening for the
same, cheating, etc are involved.<a href="file:///E:/ccvc/blogwomen/blog2019/pollachi%20case.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 115%;">[3]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">However, I have not seen any news report indicating
that S.67A of the Information Technology Act (amended in 2008) was used for
booking of the offences or not. This Section speaks about<span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span>Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic form and says “Whoever
publishes or transmits or causes to be published or transmitted in the
electronic form any material which contains sexually explicit act or conduct
shall be punished on first conviction with imprisonment of either description
for a term which may extend to five years and with fine which may extend to ten
lakh rupees and in the event of second or subsequent conviction with
imprisonment of either description for a term which may extend to seven years
and also with fine which may extend to ten lakh rupees”. It does not
necessarily speak about creating such content by clicking the images and this
has to be inferred from the provision itself. However, this lacuna has been
partly covered by S.66E of the Information technology Act which speaks about
violating the privacy of any individual. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Clearly, this is <b>not </b>a case of <b><i>revenge porn,</i></b> but a
case of <b><i>non consensual porn</i></b> especially when the accused persons would have
stored the clipping of sexual assault of the woman concerned with an intention of visual sexual gratification through the clipping/s and also to use it for future threatening or creating/producing sexually explicit contents on internet . But unfortunately
the laws are still handicapped in this regard when it comes to grooming and
sextortion. There is no law which may holistically cover the whole issue of
grooming women for sexual gratification , which is narrowly addressed in the
<b>POCSO Act</b>. Here lies the major lacuna which may have motivated many for victim blaming.<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Women like Pollachi brave heart would not have created
“virtual friendship” with another unknown man or woman unless the perpetrator
would have customized the fake profile to gain trust. This could have been done
by thorough data mining about the victim/s.<span style="mso-spacerun: yes;">
</span>apparently the victims of this gang were adult women including doctors,
teachers etc. Such perpetrators look for their prey from social media profiles
who may have not taken full precautions to protect their albums, posts, friend
lists and above all the email ids and/or the <span style="mso-spacerun: yes;"> </span>phone numbers <span style="mso-spacerun: yes;"> </span>which<span style="mso-spacerun: yes;">
</span>are used for accessing social media through phones. This ignorance may
invite major risks as this particular case. However, social media site is also
to be blamed for not monitoring the creation of fake profiles which they would
not necessarily scan unless someone reports the profile as fake. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">This case should have a happy ending and this can be
possible only when this particular <span style="mso-spacerun: yes;"> </span>victim and other victims of this gang cooperate
with the prosecution till the end and the police uses its legal power to
extract all evidences from the social media website. We as civil society
members are also responsible to make a happy ending of this case : please do
not circulate the images of the victim/s if in case you are conveyed the images
from any number, profile etc. Such circulation would also attract penal
provisions against the person who may not be directly involved in the case, but
may circulate it thinking that it is “fun” to circulate such images, or he/she
is doing the same to make the society aware that such crimes have happened. We
all should respect the privacy of the victims and at the same time praise the
victims for breaking social taboo<span style="mso-spacerun: yes;"> </span>and
reporting the matter to the police.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Stop cybercrimes against women. Start positive usage
of social media .<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;">Please note : <i>Do not violate copyright of this blog.
If you would like to use information provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2019),</i></span><span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;"><i>
</i></span><span lang="EN-US" style="font-family: "georgia" , "serif"; font-size: 16.0pt; line-height: 200%;"><i>Duping women in the name of matured
friendship: The Pollachi sextortion case <span style="mso-spacerun: yes;"> </span>" 12th March, 2019 , published in
http://debaraticyberspace.blogspot.com</i><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<br />
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/pollachi%20case.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></span></a> See
https://timesofindia.indiatimes.com/city/coimbatore/pollachi-woman-harassment-case-four-detained-under-goondas-act/articleshow/68370291.cms
Retrieved on 12.03.2019<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/pollachi%20case.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[2]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See <a href="https://timesofindia.indiatimes.com/city/coimbatore/pollachi-woman-harassment-case-four-detained-under-goondas-act/articleshow/68370291.cms">https://timesofindia.indiatimes.com/city/coimbatore/pollachi-woman-harassment-case-four-detained-under-goondas-act/articleshow/68370291.cms</a>
Retrieved on 12.03.2019<o:p></o:p></span></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/pollachi%20case.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[3]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">For better understanding see “Halder
D. (2012), “Law to regulate cyber goons”, 20th December,2012, published in <a href="http://cybervictims.blogspot.com/2012/12/law-to-regulate-cyber-goons.html">http://cybervictims.blogspot.com/2012/12/law-to-regulate-cyber-goons.html</a>
Accessed on 11.03.2019<o:p></o:p></span></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-36220062146959309472019-03-07T10:48:00.000-08:002019-03-07T10:48:35.549-08:00Women’s Day, 2019 : Views of a #webwonderwoman CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-fJiIc_KkxRk/XIFkcJdZRXI/AAAAAAAAAdg/pU8wcBJsP8EaZ9WJ2pfNtqUaidj_31yYgCLcBGAs/s1600/webwonderpic.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="281" data-original-width="540" height="207" src="https://4.bp.blogspot.com/-fJiIc_KkxRk/XIFkcJdZRXI/AAAAAAAAAdg/pU8wcBJsP8EaZ9WJ2pfNtqUaidj_31yYgCLcBGAs/s400/webwonderpic.jpg" width="400" /></a></div>
<br />
<div style="text-align: center;">
Picture curtsy : <a href="https://www.ndtv.com/india-news/centre-honours-30-web-wonder-women-for-driving-reforms-via-social-media-2003833?fbclid=IwAR0h6TDvuaPHOP_mFZuq2Z3Tbk8szdy--8inqBOiBqhd4bVpo7rTudLeY1s">https://www.ndtv.com/india-news/centre-honours-30-web-wonder-women-for-driving-reforms-via-social-media-2003833?fbclid=IwAR0h6TDvuaPHOP_mFZuq2Z3Tbk8szdy--8inqBOiBqhd4bVpo7rTudLeY1s</a></div>
<div style="text-align: center;">
<br /></div>
<br />
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">In a late afternoon in the last week of February, 2019
I received a message from Ministry of Women & Child Affairs, Government of
India congratulating me for winning the <a href="https://twitter.com/search?q=%23WebWonderWomen&src=tyah" target="_blank">#webwonderwomen</a> award in the category
of Legal/policy . #Webwonderwomen is an initiative of Ministry of women &
Child, BreakThrough India, an NGO which works for women and girls and Twitter
to honor 30 women<span style="mso-spacerun: yes;"> </span>from diverse fields
who had used Twitter positively for spreading awareness, reaching out to people
in need and above all, advocating for women empowerment. Among the 30 women
were women activists, lawyers, journalists, sanitation & public health
activists, food blogger & nutritionist, film maker, activist promoting breast-feeding,
women government officials and myself, who works for victims, especially women
victims of cyber crimes.<span style="mso-spacerun: yes;"> </span>There were
different heartwarming<span style="mso-spacerun: yes;"> </span>as well as heart
breaking stories told by award winners ; they shared stories of<span style="mso-spacerun: yes;"> </span>failures and success, happiness and pain, the
feeling of being ridiculed by others because of their support to other women.
No wonder, I have also gone through the same while executing my wish to help
victims of cyber crimes: I have been cyber<span style="mso-spacerun: yes;">
</span>bullied, stalked, trolled and threatened by men and women for my work .
I have been asked ridiculous questions regarding my “attachment” with the
virtual world. Finally with this award, I could prove that being on Twitter or
Facebook or Instagram or on internet as a whole for <i style="mso-bidi-font-style: normal;">more than the time allotted for general women by their families and
societies</i> is not that bad. I have an “unlimited” (in regard to time)<span style="mso-spacerun: yes;"> </span>access to net and my husband respects my <i style="mso-bidi-font-style: normal;">time</i> on net.<span style="mso-spacerun: yes;"> </span>I am fortunate to make this space. I have
seen many women who are not allowed to be on net for more than a limited period
by their families especially men folk, who may be enjoying (consuming) avatars
of other women when their women enter the ‘restricted time period’ for net
surfing on a daily basis.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">This women’s day is special because as #webwonderwomen
awardee I have become a proud ambassador of the Ministry of women and children
affairs like my fellow award winners. This is also special because on the very
day when I received the award, I saw nothing changed when it comes to cyber
crimes against women. While going through the newspaper that very morning, I
noticed two news items which<span style="mso-spacerun: yes;"> </span>made me
think how womens day becomes meaningless for several thousands of women victims
of cyber crimes : one was regarding a gang rape survivor who came across the
clipping of her own rape scene and dared to walk into the police station to
report not only about the physical rape, but also about the virtual consumption
of her physical assault by many. The second was about duping of a woman in a
renowned matrimonial site . None of these incidents is new for me. However, I
salute the rape survivor who took the matter to the police. She must have
undergone severe secondary victimization and traumatization by now just like
the other victim that I mentioned above. We do not know what would happen to
them later: how far the police and prosecution<span style="mso-spacerun: yes;">
</span>may help<span style="mso-spacerun: yes;"> </span>them ? with a limited
legal awareness and fear of<span style="mso-spacerun: yes;"> </span>societal
taboo, many victims like these two have to withdraw their cases and disappear. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Women’s day is necessarily <span style="mso-spacerun: yes;"> </span>related to The Convention on elimination of
all forms of discrimination against women (CEDAW), which was adopted by the UN
general Assembly in 1979 and which defines discrimination against women as <i style="mso-bidi-font-style: normal;">"...any distinction, exclusion or
restriction made on the basis of sex which has the effect or purpose of
impairing or nullifying the recognition, enjoyment or exercise by women,
irrespective of their marital status, on a basis of equality of men and women,
of human rights and fundamental freedoms in the political, economic, social,
cultural, civil or any other field."</i><span style="mso-spacerun: yes;">
</span>The scope of this definition has automatically expanded to include
gender discrimination, misogyny and abuse of women’s rights online.<span style="mso-spacerun: yes;"> </span>I was more interested in the award ceremony
because of Twitter as its <span style="mso-spacerun: yes;"> </span>partner. <span style="mso-spacerun: yes;"> </span>Social media like Twitter, Faceook ,
Instagram, YouTube etc are used for women empowerment. But they are notorious
platforms for victimization of women. This year’s theme for International
women’s day is <a href="http://www.unwomen.org/en/news/in-focus/international-womens-day" target="_blank">“Think equal, build smart, innovate for change”</a> , which
signifies women empowerment in the field of technology and innovative work by
women and men alike for gender equality and betterment of<span style="mso-spacerun: yes;"> </span>situation of women across the globe. This
won’t fructify unless web companies take the responsibility of<span style="mso-spacerun: yes;"> </span>providing safety against gross abuse of
women. As women activists, many of us know that there more takers of CEDAW; but
how many States are actually ensuring proper implementation of laws especially
for women victims of cyber crimes is a question that needs to be researched.
There is no uniform law to recognize several cyber offences against women.
Majority of countries have no laws for prevention of cyber bullying, stalking,
impersonation <span style="mso-spacerun: yes;"> </span>of women, online sexual
offences<span style="mso-spacerun: yes;"> </span>targeting women.<span style="mso-spacerun: yes;"> </span>Sexting and revenge porn still fall in the
grey line in majority of the countries. It is still considered a taboo for
women to watch porn ; women who are caught watching porn/porn contents<span style="mso-spacerun: yes;"> </span>are severely moral policed by the society .
But on the other hand, when men watch porn including revenge porn and
non-consensual porn, it is still considered as normal because unless the
websites flag them as <i style="mso-bidi-font-style: normal;">illegal</i> , men
(and in certain cases women and <span style="mso-spacerun: yes;"> </span>children
too) may not be prevented even by the courts because apparently the victims
would not have moved the police and / or the courts for taking action to take
down the offensive contents .<span style="mso-spacerun: yes;"> </span>Majority
of these victims may be completely unaware of the fact that they have been made
subjects of<span style="mso-spacerun: yes;"> </span>online consumption as ‘sex
items’. Consider the case of<span style="mso-spacerun: yes;">
</span>socio-economically poor<span style="mso-spacerun: yes;"> </span>women who
may be trafficked and their videos of having sexual activities may be floating
for many years without making them understand how they are being ‘consumed’ by
millions.<a href="file:///E:/ccvc/blogwomen/blog2019/webwonderwoman.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-US; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">“Think equal, build smart, innovate for change” would
be possible only when the society including the government stakeholders<span style="mso-spacerun: yes;"> </span>as a whole come together to take a holistic
step towards preventing cyber victimization of women and creating safe place
for women and girls online and in real life.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Wish you all, a very happy WOMEN’S DAY . Lets “Think
equal, build smart, innovate for change”.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i><b><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;">Please Note: Do not violate copyright of this blog. If
you would like to use information provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2019),
"</span><span lang="EN-US"> </span></b></i><span lang="EN-US" style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-ansi-language: EN-US;"><i><b>Women’s
Day, 2019 : Views of a #webwonderwoman”<span style="mso-spacerun: yes;"> </span>8<sup>th</sup>
March, 2019 , published in http://debaraticyberspace.blogspot.com</b></i><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///E:/ccvc/blogwomen/blog2019/webwonderwoman.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> <span lang="EN-US" style="mso-ansi-language: EN-US;">See for example Halder D., &
Jaishankar, K. (2014). Online Victimization of Andaman Jarawa Tribal Women: An
Analysis of the Human Safari YouTube Videos (2012) and its Effects. British
Journal of Criminology, 54(4), 673-688. (Impact factor 1.556). DOI:
10.1093/bjc/azu026.<o:p></o:p></span></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-45249428167048483762019-01-15T06:41:00.000-08:002019-01-15T06:41:01.827-08:00Trolling on Instagram photos: Should women restrain from uploading personal pictures?CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-JEBAnSbjy4M/XD3wU1u_04I/AAAAAAAAAcI/PXt4RJAjqxcK3l6C__GX4zBuPfH4Gwj3ACLcBGAs/s1600/insta.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="183" data-original-width="275" src="https://4.bp.blogspot.com/-JEBAnSbjy4M/XD3wU1u_04I/AAAAAAAAAcI/PXt4RJAjqxcK3l6C__GX4zBuPfH4Gwj3ACLcBGAs/s1600/insta.jpg" /></a></div>
<div style="text-align: center;">
Image curtsy : Google</div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">Off-late I have been getting to see many incidences of trolling on personal pictures
of individuals, especially women on Instagram. These photos may include photos
of young women and girls in trendy clothes, showing more skin than expected by
orthodox societies. Such pictures may attract the attention of self-acclaimed
moral police trolls who wish to condemn women for their choice of outfits;
these trolls use extremely harsh words which may even go to the extent of
threatening women for their choices. They may even broaden their harassment
pattern by sharing the target pictures through different profiles to defame the
victims, threat the victims and create many more morphed images of the victims
and this may go on till the victims reach a stage to withdraw from the social
media. This indeed generates various levels of criminal liability, some of
which have been addressed by laws in India. Apart from self-acclaimed moral
police trolls, several women have also complained of fashion police trolls who
intentionally data mine and troll women, whose fashion sense according to the
trolls is not upto the mark. Unlike the moral police trolls, the fashion police
trolls may not create security or life
risking threats, but they may definitely target the reputation of the victims
and their self-esteem. <o:p></o:p></span></div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">Now
let us see what sorts of harm or damage can be done by both types of trolls:<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">trolling
can creation of threat, intimidation<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">trolls
necessarily create posts which are defamatory; these can be teasing
remarks and extremely insulting comments<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">trolling
can result in reputation damage, violation of privacy, unauthorised access to
data, copyright violation (in certain cases)<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">Trolls
are necessarily bullies. But bullying and trolling are not the same. Trolling
can be more vicious than bullying. Trolling infact attracts more perpetrators
and more victims in the same thread. These victims and perpetrators may not be
known to each other previously; resultant, the new “victims” who
may have joined the thread to support or disagree with the primary victim may finally put all blames to the primary victim
for the victimisation by way of trolling. Trolling is more public than
bullying. As such the effects of trolling may be more traumatising than
bullying. Trolling can not only damage reputation of the primary victims,
trolls may go a long way to harass cyber bystanders or commenters who may
support or disagree with the victims as well as with the trolls. The situation
worsens if these bystanders or commenters are women; trolls may threaten these
secondary victims with legal consequences (for aggravating the issues) which
may force the latter to withdraw from social media just like the primary
victims.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">This
may adversely affect women’s usage of Instagram : Instagram unlike Facebook may
instantly help the user to get connected with people/group with common interest
especially when the user uses the hashtags. The pictures/videos armed with
hashtags may help the user to reach a wider audience. Several people including
women aspiring to showcase their creativity in fashion industry, upcoming
models, actors singers, anchors, performers etc, who use the platform for
getting connected with the industry people, mentors and a wider audience, may
suffer hugely if trolls attack them on Instagram. Victims may not only feel
completely withdrawn, they may also be pulled into unnecessary legal tangles
especially if the trolls misuse their pictures which may have been uploaded by
the victims for promoting certain brands (which in turn may not appreciate such
negative publicity of their product).<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;"> But this in no way should mean that
women should restrain from uploading pictures on Instagram. There are several
ways to protect the privacy, reputation and the copyright of the pictures of
the users :<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">1. Women and girls should always opt for privacy
options in Instagram. This may reduce the responsibility of the users and
increase that of the website. The victims may directly charge the websites for
not applying due diligence and
neglecting the security features which should have restricted unwanted
people from infringing the privacy and copyrights. Further, in case the women
wish to make the profiles open for public and had been
harassed/trolled/stalked/unauthorisedly accessed etc, the victims must report
the matter to the websites. The websites would not be letting the victim know
the about the original identity of the harasser in case the profile is that of
unknown person/s; but they would be duty bound to repair the damage, i.e. ,
restrict the unauthorised circulation of the image of the victim and generating
anymore message that may harm the reputation of the victims. S.79(3) of the
Information technology Act, 2000(amended in 2008) (exceptions to exemption from
liability of intermediary in certain cases)
may be applied in such cases.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">2. Indian laws do not recognise online trolling
and bullying as separate offences. This definitely had created problems for
proper justice delivery to the victims. However, basing on the modus operandi
for trolling several penal provisions may be applied; for instance, S.509
(punishment for harming the modesty of women), 507 (criminal intimidation by
anonymous person), 499 and 500 (defamation and punishment for the same), 354D
(punishment for stalking including cyber stalking) of the IPC may be used for
posting intimidating, insulting, defamatory comments, stalking, creating
threats etc.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">3. If trolling results in creation of Fake
avatars especially sexually explicit contents, obscene contents etc, and if
this involves unauthorised access to data, manipulation of data etc, the police
may also apply provisions including Ss. 43(unauthorized access to the computer, data etc) 66 (punishment for computer related
offences), 66C (punishment for fraudulently using password, unique
identification features etc of any other person), 66D (punishment for cheating
by impersonation), 66E (violation of privacy)(incase the picture has been used
to create morphed pictures/images), 67 (punishment for creating sexually
explicit contents), 67A (punishment for creating obscene contents ) of the
Information technology Act, 2000(amended in 2008), S.354C IPC(punishment for
voyeurism) etc. Police may also necessarily apply provisions from Indecent
representation of women (prohibition )Act, 1986 for indicting the accused for
indecent representation of the victim online.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">Some
of the above mentioned laws are non bailable and cognizable. This means that
trolling may not be considered as a simple offence especially if it results in
heavy offences including creation of sexually explicit contents ( the contents
include not only the images, but the texts as well) etc. As such, women should
not refrain from using Instagram fearing trolling. But they must be aware of
their rights against trolling and the duties of the websites.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
</div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">Let
us unite against misogynist trolling. Let us spread the message that trolling,
its modus operandi and its consequences should not be taken lightly and the
criminal justice machinery must emphasise with the victims of trolling.<o:p></o:p></span></div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;"><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;"><span style="mso-spacerun: yes;"> </span></span><i style="mso-bidi-font-style: normal;"><span style="font-family: "Bookman Old Style","serif";">Please
Note: Do not violate copyright of this blog. If you would like to use
informations provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),
" Trolling on Instagram photos: should women restrain from uploading
personal pictures?” 15<sup>th</sup> January, 2019, published in
http://debaraticyberspace.blogspot.com<o:p></o:p></span></i></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-66488580787830540872018-10-21T19:35:00.000-07:002018-10-21T19:35:14.368-07:00Need for a model prohibitory provision for preventing and punishing Cybercrimes targeting womenCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-f7A8do9qq3o/W803H1s53sI/AAAAAAAAAa0/RZ93EbCTDpEDd9WOEuylLlz870XteajpACLcBGAs/s1600/download.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="153" data-original-width="328" height="149" src="https://1.bp.blogspot.com/-f7A8do9qq3o/W803H1s53sI/AAAAAAAAAa0/RZ93EbCTDpEDd9WOEuylLlz870XteajpACLcBGAs/s320/download.jpg" width="320" /></a></div>
<br />
<br />
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">The
festive seasons not only bring joy and happiness, but also brings tinges of
tensions, disappointment, frustrations and unnecessary worries especially for
women and girls. This is because of the negative use of digital and information
technology; women and girls may be photographed inappropriately, touched
inappropriately and may be photographed in such conditions, they may be stalked,
their data may be unauthorisedly accessed and misused and over all, they may
also be targeted for revenge porn. It may generally happen even during
non-festive seasons too. But during the festive seasons such off-line and
online harassment targeting women may increase more. In my previous research I
have observed that this may happen due to two main reasons : lack of strict
central laws relating to public place photography and engagement of the police
force in crowd management. It may necessarily become almost impossible to
protect every woman and girl in the crowds from the perpetrators who may be
digitally empowered to violet the privacy.<span style="mso-spacerun: yes;">
</span>The second reason plays a major role in motivating the perpetrators to
take the harassment of women and girls online so that victims may not be able
to understand the impact of victimisation immediately; simultaneously the
perpetrators may not only satisfy their sadistic ego by harassing women and
girls online, but may also gain unethically by<span style="mso-spacerun: yes;">
</span>supplying the voyeur pictures and clippings to adult sites and even to
YouTube. By the time<span style="mso-spacerun: yes;"> </span>the victims
understand and feel the impact of victimisation, their reputation may have been
badly damaged due to viral spreading of the images. <span style="mso-spacerun: yes;"> </span><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">A year
back the ministry of women and children rolled out project for portal to
complain about online harassment. But this could neither reduce the alarming
growth of online victimisation of women. The reason could be ill drafted laws
and poor execution of the existing laws. These ill drafted laws may include
S.66A of the Information Technology Act, 2000(amended in 2008) which prescribed
punishment for offensive, annoying etc speech, which was later scrapped off in
the case of Shreya Singhal vs Union of india & others (however, the
Information Technology Act has not been amended so far to either amend or
delete this provision from the present version of the Provision); Ss. 354 C and
D of the Indian Penal Code which speaks about voyeurism and cyber stalking,
S.509 of the Indian Penal Code which speaks about word gesture etc about
harming the modesty of women etc.<a href="file:///G:/ccvc/blogwomen/blog2018/model%20cyber%20crime%20prevention%20law.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
I have also created a model law for penalising revenge porn and had submitted
the same to the ministry of women and child affairs.<a href="file:///G:/ccvc/blogwomen/blog2018/model%20cyber%20crime%20prevention%20law.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
However, no step has been taken on this so far even though revenge porn does
exist in the Indian cyber space context as well. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">It
needs to be noted that the internet has provided a broader platform for
expressing views and opinions and women are using it share their opinion on
various issues including sexual harassment that may have been meted out to them
through Me too movement. But this would definitely have another side of the
coin. Many women may prefer to bring up the issue of sexual harassment on
public platforms through social media; but the accused persons may neither
leave these victims on the cyber space. They may try to counter attack them
through trolls, bullies and hired-hackers who may try to vandalise the victims
reputations online by infringing the digital privacy of the Me Too fighters.
This in other ways may also affect the documentary evidences that the victim/s
may have saved in their electronic devices for further court proceedings.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">At this
juncture It is time that<span style="mso-spacerun: yes;"> </span>the existing
law must be amended to include provisions for offensive communication and
revenge porn. On behalf of Centre for Cyber Victim Counselling a <span style="mso-spacerun: yes;"> </span>draft model Law <span style="mso-spacerun: yes;"> </span>is proposed as below:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div align="center" class="MsoNormal" style="line-height: 200%; text-align: center;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Model
law for prohibiting Cybercrime against women<o:p></o:p></span></i></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Chapter 1 : preliminary<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">S.1 Extent
and purpose:<o:p></o:p></span></i></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">It extends to the whole of India.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">It has been seen that even though Criminal
Law Amendment Act, 2013 has introduced several new provisions for the safety of
women, but still there exists lacuna. Further, the Information technology Act,
2000 (amended in 2008) also failed to prevent crimes against women which
include cyber bullying, trolling and revenge porn. <o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">In view of the above, this model law is
proposed to bring amendment to (a) the present provisions especially in the
Indian penal Code (specifically in Ss. 354 C & D) and insert new provision
for prohibiting and punishing revenge porn, (b) amend and introduce new version
of S.66A to create preventive law to prevent offensive communication including
bullying, trolling, online harassment etc against women and individuals in
general, (c) to introduce special provision in the Information technology Act,
2000 (amended in 2008) to provide confidentiality to the victims.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Chapter 2 : Proposed amendments<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><u><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">S.2
Insertion of a new provision on Revenge porn:<a href="file:///G:/ccvc/blogwomen/blog2018/model%20cyber%20crime%20prevention%20law.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><b style="mso-bidi-font-weight: normal;"><u><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[3]</span></u></b></span><!--[endif]--></span></span></a><o:p></o:p></span></u></i></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">The model Revenge porn prohibitory provision
:(This can be included in Chapter XVI of the Indian Penal Code as S.354E, which
may be inserted after S.354D (stalking)).<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">1.<span style="mso-spacerun: yes;">
</span>Anyone, who in order to satisfy his anger and frustration for a broken
relationship, takes revenge<span style="mso-spacerun: yes;"> </span>through
publishing, transmitting, conveying, publicizing false and sexually provocative
portrayal of his/her victim, by misusing the information that he may have known
naturally and that he may have stored in his personal computer, or that which
may have been conveyed to his electronic device by the victim herself, or may
have been stored in the device with the consent of the victim herself; and
which may have been done to publicly defame the victim essentially, commits the
offence of revenge porn.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">2.<span style="mso-spacerun: yes;">
</span>Whoever commits the offence of revenge porn, shall be punished in the
first conviction with imprisonment of either description for a term which shall
not be less than one year, but which may extend to three years, and shall also
be liable to fine of not less than 1 lakh rupees and pay reasonable
compensation to the victim for damaging his/her reputation in real life and
online. If he be punished on a second or subsequent conviction, he shall be
punished with imprisonment of either description for a term which shall not be
less than three years, but which may extend to seven years, and shall also be
liable to fine of not less than 5 lakh Rupees and reasonable compensation to
the victim.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>Provided that the perpetrator must also be
liable to remove the offensive image either original or morphed, irrespective
of the fact whether the image was conveyed to him by the victim herself or not,
from his own electronic device/s and from the websites and social media
profiles where he may have uploaded the same for the purpose of taking revenge.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Provided further, that the investigating
officer shall immediately after coming to know of the offence of revenge porn
committed by the perpetrator as reported by the victim or anyone on behalf of
the victim, contact the concerned website to remove such contents including any
text accompanying the image/s which may falsely portray the victim.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Provided further that if the website
concerned fails to cooperate with the police on being alerted by the
investigating police officer and also if the website concerned fails to remove
the content within 36 hours<span style="mso-spacerun: yes;"> </span>after being
alerted by the victim herself, the said website would not be exempted from
third party liability as has been explained under S.79 of the Information Technology
Act, 2000 (amended in 2008) and would be liable to pay compensation to the
victim for an amount not less than Rs. 5 lakhs and also fine.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Explanation:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">In Subsection 1, the words “publishing,
transmitting, conveying, publicizing false and<span style="mso-spacerun: yes;">
</span>sexually provocative portrayal of his/her victim” shall include<span style="mso-spacerun: yes;"> </span>publishing, transmitting, conveying<span style="mso-spacerun: yes;"> </span>any image of woman whether nude, semi-nude or
normal to anyone individual and/or to any website including social media, with
an intention to take revenge on that said woman.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">(Rationale
behind proposing a new law: Why S.354C IPC would not be able to regulate
revenge porn:<o:p></o:p></span></i></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">1.<span style="mso-spacerun: yes;">
</span>S.354C IPC speaks about voyeurism which is inclusive of “private acts”
whereby victim’s private body parts may be shown. It does not mention anything
about publishing/conveying/morphing etc of pictures of women for taking
revenge. The ultimate motive, i.e., taking revenge is absent here.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">2. S.354C does not speak about morphed
pictures published/conveyed/transferred etc for gratifying revenge. In cases of
revenge porn, majority of the offensive images may be morphed. This has neither
been covered under S.66E of the Information Technology Act.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">3.<span style="mso-spacerun: yes;">
</span>Creation of revenge porn may be done with normal, innocent, un-morphed
pictures as well. In such case, we need to look into the accompanying text that
describes the image. For example, a normal picture of the woman victim may be
published with a text describing her as “horny”, “Prostitute”, “my sexy wife
during honeymoon”(when in reality, the woman is not married to the perpetrator,
or even if married, did not allow publication of such normal photo with such
text ).<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">4.<span style="mso-spacerun: yes;">
</span>Revenge porn differs from non-consensual pornography as well.
Non-consensual pornography is a larger term which may include revenge porn,
voyeurism or even sexual slavery including forcing the woman to be captured
naked for some unethical gain. Hence, revenge porn needs a separate
definition.) <o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">S.3.<span style="mso-spacerun: yes;"> </span>Amendment to the definition of voyeurism
under S.354C of the Indian Penal Code (punishment for voyeurism)</span></i></b><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"> : In the place of “Any man”, it
should<span style="mso-spacerun: yes;"> </span>Any one and the amended provision
should be <span style="mso-spacerun: yes;"> </span>read as follows:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Any one</span></i></b><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"> who watches, or captures the image of a
woman engaging in a private act in circumstances where she would usually have
the expectation of not being observed either by the perpetrator or by any other
person at the behest of the perpetrator or disseminates such image shall be
punished on first conviction with imprisonment of either description for a term
which shall not be less than one year, but which may extend to three years, and
shall also be liable to fine, and be punished on a second or subsequent conviction,
with imprisonment of either description for a term which shall not be less than
three years, but which may extend to seven years, and shall also be liable to
fine.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Explanations:<span style="mso-spacerun: yes;"> </span>For the purpose of this section, “private
act” includes an act of watching carried out in a place which, in the
circumstances, would reasonably be expected to provide privacy and where the
victim’s genitals, posterior or breasts are exposed or covered only in
underwear; or the victim is using a lavatory; or the victim is doing a sexual
act that is not of a kind ordinarily done in public.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Where the victim consents to the capture of
the images or any act, but not to their dissemination to third persons and
where such image or act is disseminated, such dissemination shall be considered
an offence under this section.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">S.4.
Amendment to S.354D of the Indian Penal Code (punishment for stalking including
cyber stalking):</span></i></b><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"> In the
place of Any man, it should be anyone. The amended version should be read as
follows:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">1) <b style="mso-bidi-font-weight: normal;">Anyone</b>
who—<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span>follows a woman and contacts, or attempts to
contact such woman to foster personal interaction repeatedly despite a clear
indication of disinterest by such woman; or<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>monitors
the use by a woman of the internet, email or any other form of electronic
communication,commits the offence of stalking;<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>Provided that such conduct shall not amount to
stalking if the man who pursued it proves that—<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">it was pursued for the purpose of
preventing or detecting crime and the man accused of stalking had been entrusted
with the responsibility of prevention and detection of crime by the State; or<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">it was pursued under any law or to comply
with any condition or requirement imposed by any person under any law; or<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">in the particular circumstances such
conduct was reasonable and justified.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>(2)
Whoever commits the offence of stalking shall be punished on first conviction
with imprisonment of either description for a term which may extend to three
years, and shall also be liable to fine; and be punished on a second or
subsequent conviction, with imprisonment of either description for a term which
may extend to five years, and shall also be liable to fine.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">(<b style="mso-bidi-font-weight: normal;">Rationale
behind broadening the concept of perpetrator for Ss.354 C&D: It has been
seen that women may also commit voyeurism and cyber stalking for victimising
fellow women.<span style="mso-spacerun: yes;"> </span>This amendment may help
reduce such sorts of victimisation</b>.)<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">S.5.
Insertion of new provision prohibiting photography of individuals in general
without the consent of the individuals concerned (this may be inserted after S.268
of the Indian penal Code as S.268A)<o:p></o:p></span></i></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">1. Anyone who uses his camera devices in
any public place to capture the images of anyone including men, women,
children, people belonging to LGBT groups, with a motive to either sexual
gratification of the self, or sexual gratification of others, or uses these
images for unethical gain, or for ridiculing or causing hatred, <span style="mso-spacerun: yes;"> </span>defamation , damage to the reputation of the
said persons by way creating, circulating, spreading etc of such images through
electronic medium <span style="mso-spacerun: yes;"> </span>without the consent of
<span style="mso-spacerun: yes;"> </span>such men, women, children <span style="mso-spacerun: yes;"> </span>or member of LGBT group when the said men,
women, children, or member of LGBT group are<span style="mso-spacerun: yes;">
</span>not expected to give consent and/or not expected to be alert for not
allowing such photography, <span style="mso-spacerun: yes;"> </span>and also
publishes, transmits, circulates the same through electronic medium shall be
punished with an imprisonment <span style="mso-spacerun: yes;"> </span>of either
description for a term which shall not be less than six months r, but which may
extend to one year , and shall also be liable to fine of not less than 20
thousand <span style="mso-spacerun: yes;"> </span>rupees and pay reasonable
compensation to the victim for damaging his/her reputation in real life and
online. If he be punished on a second or subsequent conviction, he shall be
punished with imprisonment of either description for a term which shall not be
less than one<span style="mso-spacerun: yes;"> </span>year, but which may extend
to three years, and shall also be liable to fine of not less than 50 thousand Rupees
and reasonable compensation to the victim.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>Provided that the perpetrator must also be
liable to remove the non-consensual offensive image either original or morphed,
from his own electronic device/s and from the websites and social media
profiles where he may have uploaded the same for the purpose mentioned above.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Provided further, that the investigating
officer shall immediately after coming to know of the offence mentioned above
committed by the perpetrator as reported by the victim or anyone on behalf of
the victim, contact the concerned website to remove such contents including any
text accompanying the image/s which may falsely portray the victim.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Provided further that if the website
concerned fails to cooperate with the police on being alerted by the
investigating police officer and also if the website concerned fails to remove
the content within 36 hours<span style="mso-spacerun: yes;"> </span>after being
alerted by the victim herself, the said website would not be exempted from third
party liability as has been explained under S.79 of the Information Technology
Act, 2000 (amended in 2008) and would be liable to pay compensation to the
victim for an amount not less than Rs. 5 lakhs and also fine.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Explanation:<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">In Subsection 1, the words “capture images”
shall also include<span style="mso-spacerun: yes;"> </span>capturing images of accident
victims and doing so without offering any help to the victim, any other heinous,
serious or petty crimes and doing so without reporting the matter to the police
and offering help to the victim, capturing images of <span style="mso-spacerun: yes;"> </span>rape or sexual molestation or sexual assault
of any women or children, taking self portraits or selfies in the above
situations.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Explanation 2: The act of capturing the
images of men, women, children and members of the LGBT groups may not be
considered as an offence if the same is done for academic and research
purposes, provided the person/s capturing such images has prior consent of
proper authorities, or for medical research purposes or for the purpose of
creating documentary evidences which must be provided to the criminal justice machinery
including the courts for further legal actions to punish the wrong doers.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">S.6.
Amendment to Information Technology Act, 2000(amended in 2008):<o:p></o:p></span></i></b></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<b style="mso-bidi-font-weight: normal;"><i style="mso-bidi-font-style: normal;"><u><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Punishment
for offensive speech (this can be inserted after S.66 (offences related to the
computer) of the Information Technology Act, 2000 (amended in 2008). This may
also be considered as the amended version of S.66A (punishment for annoying etc
speech), which was scrapped off by the Supreme court in Shreya Singhal’s case)<o:p></o:p></span></u></i></b></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 200%; mso-list: l1 level1 lfo1; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";">
</span></span></span></i><!--[endif]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Anyone
who sends, posts produces, publishes, creates, circulates or sponsors to be
circulates <span style="mso-spacerun: yes;"> </span>any offensive speech including
any text or cartoon or caricature or image accompanied with text to any woman
by way of electronic, digital and information communication, which may damage
her reputation, damage the reputation of her family and <span style="mso-spacerun: yes;"> </span>children create threat to her, her family and
children, damage her reputation to an extent that may affect her job or may
affect her reputation in the prospective job, shall be punished with an
imprisonment for in the first conviction with imprisonment of either description
for a term which shall not be less than one year, but which may extend to three
years, and shall also be liable to fine of not less than 1 lakh rupees and pay
reasonable compensation to the victim for damaging his/her reputation in real
life and online. If he be punished on a second or subsequent conviction, he
shall be punished with imprisonment of either description for a term which
shall not be less than three years, but which may extend to seven years, and
shall also be liable to fine of not less than 5 lakh Rupees and reasonable
compensation to the victim.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;"><span style="mso-spacerun: yes;"> </span>Provided that the perpetrator must also be
liable to remove the offensive speech from his own electronic device/s and from
the websites and social media profiles where he may have published etc the said
speech targeting the woman. <o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Provided further, that the investigating
officer shall immediately after coming to know of the offence of posting,
publishing etc of the offensive speech committed by the perpetrator as reported
by the victim or anyone on behalf of the victim, contact the concerned website
to remove such contents including any text accompanying the image/s which may
falsely portray the victim and damage her reputation.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Provided further that if the website
concerned fails to cooperate with the police on being alerted by the
investigating police officer and also if the website concerned fails to remove
the content within 36 hours<span style="mso-spacerun: yes;"> </span>after being
alerted by the victim herself, the said website would not be exempted from
third party liability as has been explained under S.79 of the Information
Technology Act, 2000 (amended in 2008) and would be liable to pay compensation
to the victim for an amount not less than Rs. 5 lakhs and also fine.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Explanation: <o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">For the purpose of this section<b style="mso-bidi-font-weight: normal;"><u>, offensive speech targeting women shall
include the followings:<o:p></o:p></u></b></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";">
</span></span></span></i><!--[endif]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Any
speech which lowers the moral character of the woman concerned within the
meaning of Article 19(2) of the constitution of India.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;"><span style="mso-list: Ignore;">2.<span style="font: 7.0pt "Times New Roman";">
</span></span></span></i><!--[endif]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Any speech
which defames the woman concerned in the society as a whole within the meaning
of Article 19(2) of the constitution of India as well as Ss.499 and 500 of the
Indian Penal Code and Indecent representation of women Prohibition Act.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";">
</span></span></span></i><!--[endif]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Any
speech which includes Cyber bullying. Cyber bullying <span style="mso-spacerun: yes;"> </span>may mean attacking anyone with harsh or
rude<span style="mso-spacerun: yes;"> </span>words in the cyber space, including
publicly available web platforms, social media, private and public <span style="mso-spacerun: yes;"> </span>chat rooms, emails, blogs etc, and such harsh
or rude words are particularly made to ridicule one’s body shape, gender, gender
orientation, physical or mental incapability, race, colour, opinion,
educational background, language<span style="mso-spacerun: yes;"> </span>etc.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;"><span style="mso-list: Ignore;">4.<span style="font: 7.0pt "Times New Roman";">
</span></span></span></i><!--[endif]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Any
speech which includes Cyber trolling. Cyber trolling is <span style="mso-spacerun: yes;"> </span>an extreme usage of freedom of speech which is
exercised to disrupt the community discussions in social networking sites and
which is done to deliberately insult ideologies such as feminism, secularism
etc; of the topic starter or the supporters of the topic starter.<o:p></o:p></span></i></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 200%; margin-left: 54.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-align: justify; text-indent: -18.0pt;">
<!--[if !supportLists]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%; mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;"><span style="mso-list: Ignore;">5.<span style="font: 7.0pt "Times New Roman";">
</span></span></span></i><!--[endif]--><i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Any
speech which contains Cyber hate propaganda. Cyber hate propaganda may mean
offensive communication between the sender and multiple recipients with intent
to spread hatred against a particular individual for her opinion, race, gender
etc.<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">It is
expected that if this model Act is considered by the government, the growing
rate of cyber crimes against women may be brought down. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Please
Note: Do not violate copyright of this blog. If you would like to use
informations provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),
" Need for a model prohibitory provision for preventing and punishing
Cybercrimes targeting women”<span style="mso-spacerun: yes;"> </span>22<sup>nd</sup>
October 2018 , published in http://debaraticyberspace.blogspot.com<o:p></o:p></span></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///G:/ccvc/blogwomen/blog2018/model%20cyber%20crime%20prevention%20law.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a> My
observations on these laws can be found in my book. (Cyber Crimes against Women
in India. New Delhi: SAGE Publishing. ISBN: 978-9385985775, https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900
<span style="mso-spacerun: yes;"> </span>(co-authored with Professor
K.Jaishankar.<o:p></o:p></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///G:/ccvc/blogwomen/blog2018/model%20cyber%20crime%20prevention%20law.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
See the model law @Halder.D(2017) Criminalizing Revenge Porn From The Privacy
Aspects: The Model Revenge Porn Prohibitory Provision. Available @<o:p></o:p></div>
<div class="MsoFootnoteText">
<span style="mso-spacerun: yes;"> </span>at: <a href="https://www.livelaw.in/criminalizing-revenge-porn-privacy-aspects-model-revenge-porn-prohibitory-provision/">https://www.livelaw.in/criminalizing-revenge-porn-privacy-aspects-model-revenge-porn-prohibitory-provision/</a>
<o:p></o:p></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///G:/ccvc/blogwomen/blog2018/model%20cyber%20crime%20prevention%20law.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a>
This was published in supra@2<o:p></o:p></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-83396945679577503472018-09-29T21:06:00.000-07:002018-09-29T21:06:39.526-07:00The great Facebook hack: Liability of Facebook as service providerCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-JdhYC_mX6ck/W7BLEwdSvEI/AAAAAAAAAaQ/Ty6mdu6ygnkm7V6aDTGx9WvgEUvblYgKQCLcBGAs/s1600/JS84898948_Reuters_Facebook-logo_trans_NvBQzQNjv4BqFZ2mKB99NyfWHs4BvtAqLsS4XZFk3S07juafvYzyvW0.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="300" data-original-width="480" height="200" src="https://2.bp.blogspot.com/-JdhYC_mX6ck/W7BLEwdSvEI/AAAAAAAAAaQ/Ty6mdu6ygnkm7V6aDTGx9WvgEUvblYgKQCLcBGAs/s320/JS84898948_Reuters_Facebook-logo_trans_NvBQzQNjv4BqFZ2mKB99NyfWHs4BvtAqLsS4XZFk3S07juafvYzyvW0.webp" width="320" /></a></div>
<div style="text-align: center;">
Photo curtsy: Google</div>
<br />
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">By the
late evening of 28<sup>th</sup> September, 2018 almost all of Facebook users
would have received messages in their electronic devices that their “session
expired”. It indicated that the subscriber needs to log in again to continue
the Facebook activities. Many of the users felt it was a hoax, many felt it was
a hackers act and some could understand it was an alert alarm as they were
always ‘online’ and never logged off even when their phones were ‘sleeping’ or
switched off. By late night-early morning on 29<sup>th</sup> September, 2018 the
Facebook subscribers got an official information from Facebook help center
stating that the company had discovered that there was an attack on their
system and the attackers had illegally accessed Facebook access tokens which
would give way to access the subscribers’ data. On an emergency precautionary
step, Facebook logged off all users so that they can log on again with a
secured code provided by Facebook. It was confirmed that Facebook was trying to
exercise due diligence to protect the data of the users and in the course of
the same users were directed to log off.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Due
diligence has been addressed by <span style="mso-spacerun: yes;"> </span>S.512 ©
of the Digital Millennium Copyright Act, 1998 which indicates that the
intermediary may be saved from third party liabilities (especially for
copyright infringements) if<span style="mso-spacerun: yes;"> </span>the
intermediary practiced due diligence, i.e., it<span style="mso-spacerun: yes;">
</span><span style="mso-spacerun: yes;"> </span>did not have the requisite level
of information about the said infringement, it must not have been financially
benefited from such infringement, it must have taken expeditious measures to
take down the content concerned or block the access to the material concerned
upon receiving the information of the infringement. The same has also been
addressed by S.79 (3) of the Information Technology Act, 2000 (amended in 2008)
and has been further explained in Information Technology intermediary
guidelines Rules, 2011 whereby the term cyber security incident has been
defined as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Rule .2(d)
"Cyber security incident” means any real or suspected adverse<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">event
in relation to cyber security that violates an explicit or implicity<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">applicable
security policy resulting in unauthorised access, denial of<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">service
or disruption, unauthorised use of a computer resource for<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">processing
or storage of information or changes to data, information<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">without
authorisation;<o:p></o:p></span></i></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">The
rules further goes on to explain what are the due diligence practices that
should be adopted by the intermediary under Rule.3(3), which states that <span style="mso-spacerun: yes;"> </span><i style="mso-bidi-font-style: normal;">The
intermediary shall not knowingly host or publish any information or shall not initiate
the transmission, select the receiver of transmission, and select or modify the
information contained in the transmission as specified in sub-rule (2):<o:p></o:p></i></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Interestingly
Rule. 4 of the Intermediary Guidelines Rule further provides a clear direction
to the intermediaries as what is to be done and within how much time when the
intermediary has come to know about any information which harms the interest of
users or threatens the security of the nation etc (which are mentioned in rule
3), by stating that <i style="mso-bidi-font-style: normal;">The intermediary, on
whose computer system the information is stored or hosted or published, upon
obtaining knowledge by itself or been brought to actual knowledge by an affected
person in writing or through email signed with electronic signature about any such
information as mentioned in sub-rule (2) above, shall act within thirty six
hours and where applicable, work with user or owner of such information to disable
such information that is in contravention of sub-rule (2). Further the intermediary
shall preserve such information and associated records for at least ninety days
for investigation purposes.<o:p></o:p></i></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">This Rule
4 (read with Rule 3) mentions that the intermediary should either remove the
offensive content or block the access to the content. Facebook in its action in
practicing due diligence and exercising reasonable security practices (in
India, the guiding principle in this regard is mentioned in the Information
Technology (Reasonable security practices and procedures and sensitive personal
data or information) Rules, 2011), had alerted the users, logged them off and
logged them in with fresh code and also expressed that they are not aware
whether any individual has been affected by such unauthorised access to the
Facebook system as a whole. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">By doing
this Facebook actually tried to escape its liability as a ‘negligent body
corporate’ or a company which may be brought to the courts under S.43A of the
Information Technology Act, 2000(amended in 2008). Compare the incident of Facebook-
Cambridge analytica data breach and how the EU parliament addressed the issue
by accusing Facebook for having extremely poor cyber security measures compared
to Europe. Facebook users were also advised by an Illinois court to go for a
class suit against the company (Facebook) for unethically scanning and storing
personal photos and information of the users.<a href="file:///G:/ccvc/blogwomen/blog2018/facebookhack.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
The recent news also suggests that in the US Facebook users have started
going for class actions against Facebook for data breach which occurred apparently
because of <span style="mso-spacerun: yes;"> </span>the company’s negligence in
securing the data.<a href="file:///G:/ccvc/blogwomen/blog2018/facebookhack.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
Under the Indian information technology Act, 2000(amended in 2008), S.43A
empowers the victims of privacy (including data ) breach to claim compensation
from the faulting body corporate to a maximum limit of Rs. 5 Crores, which
however is subject to modification depending upon the damage suffered by the
victims, reputation harm etc and the discretion of the adjudicator. Not many
users have applied this law for bringing big companies under the Indian
scanners. There are however some cases of bank’s liability or hospital
managements liability which are now coming up because of the awareness among
the users/data owners and their lawyers. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">However,
web companies like Google, Facebook etc may have another option to shred the
liability: they may always shift the major burden to the data owners or data managers,
i.e. the private individuals who upload data almost every minute in average to
expose their private information.<a href="file:///G:/ccvc/blogwomen/blog2018/facebookhack.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a>
It is for this that we need to be vigilant on our own practices of data
sharing. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 200%;">Stay safe,
play safe.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<span style="font-family: "Georgia","serif"; font-size: 12.0pt; line-height: 107%;">Please Note: Do not violate
copyright of this blog. If you would like to use informations provided in this
blog for your own assignment/writeup/project/blog/article, please cite it as
“Halder D. (2018), "</span> <span style="font-family: "Georgia","serif"; font-size: 12.0pt; line-height: 107%;">The great Facebook hack : Liability of
Facebook as service provider”<span style="mso-spacerun: yes;"> </span>30<sup>th</sup>
September, 2019 , published in http://debaraticyberspace.blogspot.com<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div class="MsoNormal" style="text-align: justify;">
<br /></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///G:/ccvc/blogwomen/blog2018/facebookhack.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
See Halder Debarati (2018), FB, Its content regulation policies & photo
matching tech: boon or bane for Indian women from privacy law aspect. Published
in LiveLaw on April, 20018 @https://www.livelaw.in/fb-its-content-regulation-policies-photo-matching-tech-boon-or-bane-for-indian-women-from-privacy-law-aspects/<o:p></o:p></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///G:/ccvc/blogwomen/blog2018/facebookhack.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[2]</span></span><!--[endif]--></span></span></a>
See for instance, see Knoop Joseph (2018), Facebook sued over data breach that
involved 50 million accounts . available @ https://www.dailydot.com/layer8/facebook-breach-lawsuit/<o:p></o:p></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///G:/ccvc/blogwomen/blog2018/facebookhack.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 107%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">[3]</span></span><!--[endif]--></span></span></a> For
better understanding about this see Halder & Jaishankar ((November 2016).
Cyber Crime against Women in India. New Delhi: SAGE. ISBN: 978-93-859857-7-5.<o:p></o:p></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-83535747479460913352018-09-02T23:08:00.000-07:002018-09-05T19:32:20.194-07:005 key factors about hacking and the lawsCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<div align="center" class="MsoNormal" style="text-align: center;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-W3ocSTC4Ky4/W5CJht7n2bI/AAAAAAAAAZw/2aOFckkt5dgghlcmW_Ay0wt7bionB3V9QCLcBGAs/s1600/hacking.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="1280" height="180" src="https://1.bp.blogspot.com/-W3ocSTC4Ky4/W5CJht7n2bI/AAAAAAAAAZw/2aOFckkt5dgghlcmW_Ay0wt7bionB3V9QCLcBGAs/s320/hacking.jpg" width="320" /></a></div>
Photo curtsy: Google </div>
<div class="MsoNormal" style="text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 14.0pt; line-height: 115%;"></span></div>
<div class="MsoNormal">
<br /></div>
<div style="mso-element: footnote-list;">
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Hacking is undoubtedly one of the worst issues
that one wants to deals with. Often I get to see women complaining about
hacking of their social media accounts, people including men and women fearing
about and getting victimized by way of hacking of their email accounts , net
banking profiles and overall, the computer devices. New netizens are more prone
to getting victimized by hacking; so are their parents if these netizens are
pre-teens or teenagers. It is important to know some key factors which are
associated with hacking. These are as below:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<b><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">The
five key factors which everyone should know about hacking:<o:p></o:p></span></b></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 150%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">1.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">The term hacking is not
defined in any uniform style. Different researchers have defined hacking in different
ways. All most all academic definitions have indicated that computer hacking or
cyber hacking may mean unauthorized access to the computer, computer data etc,
changing the data without any authorization etc. In a way, it is directly
related to unauthorized data privacy infringement. A ‘smart’ example could be
the allegedly unauthorized access into the personal documents including bank
access details of the TRAI chief by the ethical hackers when the TRAI chief
threw challenge that ADHAR ‘hack proof’.<a href="file:///F:/ccvc/writeups/parentcirclewriteup/hackingdrdebarati.docx#_ftn1" name="_ftnref1" title=""><span class="MsoFootnoteReference"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-size: 18pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></a><o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">2.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Indian laws especially
Information Technology Act, 2000 (amended in 2008) does not address the issue
as “hacking”. The issue is dealt with by not one, but three Sections, namely,
Ss. 65 which prescribes punishment for tampering with computer source documents,
66, which prescribes punishment for computer related offences and 43, which
speaks about Penalty and compensation for damage to computer, computer system
etc.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">3.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Hacking may literally start
with unauthorized access or securing to the computer, computer system, computer
network etc. Accessing or ‘securing access’ can be done by various ways. This
may also include giving way to the hackers by opening suspicious mails/messages
or links. It is for this reason that new users of internet and digital technology
must be extremely cautious while opening suspicious mails/links etc.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">4.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Hacking may also include
downloading/extracting data etc, modifying such data, reproducing that data in
an altered form etc. It may also include unauthorized access to the computer or
computer system or data etc and infecting the same with viruses which will
immediately or gradually destroy all data, software etc stored in the computer
and computer system. Hacking may necessarily include unauthorized accessing and
then using of the computer network, email id, phone number or social media
profile for impersonating and unethical gain. It is for this reason that often
people complaint about hacking when their accounts have been unauthorisedly
accessed, data extracted/accessed and modified and email ID/social media
profiles etc are used for impersonating by way of a fake avatar.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 150%; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">5.<span style="font-family: "times new roman"; font-size: 7pt; font-stretch: normal; line-height: normal;">
</span></span><!--[endif]--><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Hacking may also involve
denial of services, which is why a computer or computer system thus affected may not get connected to the
internet easily and according to the wish of the real owner of the computer or
computer system etc, but according to the wishes of the hacker only.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-left: 18.0pt; text-align: justify; text-justify: inter-ideograph;">
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Now you may understand that
when your computer shows activities which are not generally expected, you must
be alarmed that your computer or the computer network or the computer system
has been affected by hacking : typically your device may slow down for no
reason, you may start getting to see that the data is altered, your net banking
account or email or social media account’s password and username and the
related phone number and email id may get changed without your authorization,
your documents including your photo may get published or circulated elsewhere
without your knowledge. Most scary of these is the camera device of your phone or
laptop or Ipad (when they are on switch on mode) etc may become active even
when you are not using the camera. It is for this reason that cyber security experts suggest to not to use
the electronic devices when one expects complete privacy from the outside
world, like when one is in the washroom.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-left: 18.0pt; text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<b><span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">So,
what about the punishment? <o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Do Indian laws address hacking as “hacking” ?
The answer is NO. But <b>this does not mean that the act of hacking
is not punishable</b>. As discussed
above, when the constituting elements mentioned under points nos 3, 4 and 5
create unauthorized access to the computer, computer system, data etc, Sections 65, 66 and 43 may
immediately be applicable for booking the offences for tampering the computer
source code, computer related offences and damage to the computer system etc. As such there are two types of
punishments that are prescribed for hacking related offences : punishment as
per civil offences which are regulated by S.43 and punishments as per criminal
nature of the offence, which are regulated by Ss. 65 and 66. In the later, the
punishments may include imprisonment for a period upto three years and/or fine which may extend to Rs. two
lakhs. In case S.66 is applied, then the fine amount increases upto Rs. 5
lakhs. Again, if the act of hacking is judged as per S.43, then the provision
would be read with S. 45 of the Information technology Act, which indicates that,
a maximum of Rs. 25, 000/ may be paid as compensation to the victim for such
offences (this is especially so because S.43 does not mention any specific
amount of compensation and this lacuna is filled by S.45 which prescribes
residuary penalty). However, the recent
trend may show that most of hacking related cases had been booked under Ss. 66,
65 and 43 so that the perpetrators may undergo jail term as well as are bound
to pay fine. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Interestingly, the Information
Technology Act does not restrict the criminal liability to a specific age as is
seen in the Indian penal code. Hence, even if it is a computer genius as young
as 10 or 12 years of age, he/she may not escape the clutches of law in case
he/she has done the offence/s which may constitute hacking. Considering their
age and maturity level, Juvenile Justice
(care and protection) Act , 2015 may also be applicable. Again, this would NOT mean that parents would
be considered completely innocent. Very recently the courts in Gujarat had made
the parents liable for underage kids driving two and four wheelers. If the children are arrested, the parents may
have to pay for negligence in monitoring the wrong doing of their children. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">I end this piece with a
positive note: if we adults are aware, then our children will also be aware and
we can prevent the digital as well as real life privacy infringement in a swift
way.<o:p></o:p></span><br />
<span lang="EN-US" style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;"></span><br />
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<i><span style="font-family: "georgia" , serif; font-size: 14pt;">Please Note: Do
not violate copyright of this blog. If you would like to use informations
provided in this blog for your own assignment/writeup/project/blog/article,
please cite it as “Halder D. (2018), "</span></i><span style="font-family: "bookman old style" , serif; font-size: 13.5pt;"> 5 key factors about hacking and the
laws</span><span style="font-family: "georgia" , serif; font-size: 14pt;">” 3rd September, <i>published
in http</i></span><b><i><span style="font-family: "georgia" , serif; font-size: 14pt;">://debaraticyberspace.blogspot.com</span></i></b><span style="font-family: "times new roman" , serif; font-size: 13.5pt;"><o:p></o:p></span></div>
</div>
<div>
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<br />
<div id="ftn1">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/parentcirclewriteup/hackingdrdebarati.docx#_ftnref1" name="_ftn1" title=""><span class="MsoFootnoteReference"><span lang="EN-US"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></span></a><span lang="EN-US"> See Rachel Chitra(2018), Hackers deposit Re 1 in Trai chief's
account. Published in https://timesofindia.indiatimes.com/india/hackers-deposit-re-1-in-trai-chiefs-account/articleshow/65190556.cms
on 30/07/2018</span></div>
</div>
</div>
<div id="ftn1" style="mso-element: footnote;">
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-70205543884107346402018-07-20T05:05:00.000-07:002018-07-20T05:05:25.497-07:00Recording sexual assaults and rape in mobile phones: How laws fail to control growing sexual assault on women and childrenCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-FoH24alzpjk/W1HOrvO6b2I/AAAAAAAAAZA/HwsIA2pyUSw7MBn2h_8ynpgeudxgPtz8wCLcBGAs/s1600/rape-victim.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="376" data-original-width="620" height="194" src="https://4.bp.blogspot.com/-FoH24alzpjk/W1HOrvO6b2I/AAAAAAAAAZA/HwsIA2pyUSw7MBn2h_8ynpgeudxgPtz8wCLcBGAs/s320/rape-victim.jpg" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<br />
<div class="MsoNormal" style="line-height: 150%; text-align: center;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">Picture curtsy: Google</span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">17 men including a 66 year old lift operator allegedly
continued to rape an 11 year old girl for months in Chennai, Tamil Nadu. The gruesome
episode of “aggravated penetrative sexual assault” (as S.5(g) of the Protection
of children from Sexual offences Act, 2012 explains, whoever commits gang
penetrative sexual assault on child, is said to commit aggravated penetrative
sexual assault) came in light in mid July, 2018 when the victim confronted
about it first to her sister and then to her parents.<a href="file:///F:/ccvc/blogwomen/blog2018/chennai%20rape.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN; mso-fareast-theme-font: minor-fareast;">[1]</span></span><!--[endif]--></span></span></a> This
is not the first time that aggravated child sexual assault has been reported
from <span style="mso-spacerun: yes;"> </span>metro cities which may boast of
rigorous campaigns against any sort of sexual violence against women and
children by government as well as non government stake holders. This will
neither be the last time. Sexual assault against women and children is a <i style="mso-bidi-font-style: normal;">social epidemic</i> which happens in every
society, in eastern, western, northern and southern hemisphere. Sexual assault
on women and children whether aggravated or non aggravated, may be caused due
to various psycho-social reasons: while on one hand researchers relate this to
pervert mind set of human beings, on the other hand, several examples related
this to misogynist mindset, caste oppression, class oppression etc. However,
what is more concerning is the growing tendency in the assaulters to record the
sexual assaults in their digital devices. In the Chennai case, the assaulters
allegedly raped and recorded each another’s act of raping of the child victim.
These videos were used to blackmail the child to prevent her from reporting and
surrender to more sexual assaults. Often it is asked as why do these rapists,
sexual assaulters, physical assaulters and bystanders record the incidents? <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;"><span style="mso-tab-count: 1;"> </span>We do
have one answer: these videos are made to blackmail and threaten the victim so
that she would be surrendering to the assaulter’s demand for more sex.<span style="mso-spacerun: yes;"> </span>These videos actually create something which
many of us know as non-consensual porn (and not revenge porn necessarily). Noticeably,
one of the main aims of the POCSO Act was to curb pornography, especially child
porn materials. Ss. 13 and 14 of the POCSO Act therefore spoke about creation
of child porn materials using children in any form whether or not such contents
may be used for self gratification or for circulation for unethical profit and
punishment for the same. On the other hand, if the victim is an adult, one may
have to club up Ss.375 (rape), 376D(gang rape), 354 C (voyeurism) of IPC,
Ss.66E (violation of Privacy), 67 (punishment for publishing or transmitting
obscene materials in the electronic form) , and 67A (punishment for publishing
or transmitting sexually explicit materials in the electronic form) to address
the issue of creation of gang rape videos. However, as may be seen in several
reported cases of sexual assaults, rapes and gang rapes, such existing laws
could hardly do anything to control the (pervert) human minds from creating
sexual assault videos. While in majority of the cases, such videos are made to
blackmail the victim/s, possibilities of other reasons for creation of such
videos cannot be ruled out; these reasons could be as follows:<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 150%; margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span style="font-family: Wingdings; font-size: 14.0pt; line-height: 150%; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">Using
the same for self sexual gratification post the physical act of raping, sexually
assaulting women and children.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span style="font-family: Wingdings; font-size: 14.0pt; line-height: 150%; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">Using
the same as erotica for sex-service providers including sex workers from whom
these assaulters may ‘buy’ sex.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span style="font-family: Wingdings; font-size: 14.0pt; line-height: 150%; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">Showing
the same as sexual valour to ‘friends’. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span style="font-family: Wingdings; font-size: 14.0pt; line-height: 150%; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">While
the above may be used for non-profitable reasons, such videos may also earn good
money for the creators/producers if the same is circulated for consummation by
consumers of ‘porn videos’ of deep dark net. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 150%; margin-left: 39.0pt; mso-add-space: auto; mso-list: l0 level1 lfo1; text-align: justify; text-indent: -18.0pt; text-justify: inter-ideograph;">
<!--[if !supportLists]--><span style="font-family: Wingdings; font-size: 14.0pt; line-height: 150%; mso-bidi-font-family: Wingdings; mso-fareast-font-family: Wingdings;"><span style="mso-list: Ignore;">Ø<span style="font: 7.0pt "Times New Roman";"> </span></span></span><!--[endif]--><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">In
certain cases these videos may also be used to threaten members of socially and
economically (extremely) backward communities so that such members do not get
indulged in any activities that may have been prohibited by<span style="mso-spacerun: yes;"> </span>so called ‘social norms’ which may not have
any legal support.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-left: 21.0pt; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">In my recently published
monograph titled Child sexual abuse and protection laws in India (published by
Sage, (<a href="https://uk.sagepub.com/en-gb/eur/child-sexual-abuse-and-protection-laws-in-india/book263196">https://uk.sagepub.com/en-gb/eur/child-sexual-abuse-and-protection-laws-in-india/book263196</a>)
I have shown how sexual contents available in the cyber media including digital
messaging services, social media websites and adult websites may impact on the
adolescent minds who may have been brought up in a restricted, orthodox society
where sex education itself may be considered as a taboo. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-left: 21.0pt; text-align: justify; text-indent: 15.0pt; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">The existing
laws here miserably fail to prevent creation of sexual assault videos because
the perpetrators may remain anonymous creators/publishers. Interestingly, the Telecom
Regulatory authority of India (TRAI) allows an individual to have multiple
numbers of SIM cards. Even though the mobile network services are now being
activated only on verification of Adhar data, there still remains a policy gap
which allows customers to get “free Sims” which may have been pre-owned, swap
Sim cards with other holders who may not be using such Sims for legal purposes
etc. Along with this, the possibility of spreading the said video/s virally on
the net also creates a huge problem to identify the real publisher/creator of
the video. The courts may prescribe punishment in such cases by identifying the
accused in the videos and on the testimony of the victim and the perpetrator himself
that the video was created during the rape /sexual assault. Indeed the role of
cyber forensic examination may not be denied here. But that may involve a
lengthy process especially when the investigating officer may not be aware
about the whole mechanism. But unfortunately no law can practically prevent any
assaulter from recording the crime when it is happening. Resultant, more
videos/still images may be created and may remain unnoticed as long as the investigating
team may explore all possible devices and networks through which the same
was/were created, stored and circulated, which is practically impossible. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-left: 21.0pt; text-align: justify; text-indent: 15.0pt; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;">Facebook has
come with face-recognition mechanism to prevent online circulation of sexual
assault/rape /revenge porn materials. Other social media websites may also
follow the same method. But what we need to know is such videos may not always be
circulated through such websites. As I mentioned above, they may be stored in multiple
devices or may be made viral by networking services including<span style="mso-spacerun: yes;"> </span>digital messaging services. As such, the government
stake holder like the TRAI, manufacturers of smart phones, hi-tech digital
devices, digital messaging service providers, telecom service providers and
other international mobile network service providers must join hands in
creating a solid policy to identify mechanisms to prevent misuse of the digital
device equipped with camera, the Sim cards and of course the mobile and digital
network and communication services.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-left: 21.0pt; text-align: justify; text-indent: 15.0pt; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 150%;"></span></div>
<div class="MsoNormal">
<i><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 115%;">Please
Note: Do not violate copyright of this blog. If you would like to use informations
provided in this blog for your own assignment/writeup/project/blog/article,
please cite it as “Halder D. (2018), "</span></i><span style="font-family: "Bookman Old Style","serif";"> Recording sexual assaults and rape in mobile phones:
How laws fail to control growing sexual
assault on women and children</span><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 115%;">” 20<sup>th</sup>
July, <i>published in http<span class="apple-style-span"><b>://debaraticyberspace.blogspot.com</b></span></i></span><span style="font-family: "Bookman Old Style","serif";"><o:p></o:p></span></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/blogwomen/blog2018/chennai%20rape.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "Calibri","sans-serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-IN; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: "Times New Roman"; mso-fareast-language: EN-IN; mso-fareast-theme-font: minor-fareast; mso-hansi-theme-font: minor-latin;">[1]</span></span><!--[endif]--></span></span></a>
<span lang="EN-US" style="mso-ansi-language: EN-US;">For more, see https://www.ndtv.com/chennai-news/chennai-17-arrested-for-allegedly-sexually-assaulting-11-year-old-girl-in-chennai-for-several-months-1884531<o:p></o:p></span></div>
</div>
</div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-1304468104283098312018-06-27T08:09:00.000-07:002018-06-28T00:05:54.146-07:00CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<a href="https://youtu.be/c4mtQsV9iUg">https://youtu.be/c4mtQsV9iUg</a><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-2221865737018070332018-06-02T20:45:00.003-07:002018-06-09T04:26:55.589-07:00Judges, cops and civil servants: Can they have Social media friends in reality?CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-L1BjSLiW_8M/WxNkDdcQCrI/AAAAAAAAAYA/Q5qps7TNCl0rDNGfOLSu9chJRnuIZ2TsQCLcBGAs/s1600/transfers-bihar-ias_2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="344" data-original-width="520" height="211" src="https://1.bp.blogspot.com/-L1BjSLiW_8M/WxNkDdcQCrI/AAAAAAAAAYA/Q5qps7TNCl0rDNGfOLSu9chJRnuIZ2TsQCLcBGAs/s320/transfers-bihar-ias_2.jpg" width="320" /></a></div>
<div style="text-align: center;">
<i>Image courtesy: Internet </i></div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
</div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">In the fag
end of May, 2018, news channels flashed the story of Major Nitin Leetul Gogoi,
the army man who is hero to some and villain to some because of his
controversial act of tying a Kashmiri man to a jeep using him as a human shield
against the stone –pelters who were targeting army actions in Kashmir last
year. He became (in)famous to many because the clippings of his controversial
act became viral on the web. He grabbed the headlines again this month because
of his controversial Facebook friendship with a Kashmiri woman who, the media
says was trying to check in<span style="mso-spacerun: yes;"> </span>with the
Major and another person in a local hotel in Kashmir. It was reported that the
said woman had claimed that she knew the Major through Facebook and his account
was not in his real name. We know that social media including Facebook is used
for secret surveillance by the government agencies and it has positive and
negative aspects as well. Fake accounts are used by the police to detect and
trap criminals including paedophiles, fraudsters and even terrorists. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">But
here, I am not actually concerned about pattern of use of social media by the
government officials. I am concerned about professional ethics of certain categories
of government servants who may not be allowed to befriend common people like
what social media offers. This category may include judges belonging to higher
and lower judiciary, government officials belonging to certain all India
services including group A and B of central services etc. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">Let me
explain it broadly here:<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">Since
ancient times judges are considered to be of high moral and judiciary is
considered to be “an institution of integrity”. Several judgements including
K.P.Singh vs. High Court of H.P. &ors,<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></span></a>
High Court of Judicature for Rajasthan vs. Ramesh Chand Paliwal,<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[2]</span></span><!--[endif]--></span></span></a></span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">
</span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">Tarak Singh vs. Jyoti Basu,<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn3" name="_ftnref3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[3]</span></span><!--[endif]--></span></span></a>
etc had established the fact that judges are expected to be like <i style="mso-bidi-font-style: normal;">hermit</i>, they should be honest and should
“adhere to a code of moral value”.<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn4" name="_ftnref4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[4]</span></span><!--[endif]--></span></span></a>
In short, they should be <i style="mso-bidi-font-style: normal;">inapproachable </i>personally<i style="mso-bidi-font-style: normal;"> but approachable</i> as an institution to
be impartial. What does this mean? Judges cannot be on par with general
individuals who may approach the institution of justice, i.e., the courts for
seeking justice. They should not make themselves individually or privately
approachable so that the possible litigants, who may approach their <span style="mso-spacerun: yes;"> </span>courts, may not influence him. It is the
principle of <i style="mso-bidi-font-style: normal;">fair justice</i> which to a
large extent governs the code of conduct of judges. But we need to remember
that in this era of social media, any individual can hardly be out of the <i style="mso-bidi-font-style: normal;">net . </i>While it is still expected that
judges should not make themselves privately approachable, I myself have loads
of Facebook friends who are in the judiciary. They share opinions, their
personal photos with their chosen friends just like any other individual. But
yes, their circle of friends may not be as big as any other common social media
user. Many of them are directly connected with the Facebook pages of District
legal services authorities, which not only spread awareness about legal rights,
but also showcase performances of the particular government offices.<span style="mso-spacerun: yes;"> </span>However, I do not have Facebook friends from
higher judiciary, but nonetheless, many of “Their Lordships” <i style="mso-bidi-font-style: normal;">may</i> be easily approachable because of <span style="mso-spacerun: yes;"> </span>digital messaging services like WhatsApp,
which may be used to create ‘groups’ as well.<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn5" name="_ftnref5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[5]</span></span><!--[endif]--></span></span></a>
World wide this has become a cause of concern now; it has been suggested by
many that judges while in service, should try to avoid social media as this may
pull them in unnecessary trouble and make floodgates open for questioning their
integrity.<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn6" name="_ftnref6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[6]</span></span><!--[endif]--></span></span></a>
But again, we can neither ignore the strong (social media) presence of judges
like Justice Markendey Katzu, former Supreme Court judge who had courted
controversy because of his blog posts, social media posts for strong criticism
of court decisions.<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn7" name="_ftnref7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[7]</span></span><!--[endif]--></span></span></a>
Doesn’t this show that he may still be considered as falling in the ‘restricted
netizen’ category even as a retired judge? Probably <i style="mso-bidi-font-style: normal;">yes</i> because he may never be seen as a general individual who may
criticise judges and their judicial understanding of cases by virtue of his
being a judge himself who is expected to not to lower the respect the
judiciary; probably <i style="mso-bidi-font-style: normal;">no</i>, because he
may still use his right to speech and expression to express his displeasure for
the judgements which according to him, are not fare. But still then, he could
not be equal to general individuals: the court questioned his act towards
publishing post in social media criticising court’s decision in crucial cases
like the final verdict of the sensational case of Soumya, who was killed by her
rapist.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;"><span style="mso-tab-count: 1;"> </span>High level civil servants including
bureaucrats, officers of Indian Police Services etc have a high presence in the
social media too. Most of their accounts may be private accounts. But there are
several pages of their offices which may be made by their respective offices.
This actually shows that even though the government and the courts continue to
question data policy of social media companies like Facebook or Twitter, these
social media sites are very much involved in government outreach mechanisms:
for example, see the websites of certain city police offices/headquarters; all
may show their Facebook presence. </span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;"><a href="http://ahmedabadcitypolice.org/"><span style="mso-bidi-font-family: "Times New Roman";">http://ahmedabadcitypolice.org/</span></a></span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">, https://www.bcp.gov.in/ ,</span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">
<a href="http://www.tnpolice.gov.in/CCTNSNICSDC/Index?0"><span style="mso-bidi-font-family: "Times New Roman";">http://www.tnpolice.gov.in/CCTNSNICSDC/Index?0</span></a></span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;"> ; all may have their Facebook and
twitter pages where individuals may access for information and even to reach
out concerned police offices for immediate lodging of complaints. But private
accounts of IAS or IPS officers are not connected with these pages. This means
that they have a separate private presence in the social media. Their friends,
their posts and their photographs are their private affairs just like any other
general individual who may use social media sites for reaching out to friends. But
still, they may not be out of surveillance for their conduct in their private
social media accounts. Their children may also be held accountable for sharing
parents’ pictures which may raise questions about their integrity: erstwhile
J&K DIG Beig invited hoards of controversy when his son posted certain
pictures of his dad which raised <i style="mso-bidi-font-style: normal;">media
storm</i> because the posts suggested that Beig was abusing power.<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftn8" name="_ftnref8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">[8]</span></span><!--[endif]--></span></span></a>
Even though the son removed the posts, the pictures and hashtags were made
viral and they are still available on internet.<span style="mso-spacerun: yes;">
</span>It may actually mean that these officers may not have a private life
even in social media. Gogoi in the same way, may also not have that privacy
even if he may claim that he and the woman in question personally knew each
other and this friendship was neither professional, nor was an abuse of power
for harassing the girl offline or online. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">In
short, why such friendships between officers and civilians, their online
presence and activities may raise questions at all? Misuse of power to harass
and exploit civilians especially women could be one primary reason for such
enthusiasm. But in case the friendships are genuine, posts by the officials reflect
their personal and independent opinions and photographs shared in their social
media sites are personal memoire , why they should be targeted and who makes
these posts (in)famous for public and media? It is those ‘friends’ who may
knowingly or unknowingly feed the enthusiastic ‘third persons’ by sharing
/showing the private posts that may appear in their time line feeds. Remember
Merin Joseph, the young IPS officer from Kerala who being a police officer
herself, could not remain safe online? She had to encounter fake profiles with
her picture, trolls and misogynist posts even though she was sharing some posts
as a private person and not as an on duty officer. Trolls attacked her<span style="mso-spacerun: yes;"> </span>posts and albums, some of which were not for
public viewing. Privacy may be myth for these <i style="mso-bidi-font-style: normal;">public servants</i> <span style="mso-spacerun: yes;"> </span>especially
when they are active<span style="mso-spacerun: yes;"> </span>in their
private<span style="mso-spacerun: yes;"> </span>social media accounts. Compared
to 1990’s public servants have become more accountable now because of their web
presence. After each UPSC result declarations, the social media accounts of
successful candidates may immediately come into lime light. It works positively
because their conduct becomes more transparent to public; it works negatively
because they may slowly lose privacy being within the private social media
account. The <i style="mso-bidi-font-style: normal;">very much private persons</i>
suddenly come under lime light as not only the common people , but also the
media starts data mining<span style="mso-spacerun: yes;"> </span>to know them
more than what is expected to be known. One name which comes in my mind right
now is of Sandeep Nanduri, IAS, who is presently the District magistrate and collector
of Tuticorin district. He had taken over as DM and collector Tutircorin at a
very crucial time when the district was having agitation over Sterlite copper
industries plant closure issue. Nanduri’s Facebook account may reveal his activities
as a government official as well as a private individual. This may further mean
that not only he himself, but his wife may also be targeted by trolls, stalkers
and miscreants who may wish to approach him.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">Untill
now there is no clear-cut code of conduct framed for restricting judges and
grade A and B officers of central government or even state government services from
using social media (except<span style="mso-spacerun: yes;"> </span>for certain
issues like restriction from spreading hatred, criticising the government in
certain key issues, leaking confidential data etc) and befriending <span style="mso-spacerun: yes;"> </span>common people. They however may have to rely
on the social media policies for data protection. But again, in such cases,
they may be held responsible for choosing their virtual friends. We should not
forget that there are instances <span style="mso-spacerun: yes;"> </span>of honey
trapping of government officials by ISI secret services; this may however show
that privacy of the government officials may easily be breached if they
themselves are not vigilant enough for their social media ‘friends’. There are
clearly two arguments which may made in this regard: (i) such government
servants may be completely barred from making themselves available to ‘public’
through their private social media<span style="mso-spacerun: yes;">
</span>accounts , (ii) being part of <span style="mso-spacerun: yes;"> </span>digital India movement they must be
approachable to people through social media as well. However, considering the
privacy and security aspects, I feel it is high time that government<span style="mso-spacerun: yes;"> </span>makes a clear<span style="mso-spacerun: yes;">
</span>policy as how they should be protected from predators and how they
should conduct even when they are ‘<i style="mso-bidi-font-style: normal;">privately
public’</i>.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%;">
<i style="mso-bidi-font-style: normal;"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">Please
Note: Do not violate copyright of this blog. If you would like to use
informations provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),</span></i><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">
“</span><b style="mso-bidi-font-weight: normal;"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">Judges, cops and civil servants: Can they have Social media
friends in reality?”</span></b><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;">3<sup>rd</sup> June, 2018, <i style="mso-bidi-font-style: normal;">published in http<span class="apple-style-span"><b><span style="color: black; mso-bidi-font-style: italic;">://debaraticyberspace.blogspot.com</span></b></span></i></span><b style="mso-bidi-font-weight: normal;"><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 150%;"><o:p></o:p></span></b></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<br /></div>
<div style="mso-element: footnote-list;">
<!--[if !supportFootnotes]--><br clear="all" />
<hr align="left" size="1" width="33%" />
<!--[endif]-->
<br />
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[1]</span></span><!--[endif]--></span></span></a>
LPA No. 163 of 2009<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[2]</span></span><!--[endif]--></span></span></a>
<span style="mso-spacerun: yes;"> </span>(1998) 2 SCC 72<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn3" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref3" name="_ftn3" style="mso-footnote-id: ftn3;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[3]</span></span><!--[endif]--></span></span></a>
(2005)1 SCC 201<span lang="EN-US" style="mso-ansi-language: EN-US;"><o:p></o:p></span></div>
</div>
<div id="ftn4" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref4" name="_ftn4" style="mso-footnote-id: ftn4;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[4]</span></span><!--[endif]--></span></span></a>
<span lang="EN-US" style="mso-ansi-language: EN-US;">See for more in </span><a href="http://hpsja.nic.in/ethics.pdf"><span lang="EN-US" style="mso-ansi-language: EN-US;">http://hpsja.nic.in/ethics.pdf</span></a><span lang="EN-US" style="mso-ansi-language: EN-US;">. Accessed on 26.05.2018<o:p></o:p></span></div>
</div>
<div id="ftn5" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref5" name="_ftn5" style="mso-footnote-id: ftn5;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[5]</span></span><!--[endif]--></span></span></a>
<span lang="EN-US" style="mso-ansi-language: EN-US;"><span style="mso-spacerun: yes;"> </span>For example, see Maniar Gopi (2017),Vadodara:
Gujarat HC slams VMC commissioner for sending WhatsApp message to judge.
Published in India today on Semptember 8, 2017 https://www.indiatoday.in/india/story/vadodara-gujarat-hc-vmc-commissioner-whatsapp-message-judge-1040341-2017-09-08<o:p></o:p></span></div>
</div>
<div id="ftn6" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref6" name="_ftn6" style="mso-footnote-id: ftn6;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[6]</span></span><!--[endif]--></span></span></a>
<span lang="EN-US" style="mso-ansi-language: EN-US;">For better understanding, see Singh
Shaziah (2016), FRIEND REQUEST DENIED: JUDICIAL ETHICS AND SOCIAL MEDIA,
Published in Journal of Law, Technology & the Internet · Vol. 7 · 2016.
Accessed from https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1099&context=jolti
on 25.05.2018<o:p></o:p></span></div>
</div>
<div id="ftn7" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref7" name="_ftn7" style="mso-footnote-id: ftn7;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[7]</span></span><!--[endif]--></span></span></a>
<span lang="EN-US" style="mso-ansi-language: EN-US;">For more understanding, see Vaidyanathan.A
(2017), Justice Markandey Katju Submits Apology In Supreme Court Over Post
Criticising Soumya Verdict, published in https://www.ndtv.com/india-news/justice-markandey-katju-apologises-to-supreme-court-over-post-criticising-soumya-verdict-1645845
on 06-01-2017. Accssed on 25-05-2018<o:p></o:p></span></div>
<div class="MsoFootnoteText">
<span lang="EN-US" style="mso-ansi-language: EN-US;">,.<o:p></o:p></span></div>
</div>
<div id="ftn8" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="file:///F:/ccvc/writeups/wion/judgescivikservantssocialmedia%20friednsdebarati.docx#_ftnref8" name="_ftn8" style="mso-footnote-id: ftn8;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[8]</span></span><!--[endif]--></span></span></a>
<span lang="EN-US" style="mso-ansi-language: EN-US;">For example, see Bashaarat
Masood (2014),J&K DIG’s son posts photos of ‘Dad & I’ enjoying perks of
power, published in
http://indianexpress.com/article/india/india-others/jk-digs-son-posts-photos-of-dad-i-enjoying-perks-of-power/
on Octiober 29,2014. Accessed on 25.05.2018<o:p></o:p></span></div>
</div>
</div>
<br />
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-27106959985374164442018-03-27T05:18:00.001-07:002018-03-27T05:19:42.168-07:00Making pregnancy vlog? Beware! You may be feeding the porn consumersCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-mbHHXBLmZDY/Wro1Xere_UI/AAAAAAAAAWs/0NkpnEWiDxc5-wJ9bGJeVKI5FG-io2RzwCLcBGAs/s1600/pregnancy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="767" data-original-width="813" height="301" src="https://4.bp.blogspot.com/-mbHHXBLmZDY/Wro1Xere_UI/AAAAAAAAAWs/0NkpnEWiDxc5-wJ9bGJeVKI5FG-io2RzwCLcBGAs/s320/pregnancy.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Often it is told that womanhood comes to full circle when a
woman becomes a mother.<span style="mso-spacerun: yes;"> </span>Being a mother either
biologically or by way of adoption is indeed a unique experience because it not
only gives the joy of nurturing another life, it may make the woman more
responsible in every sense. <span style="mso-spacerun: yes;"> </span>For every
woman the phases of motherhood bring special moments. For some, these phases
may start right from the day of conceiving, for some it may start when she
decides to adopt a baby, for some it may start right from the moment of the
birth of the baby. In this digital era many couples (especially women) like to
capture the moments of motherhood by making digital photo albums or vlogs . In
India this phenomena is rapidly catching up. Pregnancy photo shoots, baby
birthing photos and videos, new born photo shoots etc are trending now a days. YouTube<span style="mso-spacerun: yes;"> </span>and Instagram are chosen platforms to upload
such videos or images. YouTube especially <span style="mso-spacerun: yes;"> </span>provides wonderful opportunity to easy creation
of amateur vlogs. YouTube users may also use specific tags for listing the
video with certain steams like pregnancy and child birth, medical learning,
fitness during pregnancy, know hows <span style="mso-spacerun: yes;"> </span>of
child births and neo natal care by new parents etc. Many of such users love to
share such vlogs or images (through other social media platforms and digital
messaging apps ) with their virtual friends and groups. I personally have come
across several of such videos and images which may have been as old as 2, 3 or
even 5 years. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">But they may not bring back the good old
memories always. Pregnancy and child birthing videos and images are hugely
consumed by porn industry consumers as well. Several researches on pornography including
non-consensual and revenge porn have shown existence and growth <span style="mso-spacerun: yes;"> </span>of different sorts of porn contents which may include
black porn, older women porn, nude porn, voyeur, amateur porn, big belly porn
and preggo porn. The last one, i.e. preggo porn is actually made with women
showing different types of pregnant belly formation, sloth movement of pregnant
women with huge belly, (supposedly) movement of the baby within the belly and
the corresponding gasping or painful twitching of the body of the pregnant
woman and necessarily the breasts which may be half covered. These contents are
made by porn actors who may or may not <span style="mso-spacerun: yes;"> </span>be pregnant in real life. Generally these porn
actors may be clad in under wears right from the beginning of the video to give
an impression of real life birthing scenes. Several videos may also show women
slowly removing dresses: such videos may actually give impression that the
woman suddenly developed labour pain at home or at some place other than the
hospitals. All such videos may have similar tag lines like the original
pregnancy and birthing videos, i.e., pregnancy, child birth. The ancillary tag
line could be ‘fake’ or ‘prank’ or ‘sexy preggo’. As such, these taglines may
also pull the real pregnancy and birthing videos in the pool of sexually
consumable contents. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Getting sexual
gratification from the birthing scenes and scenes of labour pain is indeed a
sign of perversion. <span style="mso-spacerun: yes;"> </span>But what is more disheartening
is how the porn industry has grown preggo porn stream on the basis of this
perversion. If one notices the comment sections of such videos, one may see
that the woman in the video may be asked to act more accurately in the next
video, the woman may also be asked <span style="mso-spacerun: yes;"> </span>to
make videos with different pregnancy postures and sounds of pain which may
create more erotica. The producers and actors of these videos may earn a good
profit depending upon their presentation and ‘perfect’ acting. Unfortunately
the real pregnancy vlogs may also be consumed with equal ‘interest’. The new
mother<span style="mso-spacerun: yes;"> </span>may get trolled in the comment
section for her belly shape or for taking too much time to make the ‘birthing
sounds’ or ‘labour pain’ moments which may be sexually gratifying for the ‘consumers’
of the videos. Some may even get trolled for ‘wasting time’ of the viewer. Often
the creators of genuine vlogs may not get time to look into the comments which
may be extremely disturbing for any new mother. Even if the creator would have
disabled the comments, the links of the videos may still be shared with a
malicious object to consume it as porn. <o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">While the ‘victims’ may
definitely take the matter to the websites for removing the offensive posts or
to the police and courts <span style="mso-spacerun: yes;"> </span>for taking
action against the comment maker for making obscene, sexually explicit or <span style="mso-spacerun: yes;"> </span>misogynist or (as it may happen <span style="mso-spacerun: yes;"> </span>in several cases) racist and hate comments,
the website, the police and courts and above all, the families may find hard to
prevent themselves from ‘victim blaming’ for uploading ‘those private moments’
for ‘public viewing. In remote possibility, the content may even be considered
as non-consensual porn (but not revenge porn) in case the police and the courts
decide to book the perpetrators who may have made obscene, sexually explicit or
<span style="mso-spacerun: yes;"> </span>misogynist or racist and hate comments
or who may have shared the video as porn content <span style="mso-spacerun: yes;"> </span>to others either for unethical gain or just
for the sake of sharing ‘another porn content’. The legal provisions for voyeurism
may also be applied in this regard along with provisions for making word etc
for harming the modesty of women, inappropriate representation of woman
concerned etc. But the new mother may not be saved from acute trauma and
depression which may arise from this.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;">Pregnancy vlogs may be
considered as unique examples of rights to expression which should not be
violated at any cost. But again, we as responsible society must work together
to prevent such wonderful moments to be destroyed by perverts and perpetrators.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "garamond" , "serif"; font-size: 18.0pt; line-height: 150%;"></span></div>
<div class="MsoNormal" style="line-height: normal; text-align: justify;">
<span class="apple-style-span"><i><span style="font-family: "georgia" , serif; font-size: 16pt;">Please Note: Do not violate copyright of this blog. If you would like to
use informations provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),</span></i></span><span style="font-family: "georgia" , "serif"; font-size: 16.0pt;"> “</span><span style="font-family: "georgia" , serif;"><span style="font-size: 21.3333px;">Making pregnancy vlog? Beware! You may be feeding the porn consumers</span></span><span style="font-family: "georgia" , serif; font-size: 16pt;">” 27th March, 2018</span><span class="apple-style-span" style="font-family: "georgia" , serif; font-size: 16pt;"><i>, published in
http://debaraticyberspace.blogspot.com/</i></span></div>
<div class="MsoListParagraphCxSpMiddle" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoListParagraphCxSpLast" style="line-height: 150%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<br /><div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-61805773878122149022018-02-10T03:28:00.000-08:002018-02-10T03:28:01.891-08:00Right to Love on social media on Valentine’s Day CYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-mlWEQ31I1ZM/Wn7TArcp63I/AAAAAAAAAVk/wIMcP8chx-Y37HqZ7uhlG5hTKIk8inhmACLcBGAs/s1600/images%2B%25283%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="181" data-original-width="278" height="260" src="https://4.bp.blogspot.com/-mlWEQ31I1ZM/Wn7TArcp63I/AAAAAAAAAVk/wIMcP8chx-Y37HqZ7uhlG5hTKIk8inhmACLcBGAs/s400/images%2B%25283%2529.jpg" width="400" /></a></div>
<div style="text-align: center;">
<i>Image curtsy: Google</i></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">Come Valentine’s Day and social media and digital messaging
services like WhasApp or Snapchat are flooded by beautiful heartwarming
messages, pictures and emogies. Nonetheless, Facebook, Instagram , Whatsapp
YouTube and also some adult networking sites may see more contributions of nude
videos, <b><a href="https://www.cambridge.org/core/journals/international-annals-of-criminology/article/revenge-porn-by-teens-in-the-united-states-and-india-a-sociolegal-analysis/0101863D5ADA5972868D0B1B59BFFC67" target="_blank">revenge porn</a></b>, <a href="https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900" target="_blank">fake avatars</a>
as well by jilted lovers. The other type of messages that one may get to see in
these platforms are those from <b>moral
policing groups</b> asking people to refrain from ‘celebrating Valentine’s day’
in Facebook, Twitter and other social
media . Such message can be ‘shared messages’, can be opinions or even can be
clear threats to ‘whoever’
‘celebrates ‘Valentine’s day’. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">The question is, do we have something called <b>Right to love</b>? Can this right be
considered to be violated if someone
posts messages against celebration of Valentine’s day ? <b>Universal
Declaration of Human Rights (UDHR) </b>does not specifically speak about <b>right to love</b>, but it flows from <b>Article 16 (Right to marriage and family) and
Article 19 (freedom of opinion and expression)</b>. All most all countries with modern
constitution including India, UK, Singapore, US, Canada, Australia, countries
from European union including Germany, France, Spain etc do
recognize the <b>right to choose and
communicate</b> with dating partner,
live-in partner , same sex partners and heterosexual partners for emotional
bondage including marriage because these
countries recognize <b>right to express opinion, freedom of speech and expression and also
right to marriage and family</b>. While right to form family by way of live-in
relationships or homosexual
partnerships have been recognized
by several countries by way of
legitimizing the rights of children born
out of such union or adopted in such
marriages, some countries may not
recognize Live-in relationships or same sex marriages in <b>real life</b> . <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">But <b>right to chose
emotional partners</b> and <b>right to communicate</b>
to the same on cyber space are not barred by any law. For example, even when
Indian Supreme court did not apply <a href="http://www.timesnownews.com/india/article/supreme-court-section-377-constitution-bench-lgbt-lesbian-gay-queer-bisexual-transgender-unnatural-sex/186578?utm_source=google-adwords&utm_medium=cpc&utm_campaign=1025798098&utm_term=&utm_matchtype=b&utm_placement=&gclid=EAIaIQobChMI1ajY_Zyb2QIVkYaPCh0o7gIyEAAYASAAEgJPLvD_BwE" target="_blank">doctrine of severability to S.377 todecriminalize same sex union</a> and consider the rights of transgender people to
be recognized as 3<sup>rd</sup> gender people, or even when the US did not
<a href="http://www.bbc.com/news/world-us-canada-33290341" target="_blank">legalize gay marriages,</a> Facebook had
pages and groups meant for socializing and creation of emotional bonding
between LGBTQ people<b>. Right to love is rather an
abstract idea </b>which may be expressed when a person starts <b>expressing the love</b> to his/her chosen
person on a specific platform. Seen from this aspect, right to love on cyber
space may be barred <b>only under specific circumstances</b>, i.e., when
the same expression offends the ‘target’ person because he/she may not like to
develop any emotional relationship with the person expressing the feelings either because the relationship
falls under the <a href="https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900" target="_blank">concept of stalker and victim, ex lover or spouse </a>where the
victim ex does not want to be connected with the other person anymore, or a real life acquaintance including workplace
acquaintance who had accepted to be friends with the other person expecting <b>reasonable distance and privacy</b> , or a stranger who may not like to be approached by way of
expressing <i>eros</i>. Similarly, positive reciprocation
of love on cyber space may not be offensive unless the receiver/reciprocator is
knowingly committing any mistake like that of breaking
trust of a married partner. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">A person may however be deterred from exercising his/her
right to love an acclaimed criminal only when such relationship may prove to be
hazardous for the <b>security of the nation
or for the society at large.</b> But he/she
may not be held guilty for such love affair on cyber space when he /she can
prove his/her innocence in knowledge about the particular acclaimed criminal. He/she
may even <a href="https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900" target="_blank"><b>claim compensation</b> </a>under
certain circumstances when such fraudulent relationship causes damage to
him/her as well. But note that I am speaking about <b>being offended from the perspective of the receiver of the message
carrying an expression of love and not the bystanders in case such message are
posted on some one’s timelines or in a common group or in a page and it is
publicly visible</b>. Moral policing groups against celebration of Valentine’s
day may go ahead with their propaganda of
threats of <a href="https://scroll.in/article/704157/hindutva-helpline-couples-declaring-love-on-facebook-will-be-married-off" target="_blank">‘devastating results’</a> on
the understanding that whoever exercises
right to love either by way of expressing love for some one, or by showing a status ‘in love with X’ or by even reciprocating
to such message by words or emogies or
even by thumbs up should be considered as
‘dangerous’ for the society as a whole. Some
radical groups have even come up with warning that people exercising their’
right to love’ will be straightaway married
off or they will be warned to
stop displaying (exercising their right
to) love. Understandably such
sorts of warning messages may have been made to create fear in the minds
of individuals who may belong to
orthodox patriarchal families where love marriages are not allowed or where threats of honor killings exists . Such
radical groups are targeting those
individuals who may be <b>new generation
social media users</b> and whose families including parents may not know their
digital whereabouts. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">The question is, would such announcements by such radical
groups be considered as <b><a href="http://digitalcommons.law.umaryland.edu/fac_pubs/1144/" target="_blank">hate speech</a></b>
or <b><a href="https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900" target="_blank">threat speech</a></b>? There may be varied
opinions for this. If the statement/s show
that the commentator/s may track the
whereabouts of the persons who are
expressing their love on Facebook or any other social media on valentine’s day to commit some harm, the
speech may be considered as threat speech especially because they may indicate
violation of privacy and also intention to commit harm (even if it is arranging
marriage, which may be the ultimate the aim of the love birds). <b>Women</b> especially may feel threatened
because this may result in offline and online reputation damage, rape threats
(especially if it is an inter religious affair) or even grave threats
to their lives. Some , including the social
media website may consider such speech
as absolutely normal because such speech may seem to be very broad to be fitted within the meaning of hate speech or threat speech
because such speeches may be ‘general’ and may not target any specific individual,
class or community of people. But we
must not forget that online mob violence
may become extremely dangerous especially when such instigating comments or
posts are made. Concerned authorities therefore must not ignore such ‘warnings’.
<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">But I would have been happiest would the moral policing groups
turn their attention to evils done on cyber space and send messages to the
world including possible perpetrators to refrain from creating <b><a href="https://in.sagepub.com/en-in/sas/cyber-crimes-against-women-in-india/book253900" target="_blank">revenge porn</a></b> on the Valentine ’s Day.
In my observation I have seen that on such days several jilted lovers,
revengeful persons and stalkers may create revenge porn stuff to grossly
violate women’s reputation including <a href="http://supremecourtofindia.nic.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf" target="_blank">rightsto privacy. </a><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 150%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Georgia","serif"; font-size: 16.0pt; line-height: 150%;">Let us join hands to prevent spreading of hate and threats
through social media. Let us grow love and not hate.<o:p></o:p></span></div>
<div class="MsoNormal">
<i><span style="font-family: "Georgia","serif";">Please Note: Do not violate copyright of
this blog. If you would like to use informations provided in this blog for your
own assignment/writeup/project/blog/article, please cite it as “Halder D.
(2018), “Right to love on social media on Valentine’s Day ” 10th February, 2018,
published in http://debaraticyberspace.blogspot.com<o:p></o:p></span></i></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
<br /></div>
<div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-83841443106813915152018-02-03T23:47:00.000-08:002018-02-03T23:47:55.705-08:00Why cyber bullying should never be taken as a holistic term for cyber harassmentCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-sUm2vBV464M/Wna24fmdbKI/AAAAAAAAAVE/fOFRldU9dKgUqRaBV54e3HgiAEDyWphygCEwYBhgL/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="276" data-original-width="182" src="https://2.bp.blogspot.com/-sUm2vBV464M/Wna24fmdbKI/AAAAAAAAAVE/fOFRldU9dKgUqRaBV54e3HgiAEDyWphygCEwYBhgL/s1600/images.jpg" /></a></div>
<br />
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">In
a recent academic conference where I was speaking on cyber bullying, I got some
‘strange questions’ as why I am not covering topics like pornography and
obscenity. To me, these questions were ‘strange’
because I was delivering lecture specifically on cyber bullying. But to the
individuals who asked the questions (and this group included academicians and practitioners
from women’s rights group as well), this seemed to be a genuine concern as why
cyber bullying does not mean cyber pornography, cyber obscenity, revenge porn,
cyber stalking or the concept of cyber harassment. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<b><span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: yellow;">Decoding cyber bullying:</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">Many
of us believe that cyber bullying is the holistic term to explain the concept of
cyber harassment. In reality it is not. </span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style", serif; font-size: 18pt;"> Cyber harassment or online harassment is a
holistic term which may include various types of harassments including cyber
bullying. The term cyber bullying is defined as “abuse/ harassment by teasing
or insulting, victims’ body shape, intellect, family back ground, dress sense,
mother tongue, place of origin, attitude, race, caste, class, name calling,
using modern telecommunication networks such as mobile phones (SMS/MMS) and
Internet (Chat rooms, emails, notice boards and groups)”(Jaishankar, 2009).</span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><a href="http://www.stopbullying.gov/">www.Stopbullying.gov</a> explains cyber
bullying as “.........Cyberbullying includes sending, posting, or sharing
negative, harmful, false, or mean content about someone else. It can include
sharing personal or private information about someone else causing
embarrassment or humiliation.” <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">A
clear reading of the definition of Jaishankar and the explanation provided by
Stopbullying.gov would suggest that
cyber bullying includes conveying or posting of insulting, degrading, teasing, messages
in the victim’s timeline, in groups or forums etc. Bullying messages are also
conveyed through one-to one chatting mechanism. Bullying messages may typically
be like “ you are a liar”, or “you look ugly”, or “ you are worthless”, or “x
is a black spot in the team”, or “x is a big zero when it comes to trendy fashion”
etc. Presently, India does not have any cyber bullying prevention law.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">However,
it would be wrong to say that cyber bullying happens to children. Adults may
also be victims of bullying, including workplace bullying. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<b><span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: yellow;">So when does bullying turn into
stalking?</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">Often
people confuse cyber bullying with cyber stalking. We at Centre for Cyber
Victim Counselling had provided a functional definition of cyber stalking in
our 2010 research report which is as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<i><span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">“In one word, when ‘following’ is
added by Mens rea to commit harm and it is successfully digitally carried out,
we can say cyber stalking has happened"</span></i><span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"> (<a href="http://www.cybervictims.org/CCVCresearchreport2010.pdf" target="_blank">Halder &Jaishankar, 2010</a>).<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">S.354D
of the Indian Penal Code (inserted via Criminal Law amendment Act, 2013)
defines cyber stalking as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">“Any
man who follows a woman or contacts or attempts to contact such woman to foster
personal interaction repeatedly despite a clear indication of disinterest by
such woman or whoever monitors the use by a woman of the internet, email or any
other form of electronic communication or watches or spies a person in a manner
that results in fear of violence or serious alarm or distress, in the mind of
such woman or interferes with the mental peace of such woman, commits the
offence of stalking.” <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">Seeing
from the above perspectives we can see several <a href="https://www.researchgate.net/profile/Debarati_Halder/publication/297698704_Cyber_Stalking_Victimisation_of_Women_Evaluating_the_Effectiveness_of_Current_Laws_in_India_from_Restorative_Justice_and_Therapeutic_Jurisprudential_Perspectives/links/56e0521508ae979addf0ee40/Cyber-Stalking-Victimisation-of-Women-Evaluating-the-Effectiveness-of-Current-Laws-in-India-from-Restorative-Justice-and-Therapeutic-Jurisprudential-Perspectives.pdf" target="_blank">stages of cyber stalking</a>: <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><br /></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: red;"><i>The first stage of cyber stalking can be Repeated Pursuing</i></span></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: red;"><i><br /></i></span></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: red;"><i>The second stage can be data mining and/or monitoring.</i></span></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: red;"><i><br /></i></span></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: red;"><i>The third stage can be creating threat /fear in the mind of the victim.</i></span></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">Repeated
pursuing can be in the form of sending /posting messages which may not be
insulting or degrading or annoying at the beginning. This is because the
stalker (especially in case of interpersonal stalking) may not necessarily like
to insult or humiliate his ‘target’. The main aim of the stalker may be to persuade
the victim to enter into an emotional relationship where the stalker may be a
dominant figure. The messages may turn insulting or degrading when the process
reaches the third stage, i.e., when the sender wants the victim to feel
threatened. Stalking may adopt the process of cyber bullying when the victim
refuses to abide by the ‘commands’ or ‘demands’ of the stalker. The later may
then start sending insulting, annoying, degrading messages in order to create a
fear of constant harassment and defamation of the victim. Bullying therefore changes
into the phenomena of cyber stalking when the <b>bully becomes obsessive with his victim and continues to post hurting,
degrading, insulting messages as long as the victim does not start developing a
sense of fear</b>; when he starts monitoring his victim to see the outcome of
bullying or rather, to see how far the victim is affected by bullying. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<b><span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"><span style="color: yellow;">Revenge porn and bullying</span><o:p></o:p></span></b></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">Again,
revenge porn and bullying can be completely different forms of online harassment.
Revenge porn “..........is an act whereby the perpetrator satisfies his anger
and frustration for broken relationship
through publicizing false, sexually provocative portrayal of his /her victim by
misusing the information that he may
have known naturally and that he may have stored in his computer, or may have
conveyed to his electronic device by the victim herself, or may have been
stored in device with the consent of the victim herself; and which may
essentially have been done to publicly defame the victim.”(<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493178" target="_blank">Halder &Jaishankar, 2013)</a>. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">Revenge
porn may necessarily include unethical using of images of the victim for taking
revenge and creating a fake avatar of the victim which may signify the later as
that of bad character. Unfortunately many countries including India do not have
any focussed law to prevent and punish <a href="http://www.livelaw.in/criminalising-revenge-porn-stakeholders-must-not-happy-present-legal-setup/" target="_blank">revenge porn</a>. However, several legal
academicians including cyber civil right activists in the US have proposed revenge porn legislations and
such proposals have been considered as legal provisions to criminalise revenge
porn. In case of revenge porn, the perpetrator may or may not include bullying
tactics to create extra humiliation to his/her victim. I have observed that in
several revenge porn cases, the perpetrator may limit his act to posting to his
own time line with a tagline indicating that the victim is of bad character, or
may create a fake avatar either in the social websites like Facebook or Twitter
etc indicating that the profile owner may solicit sex, or may upload the image
to adult networking websites where all images may be ‘consumed’ as erotica. <b>Revenge porn and bullying may be clubbed up
only when the perpetrator posts/sends annoying, insulting, degrading messages
to the victim or to a group to humiliate the victim with the revenge porn
content</b>, i.e., after he has already created revenge porn and wishes to
continue harassing the victim with teasing messages. However, I would still not
agree to call it cyber bullying; it would be categorised as defamation if seen
from the perspective of defamation laws. S.499 of the Indian Penal Code which states
as follows:<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<i><span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">“Whoever, by words either spoken
or intended to be read, or by signs or by visible representations, makes or
publishes any imputation concerning any person intending to harm, or knowing or
having reason to believe that such imputation will harm, the reputation of such
person, is said, except in the cases hereinafter expected, to defame that
person. Explanation 1.—It may amount to defamation to impute anything to a
deceased person, if the imputation would harm the reputation of that person if
living, and is intended to be hurtful to the feelings of his family or other
near relatives. Explanation 2.—It may amount to defamation to make an
imputation concerning a company or an association or collection of persons as
such. Explanation 3.—An imputation in the form of an alternative or expressed
ironically, may amount to defamation. Explanation 4.—No imputation is said to
harm a person’s reputation, unless that imputation directly or indirectly, in
the estimation of others, lowers the moral or intellectual character of that
person, or lowers the character of that person in respect of his caste or of
his calling, or lowers the credit of that person, or causes it to be believed
that the body of that person is in a loathsome state, or in a state generally
considered as disgraceful.”<o:p></o:p></span></i></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;">As
may be seen from the above, cyber harassment or online harassment therefore is
a bigger term which includes forms of harassment including cyber bullying. It is
essential to understand the differences because the terms may signify different
types of criminal or civil wrongs and as such may attract different types of punishments
by courts of law. For instance, if a victim who has encountered impersonation
(not amounting to revenge porn, but an ordinary impersonation whereby his/her
image had been used to create a profile in the matrimonial site), he/she should
not report the incident as cyber bullying to the concerned website. It should
be ‘impersonation’, meaning the perpetrator has unethically and unauthorisedly
used the personal picture and information of the victim to create harassment.
Depending upon the mens rea, nature of the profile and impact of the same on
the victim’s reputation, the police may book the offender under various
provisions under Information Technology Act and also under Indian Penal Code
for impersonation(for example, Ss 66D of the Information technology Act,
2000(amended in 2008), Ss. 416 & 417, 499, 500 IPC, etc) . In case the
victim is a woman, the police may also include provisions meant for harming the
modesty of women (S.509 IPC). Similarly, in case of stalking, the victim should
rather report the crime as stalking and not cyber bullying because the legal
provisions in India do not recognise any offence of cyber bullying, but
prescribes stringent punishment for stalking. Whereas, in other jurisdictions,
where both cyber stalking and cyber bullying are recognised as offences, both
may have different types of punishments. Further, the social media websites may
also have different reporting mechanism for cyber bullying and cyber stalking. <o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 18.0pt; line-height: 115%;"> However,
cyber bullying still remains in a grey area from legal perspectives. More research
is needed to develop a good universal understanding which may help to demarcate
why cyber bullying be considered as Bad Speech. Further, research is also
needed to create deeper demarcation between different forms of online
harassment for the purpose of better policy developments.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<i><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;">Please Note: Do not violate
copyright of this blog. If you would like to use informations provided in this
blog for your own assignment/writeup/project/blog/article, please cite it as
“Halder D. (2018),</span></i><span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 115%;"> “Why cyber bullying should never be taken
as a holistic term for cyber harassment” 4<sup>th</sup> February, 2018, <i>published in http<span class="apple-style-span"><b>://debaraticyberspace.blogspot.com</b></span></i><o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-45066626959503579462018-01-27T21:52:00.002-08:002018-01-27T21:54:50.754-08:00Help young generation to understand their duties and rights on cyber space: Model Policy Guidelines for Directing Students for Positive Use of Internet Including Social Networking Sites and WhatsappCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-Sg3Mt1cXY_4/Wm1hzZuHLCI/AAAAAAAAAUY/7v_BdBO7PiQAKvNtTZcro_ADvQ0vZVN4gCLcBGAs/s1600/debaratikolkata2017.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="720" data-original-width="960" height="240" src="https://4.bp.blogspot.com/-Sg3Mt1cXY_4/Wm1hzZuHLCI/AAAAAAAAAUY/7v_BdBO7PiQAKvNtTZcro_ADvQ0vZVN4gCLcBGAs/s320/debaratikolkata2017.jpg" width="320" /></a></div>
<br />
<br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">Better late than never! Let us start 2018 with a positive note: let us teach our younger tech savvy generation how to respect women, men and people from LGBTQ groups online. I was invited by UNICEF to represent them in the West Bengal State child protection committee meet on child rights and deliver lecture on online exploitation of children on 21st November, 2017 . I delivered lecture on "Children as consumers and contributors of offensive contents online and role of POCSO Act: a Therapeutic Jurisprudential approach." </span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">We know children are smarter than us the older generation in cyber related issues. But at the same time, it is also our duty to guide children to be more responsible while on internet. I take pleasure in sharing this model policy guidelines which was prepared by me sometimes back. This model policy guidelines may be used by schools, colleges and other stake holders</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;"><br /></span>
<br />
<div style="text-align: center;">
<b><span style="color: orange; font-family: "georgia" , "times new roman" , serif; font-size: large;"><i><u><a href="http://www.cybervictims.org/moderlpgccvc.pdf" target="_blank">Model Policy Guidelines for Directing Students for Positive Use of Internet Including Social Networking Sites and Whatsapp </a></u></i></span></b></div>
<div style="text-align: center;">
<b><span style="color: orange; font-family: "georgia" , "times new roman" , serif; font-size: large;"><i><u><a href="http://www.cybervictims.org/moderlpgccvc.pdf" target="_blank">Dr. Debarati Halder</a></u></i></span></b></div>
<div style="text-align: center;">
<b><span style="font-family: "georgia" , "times new roman" , serif; font-size: large;"><br /></span></b></div>
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;"><b>Objectives & missions of the policy guidelines</b>: To protect children from adversities of internet and educating them for a positive use of internet and social-networking sites.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;"><b>Scope of the policy guidelines:</b> It may be used to educate children from 1st Standard to plus 2. It may also be used to provide guidance for teachers and counsellors to help children for positive usage of internet and social networking sites.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;"><b>The guidelines:</b></span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">1.Every school must encourage children to participate in debates or discussions on internet rights, positive and negative effects of the same. This may be made as a part of the subject of computer science, or as a part of C.C.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">2.Junior students (from the age group of 4-8) must be encouraged to take part in awareness building sessions. In such sessions, the students may be shown how to handle the devices properly and why not to switch on devices without parent’s supervision or permission. For this purpose the schools can consider making small skits with the help of older children and the teachers, or use movie clippings or other audio-visual learning materials.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">3.Students from the age group of 8-13 must be encouraged to attend awareness sessions where they may be taught how to use the internet for positive gain. Given the fact that many study materials and books provide internet links or pages on specific subjects, the students may be encouraged to open such sites in the presence of the teachers. Parent-teacher-student sessions must be made to sensitise parents about the positive use of internet and digital communication technology. Students may be introduced to issues including grooming by paedophiles, values of good talk and bad talk in the internet etc. Students may be slowly introduced to social networking sites. It is not necessary to direct the students to open their accounts. But the students may be asked to take part in discussions on the policy guidelines or terms and conditions that are</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">offered by social networking sites, email service providers etc, and then create their own accounts in the social networking sites.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">4.Students from the age group of 14-17 may be encouraged to open accounts in the social networking sites and add their parents and teachers in their friend circles. They may be encouraged to create their own safety rules and privacy rules and discuss about them with younger students in class debates or awareness sessions. Students may also be encouraged to access informative pages in the social networking sites for gaining more knowledge.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">5.It is important to teach students about rational coping mechanisms if and when they accidentally fall victims of cyber crimes. They must be taught how to use the safety tools to protect themselves, when and how to contact the principals, teachers and parents.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">6.Schools must arrange for workshops on guiding students for positive usage of internet, which may include sessions on copyright violations as well. In such workshops, students may be encouraged to express their thoughts. Such workshops may be conducted with the police personnel, cyber crime experts, and NGOs as resource persons.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">7.Senior students (from the age group of 16-18) may be encouraged to create their own blogs or vlogging sites either on their own or as group effort to show case positive usage of internet.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">8.However, it must be noted that this policy guideline should not be used if the schools wish to use it as the sole guideline for separate types of offences. The author offers to cooperate with the schools to build up unique policy guidelines on the basis of this model policy guideline depending upon the need of every organisation. It is hoped that if the above guidelines are adopted, crimes targeting children by children and adults may be curbed.</span><br />
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;"><br /></span>
<span style="font-family: "georgia" , "times new roman" , serif; font-size: large;">* This model policy guideline was first published in http://www.cybervictims.org/moderlpgccvc.pdf by Dr. Debarati Halder. </span><br />
<div class="MsoNormal">
<i><span style="font-family: "georgia" , "serif"; font-size: 14.0pt; line-height: 115%;">Please
Note: Do not violate copyright of this blog. If you would like to use
informations provided in this blog for your own
assignment/writeup/project/blog/article, please cite it as “Halder D. (2018),
"</span></i><i><span style="font-family: "georgia" , serif;"><span style="font-size: 18.6667px;">Help young generation to understand their duties and rights on cyber space: Model Policy Guidelines for Directing Students for Positive Use of Internet Including Social Networking Sites and Whatsapp</span></span><span style="font-family: "bookman old style" , serif;"><span style="font-size: 21.3333px;">"</span></span></i><span style="font-family: "georgia" , serif; font-size: 14pt; line-height: 115%;">, <i>published
in http<span class="apple-style-span"><b>://debaraticyberspace.blogspot.com on 28-01-2018</b></span></i></span></div>
<div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-7189389166410054192017-10-17T11:20:00.000-07:002017-10-17T11:30:58.243-07:00#MeToo : Tales of victimisation in real life as well as on internetCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 200%;">Way back in 2012 my sister gave me some Hollywood
magazines which she was reading in her long flight to India. These are the
tit-bits for any reader who would like to know what is happening with the lives
of film stars and celebrities who mesmerise us on screen. I got to see how
several film stars of West including Hollywood were affected by voyeurism by
enthusiastic fans and profit making photographers. Indeed these fans and
photographers may make huge money because of a huge group of consumers: the common
cine lovers. Soon there was more news about celebrity hacks; their gym photos,
private holiday photos, private moment photos, private bathing photos were
leaked online and by the time one or two victims could get back to the police;
the world knew about their private lives. The positive point to think over this
issue is, several women film actors had taken such online privacy infringement seriously
and either took the matter to the police or had filed law suits against gossip
magazines or channels who unethically published their private photos or videos.
I call this “positive” because these women had defied the common understanding
that approaching the police or the courts for online harassment including
sexual harassment like leaking of private photos or videos is nothing but
publicity stunt. Unfortunately in India several female film stars including upcoming
film stars or serial actors also fall prey to the same sort of victimisation and
when they turn towards the police or the courts, many a times, it is seen as
publicity stunt: not to forget, their Western counter parts also do go through the
same. But at the same time, I have not found many Indian women film stars and
serial actors who took the matters of online sexual victimisation as seriously
as their Western counter parts ( I addressed this issue in my article “Celebrities
and cyber crimes: An analysis of the victimisation of female film stars on the
internet” <a href="http://www.doiserbia.nb.rs/img/doi/1450-6637/2016/1450-66371604355H.pdf">http://www.doiserbia.nb.rs/img/doi/1450-6637/2016/1450-66371604355H.pdf</a>
).<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 200%;">But women actors may be the most ‘exploited’
species among working women: consider the blunt, straight forward speech of
Madona during Woman of the year award in 2016. Social media channels were
flooded with comments, emogies and thumbs ups praising her for boldly
expressing how she had been sexually violated in real life and how she
continues to be violated online at present. Why she had to be the victim of
sexual violation? Apparently it is because of the presence of ‘God fathers’ in
the workplace who may coerce the women to enter into a non-consensual sexual
relationship which would ensure continuous job protection. For the last couple
of days, several female actors from Hollywood have started protesting against
such sexual exploitation with #metoo . The campaign had been so strong and
viral that it has touched almost all continents and millions of women who may
have been sexually victimised or violated either by way of penetrative sexual
assault or by non-penetrative sexual assault or by sexual harassment in workplaces,
public places as well as in their homes, have opened up about their
victimisation. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 200%;">India has also been touched by
#MeToo campaign. Several women have expressed their solidarity by pasting on
their time line the following lines:<i>"Me
too... If all the women who have been sexually harassed or assaulted wrote 'Me
Too' as a status, we might give people a sense of the magnitude of the problem.
Please copy/paste.".</i> This was originally shared by actress Alyssa Milano
and others as a protest against sexual victimisation by Harvey Weinstein, a
noted producer-distributor who had been
ousted from Motion Picture Arts and Sciences on 15<sup>th</sup> October, 2017. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 200%;">Most of my 900 friends on Facebook
who had been sporting #MeToo in their profile time lines for past 72 hours had
been sharing several forms of victimisation; most common is definitely sexual
gazing at public places and work places. I had posted in my time line about
online sexist comments and pornographic stuff
including misogynist posts which I often get to see in my message box (thanks
to continuous privacy ‘tactics’ that I practice for my Twitter and Facebook timelines, I do not
get to see such violating and victimising stuff in my time-line except on rare occasions).
Several of my friends and acquaintances have simply shared the “metoo” message to show their solidarity with the cause, which
I am sure, has definitely affected them, but they may not be feeling comfortable
to openly express the same. Two posts however have actually attracted my
attention even though they do not speak about cyber sexual victimisation or
workplace victimisation : one by Sauranshu Sinha from Delhi and the other by
Dr. Kalki Subramaniam from Pondicherry. The latter, a transgender activist and
a trans-woman herself wrote a poignant note using #metoo. A part of her message
(which is open for public) reads as follows <i>“.........................................Around
the world, every transgender woman, and in India almost every cis/transwoman
goes through this brutal, uncouth, insensible torture. No more can they do it
to me today. I stand tall and strong. Yet, i must say I was a victim too.”</i><o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 200%;">Sinha is the first man I noticed who wrote about his experience of being sexually
violated when he was a 6<sup>th</sup> standard student. A part of his message
(which is open for public viewing) using #metoo stated that while he was travelling
in a bus, a man touched him inappropriately and opened his zip to show Sinha his
private parts (translated from Bengali). Sinha was a victim of sexual
exploitation as a young boy who shared his solidarity with #metoo. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-indent: 36.0pt; text-justify: inter-ideograph;">
<span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 200%;">I know several of my friends,
women and men who did not share their own experiences or neither shared #metoo,
would have been victims themselves at one or other point of time. There are
several individuals who may probably never understand that even comments like “hi
sexy” or “wanna talk, reply back” may also be victimising especially when the receiver
feels insulted, hurt, alarmed or feels his/her modesty has been harmed. There are
several victims of online sexual harassment who may never speak up about their
bitter experiences due to fear of more exposure. Thousands of women may remain
silent even when their friends are marching along with #metoo to expose the
sorts of victimisation they had gone through and alert the society. Yet, I welcome #metoo campaigners. When people
dare to share, there remain positive chances for the policy makers and law-makers
to executors to note the pain. Let us hope that #metoo brings a change not only
in the mindsets of people, but also in the process of implementation of laws. We
need to understand that women who had been victimised and turned up to share
their experiences, should get due protection and respect from all of us. Let us
unite to defy sexist misogynist trolls from making #metoo and all of us victims
again. <o:p></o:p></span></div>
<div class="MsoNormal">
<i><span style="font-family: "georgia" , "serif"; font-size: 14.0pt; line-height: 115%;">Please
Note: Do not violate copyright of this blog. If you would like to use
informations provided in this blog for your own assignment/writeup/project/blog/article,
please cite it as “Halder D. (2017), "</span></i><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;">#MeToo : Tales
of victimisation in real life as well as on internet</span><span style="font-family: "georgia" , "serif"; font-size: 14.0pt; line-height: 115%;">, <i>published in http<span class="apple-style-span"><b>://debaraticyberspace.blogspot.com</b></span></i></span><span style="font-family: "bookman old style" , "serif"; font-size: 16.0pt; line-height: 115%;"><o:p></o:p></span></div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0tag:blogger.com,1999:blog-1247126106893110067.post-33229061750946639542017-08-10T08:38:00.000-07:002017-08-10T08:38:08.223-07:00Virtual friendship: what’s the reality in it for womenCYBER CRIME AGAINST WOMEN BY DEBARATI HALDER<br />
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 200%;">6<sup>th</sup> August, 2017 my WhatsApp, Facebook,
Twitter and Instagram accounts were flooded with Happy friendship images. I was
not well aware about friendship day as I was for Raksha Bandhan because back in
our school days, we loved to wait for “Rakhi”
which used to come in different shapes made of colourful sponge
topped with tiny little shining stars. Irrespective of gender, we used
to tie Rakhi on each other’s hands and gift our own crafts (the “home made
Rakhi”) to our elders, teachers and our best-friends. In my family, this was an
occasion to pamper our grandfather with our own Rakhi who was generous enough
to give us the sisters a treat in a nearby Chinese restaurant for “rakhi”. My family
was not alone in celebrating Rakhi in such a manner. There were many families
irrespective of religion who would extend Rakhi greetings and children would
come over to each other’s places to show their Rakhi that they got from their
siblings, friends or even grandparents. That was our ‘friendship day’ too as we
the Bengalis carefully nurtured the custom of strengthening social bond with
tying of Rakhi to our friends irrespective of their religion, cast or place of
birth, instilled by none other than Rabindra Nath Tagore. We never saw texts
wishing of “rakhi” or “Freindship day”. The greetings cards made especially for
this were special items in gift shops which some of us bought for presenting a
‘memorable gift’ to their acquaintances. That was some thing REAL in real
world.<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 200%;">There were spats of incidences this Friendship day
and Raksha Bandhan day which made me think where we are heading to: <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 200%;">People wish happy friendship day to strangers whom
they have never met or heard their voices in their lives. Women especially are
flooded with such messages accompanied with images from ‘friends’ all over the
world. An expert researcher may definitely find a nexus between sending
friendship messages and subsequent online harassment to these ‘friends’. Such
messages actually initiate a strange relationship and may even make women
recipients believe that the senders have genuine interest in extending
friendship. This internet culture is especially noticeable in young women and
also first time users of social media including messaging apps in the smart
phones. The virtual friendship or even any relationship can be so addictive
that individuals may even forget their real life family or friends with whom
one has actually grown up. Unfortunately there is no law for
internet-deaddiction or rather virtual relationship deaddiction. Laws are made
to control crime or prevent escalation of crimes. But consider when individuals
forget their liabilities and duties to their real life family members or friends
for their virtual relationships: a unique condition may arise in such cases
where the neglected member may have to plead to the courts for directing the
concerned person to ‘pay attention’ failing which, he/she may have to ‘pay’ for
his/her irresponsible nature. Such unique conditions may include not only
negligence of his /her moral responsibilities towards own families including
caring for older or younger generations or dependants, but also may include exposing
own family members or real life friends to extreme danger including various
types online offences whereby the latter’s privacy may be infringed due to callousness
of the earlier. <o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 200%;">August is the beginning of festive season in India, followed by major
festive months including September and October. Let us share the happiness and
positiveness among our family and friends first and then to our virtual friends
some of whom may not even be “real”. We need to understand that once the family
unit provides a strong mental support to any individual including children, no
negative force may destroy the inner peace and yes, the reputation of the said
person. Sharing happiness and sorrows alike may also make it easier for any one
especially women and girls to combat
online harassment especially those kinds which directly affects our reputation.
<o:p></o:p></span></div>
<div class="MsoNormal" style="line-height: 200%; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: "Bookman Old Style","serif"; font-size: 14.0pt; line-height: 200%;">Let us be independent from fear of virtual
reputation damage which may be caused due to unknown virtual friends. <o:p></o:p></span></div>
<div class="MsoNormal">
<i><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 115%;">Please
Note: Do not violate copyright of this blog. If you would like to use informations
provided in this blog for your own assignment/writeup/project/blog/article,
please cite it as “Halder D. (2017), "</span></i><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 115%;"> </span><span style="font-family: "Bookman Old Style","serif"; font-size: 12.0pt; line-height: 115%;">Virtual
friendship: what’s the reality in it for women”</span><span style="font-family: "Georgia","serif"; font-size: 14.0pt; line-height: 115%;">10<sup>th</sup> August,
2017, <i>published in http<span class="apple-style-span"><b>://debaraticyberspace.blogspot.com</b></span></i></span><span style="font-family: "Bookman Old Style","serif"; font-size: 12.0pt; line-height: 115%;"><o:p></o:p></span></div>
<br />
<div class="MsoNormal" style="text-align: justify; text-justify: inter-ideograph;">
<br /></div>
<div class="blogger-post-footer">CYBER CRIME AGAINST WOMEN IN INDIA</div>advocate debaratihttp://www.blogger.com/profile/06502661400686255622noreply@blogger.com0