You are on page 1of 17

Project On…

CRITICLE ANALYSIS OF RIGHT TO PRIVACY AND CYBER OFFENCES

   
Submitted To Submitted By
Dr. Anju Mam Name- Ashish Kumar
Roll. No- 210602
Sub- Interpretation of Statues
Class- LL.M
Course- Department of Law
Session- 2021-2022
Semester- 1st
INDEX

 INTRODUCTION
 RIGHT TO PRIVACY PROVISIONS
 CONCLUSION
 SUGGESTIONS
 References
INTRODUCTION

Now a days the ‘netizens’, are extremely exposed to the threat of privacy infringement in cyber
space. Through the rising use of internet by the citizens of the country, the risk of their being
exploited and victimized by infringing their privacy over internet is increasing day by day. This
apprehension is sensed more in the case of youth and teenagers who found majority of the
internet users and are disposed in understanding the risk of exposing themselves to the cyber
world. The social networking sites which are now used broadly for social
interactions between the persons by uploading their personal content, has further aggravated the
issue of ‘internet privacy’.

In several ways, the privacy of the individual could be violated in cyber space. If a person is
abused of privacy violation over internet, it contains various composite issues to be settled, like
what extents to violation? Who is liable for the same? And, what shall be the remedy existing?
The right to privacy is one of the simple Human rights.

LEAGAL PROVISIONS FOR PRIVACY

Right to privacy is provided on international level under the following Articles of Conventions.

 Article 12 of the Universal Declaration on Human Rights of 1948


 Article 8 of the European Convention on Human Rights of 1950
 Article 17 of the International Covenant on Civil and Political Rights of 1966

The Indian Constitution does not clearly provide right to privacy as the fundamental. However,
the courts have declare the right to privacy into the other existing fundamental rights, like under
Article 19(1) (a) freedom of speech and expression and Article 21 right to life and personal
liberty under the Indian Constitution. Though, Fundamental Rights are subject to reasonable
restrictions given under Article 19(2) that may be enforced by the State.
In case of Justice K S Puttaswamy (Retd.) & Anr. Versus Union of India and others. The
constitution bench of the Hon'ble Supreme Court has held Right to Privacy as a fundamental
right, subject to certain reasonable restrictions. Privacy is considered as crucial matter when
there is discussion about digital rights, data protection extra. In India, Information Technology
Act, 2000 provides some rights for data privacy protection. The Government of India created a
committee to propose a draft statue on data protection. The committee planned draft law and the
Indian government has issued the Personal Data protection Bill 2019 (PDP) Bill. This will be
India first law on the protection of data and that will revoke section-43A of the IT Act.

UK has adopted DPA (Data Protection Act, 1998) which include 8 principles and addresses
issues like what is personal information, sensitive information, who is data owner, data subject,
who is data processor and who is responsible to protect the privacy. There are certain laws in
force, which ensures protection to the right to privacy. 

There is number of cyber offences which are punishable with fine and imprisonment. Some are
provided which are affecting the right to privacy of the individual and which are punishable
under the IT Act 2000.

IT Act is amended in 2008 under this law right to privacy is protected under -different
provisions. Like

 Hacking (Section 43, 66),


 3 years imprisonment for violation of privacy (section 66E),
 Identity theft(Section-66 C) and
 Cheating by personation (Section 66 D),
 Offensive email (Section 66A).
 Section 72A of the IT Act penalizes the unauthorized expose of personal information by
any person who has obtained such information under a lawful contract and without
permission of the person from whom such information belonged or taken.
 Apart from this the IT Act also provides provision for data safety. Section 43A of the
Information Technology Amendment Act 2008, lays down that all corporate bodies and
mediators who possess, handle or collect any sensitive personal data shall maintain
reasonable security practices and in case of failure they shall be liable to the person who
is aggrieved by such misuse of data.

1. The government has notified the Information Technology (Reasonable Security Practices
and Procedures and Sensitive Personal Data or Information) Rules, 2011. The Rules only
deals with protection of Sensitive personal data or information of a person, which
includes such personal information which consists of information relating to:

a. Passwords;
b. Financial information such as bank account or credit card or debit card or other
payment instrument details;
c. Physical, physiological and mental health condition;
d. Sexual orientation;
e. Medical records and history;
f. Biometric information.

Parliamentary Report on Cyber Security and Right to Privacy: The Parliamentary Standing
Committee on Information Technology in its 52nd Report on Cyber Security and Right to
Privacy said that a significant increase in cyberspace activities and access to internet use in India
coupled with lack of user end discipline, inadequate protection of computer systems, and the
possibility of anonymous use of ICT allowing users to impersonate and cover their trends of
crime has emboldened more number of users experimenting with ICT abuse for criminal
activities. The Committee is of the opinion that this aspect has a significant impact in blunting
the deterrence effect created by the legal framework in the form of the Information Technology
Act, 2000, and similar laws.

The Committee has listed several offenses which fall under the purview of cyber-crimes and the
remedies available within the existing legal framework. Cyber Stalking or silently following a
person and tracking his internet chats is punishable under Sec 43 and 66 of the IT Act, 2000
while video voyeurism and violation of privacy is a crime under Section 66E of the IT Act with a
punishment of three years with fine. The Department of 82 Electronics and Information
Technology during the course of evidence submitted to the Committee that with regard to the
data pertaining to privacy related cases booked under Sec 72(A) of the IT Act the number of
cases registered have risen from 15 in 2010 to 46 in 2012 while the number of persons arrested
were 22 in 2012. The Committee members were of the opinion that considering the nature of
cyberspace which is borderless, balancing cyber security, cyber-crime and the right to privacy is
an extremely complex task. The members were also unhappy of the fact the government is yet to
institute a legal framework on privacy. It urged upon the Department of Electronics and
Information Technology in coordination with the Department of Personnel and Training and
multi-disciplinary professionals or experts to come out with a comprehensive and people-
friendly policy for the protection of the privacy of its citizens.
PERSONAL DATA PROTECTION BILL 2019

The Government of India, therefore, constituted a committee to propose a draft statue on data
protection. The committee proposed draft law and the govt. of India has issued the Personal
Data protection Bill 2019 (PDP) Bill based on the draft proposed by the committee. This will be
India first law on the protection of data and it will repeal section-43A of the IT Act.

The PDP Bill proposes a broader reach. It will not only apply to persons in India but also to
persons outside India in relation to business carried out in India. The PDP Bill proposes to apply
both on manual and electronic records. The PDP bill proposes creating a Data Protection
Authority in India. The Authority will be responsible for protecting the interest of data
principals, preventing misuse of personal data and ensuring compliance within the new law.

The PDP Bill proposes to protect Personal Data relating to the identity, characteristics trait,
attribute of a natural person and Sensitive Personal Data such as financial data, health data,
official identifier, sex life, sexual orientation, biometric data, genetic data, transgender status,
intersex status, caste or tribe, religious or political beliefs. Pursuant to the PDPB being enacted
into an Act, there are several compliances to be followed by organizations processing personal
data in order to ensure the protection of privacy of individuals relating to their Personal Data.
Consent of the individual would be required for the processing of personal data.

Based on the type of personal data being processed, organizations will have to review and update
data protection policies, codes to ensure these are consistent with the revised principles such as
update their internal breach notification procedures, implement appropriate technical and
organizational measures to prevent misuse of data, Data Protection Officer to be appointed by
the Significant Data Fiduciary, and instituting grievance redressal mechanisms to address
complaints by individuals.

CONSTITUTIONAL LIABILITY

Hacking someone's property or stealing someone's work is a violation of their right to privacy.
The Indian constitution does not explicitly give "the right to privacy" as one of the fundamental
rights guaranteed to Indian citizens but is protected under the IPC. The right to privacy is an
important natural necessity for everyone as it creates boundaries around a person where access to
another person is prohibited. The right to privacy prevents interference from others' privacy. The
Supreme Court of India has explicitly affirmed in its rulings that the right to privacy is a
fundamental part of the fundamental right guaranteed under Article 21 of the Indian constitution.
Therefore, the right to privacy comes under the applicable principle of article 21 of the Indian
constitution. Therefore whenever there is an online crime related to the private property of a
person or his or her personal property then the respondent may be charged with violating article
21 of the constitution of India, and the prescribed remedy may be requested by the respondent.

Invasion of Privacy in Cyber World:

Because of its over-reliance on the computer, as a tool for data sharing and data storage and the
use of the Internet as a means of data transfer, various attackers indulge in the act of data theft, as
shared online by a user, either through malicious spyware, or various computer bugs, or data
collected on a website stored in a computer cookie folder. Also the information a user shares on
social media profiles like Linkedin, Twitter, Facebook, Instagram, etc. It tends to reach any
follower and is easily controlled and misused which creates privacy breaches for the concerned
communications user. Threats also include email attachments that contain malware that discloses
the details of the recipient's email to the sender or to any intruder. Children, who use the Internet,
are also easy prey for intruders because all the information a child enters can be easily tracked by
cyber criminals. Wikipedia states that there are approximately 400 million users of social
networking websites and almost all users; use the app for the purpose of chatting, uploading,
photographing, and feeding important information in their database. Cybercrime is done through
the use of the internet, where the computer is used as a tool or target and is the best way to access
privacy.

Companies of the day now hire third parties to collect information about people who use the
Internet and social networking sites, to compile their personal records, about such people and
their valuable information, so that they can use the same for advertising or marketing purposes.
The protection of privacy and data of people who use the Internet is a major issue now a day;
many countries have enacted many laws to protect the privacy of their people.

In the U.S., to protect the interests of children and their privacy using the Internet, the Federal
Trade Commission has enacted the children Internet Protection Act 2000.

 Crimes Against Persons:


 Harassment via E-Mails:  Harassment by sending letters, attachments of files
and folders by e-mail. Currently harassment is as common as the use of social
networking sites namely Orkut, hangout, zapak, Facebook, Twitter and more
that are increasing day by day.
 Cracking: One of the most serious cybercrimes known to date. In this case a
cyber-hacker hacked your computer programs without your knowledge and
permission and Tampere with your personal information and valuable personal
information.
 Cyber-Stalking: Means exposure or exposure to physical threats that create
fear through computer technology such as the Internet, email, phone calls, text
messages, webcams, websites or videos.
 Hacking: Means unauthorized control / access to the computer system and the
hacking action destroy all data and computer system. Hackers often block
telephone communication with a mobile network.
 Dissemination of Obscene Material: Includes pornography / pornography
(basically child pornography), hosting a website containing these prohibitions.
Such unwholesome material can harm the mind of a child and tend to damage
or corrupt the mind. This can cause serious social ills.
 SMS Spoofing: Spoofing is spam blocking which means unwanted unsolicited
messages. Here the offender steals the identity of the other in the form of a
mobile number and sends an SMS online and the recipient receives an SMS
from the victim's phone number.
 Assault by Threat: it refers to threatening a person with fear for their lives or
lives of their families through the use of a computer network i.e. E-mail, videos
or phones.
 Page jacking: when a user, click on a particular link and an unexpected
website opens with that link and it is said that these are 'page extensions'. This
happens when someone steals part of a real website and uses it on a fake site. If
they use the real site enough, Internet search engines can be tricked into writing
a fake site and people will visit it by accident. Unfortunately a person cannot
prevent a page break but can only deal with it.
 Advance fee scams: Prepayment scams are easy to spot as you will be asked
for money or goods in advance to get a loan or money later. These prepaid bills
may seem plausible and counterproductive.

 Defamation: It is an act of insulting any person with the intention of


discrediting that person by hacking his or her postal account and sending other
offensive emails to strangers with the postal account.
 E-Mail Spoofing: It can be said that the email with the factory is the one,
which misrepresents its origin. It shows that its origins are different from what
it actually does.
 Child Pornography: Includes the use of computer networks to create,
distribute, or access sexually explicit material.
 Carding: Means fake ATM cards i.e. Debit and Credit cards used by criminals
for their financial gain by withdrawing money from the bank account of the
victim mala-fidely. There is always illegal use of ATM cards in this type of
cyber-crime.
 Cheating & Fraud: Means a person who commits a cyber-crime act which
means stealing passwords and data storage makes you guilty of a crime that
leads to fraud and deception.

CASE LAWS
• Status of Tamil Nadu Vs Suhas Katti
The case involved a text message that was abusive, degrading, and offensive to a divorced
woman in a yahoo message group. E-mails are also forwarded to the victim to obtain information
by the respondent through a false email account which he or she has opened on behalf of the
victim. The inclusion of this message led to a call to the lady in the belief that she was asking.
According to a complaint lodged by the victim in February 2004, police tracked down the
suspect and took him to Mumbai and arrested him in the next few days. This is considered to be
the first case in the Tamil Nadu district, where the perpetrator was convicted under section 67 of
the Information Technology Act 2000 in India.
• NSP Bank Case
The Bank NSP case was the one in which the bank coach was involved in getting married. The
couple exchanged many emails using company computers. After a while the two split up and the
girl created fake emails like "Indian bar association" and sent emails to the boy's external clients.
You used a bank computer to do this. The boy's company lost a number of customers and took
the bank to court. The bank is charged with emails sent through the banking system.
• SMC Pneumatics (India) Pvt. V. Jogesh Kwatra
In this case, defendant Jogesh Kwatra, an employee of the plaintiff's company, began sending
abusive, defamatory, abusive, obscene, dirty and defamatory emails to his employers and other
subsidiaries of the company named worldwide with the intention of defaming the company and
its Managing Director. The Supreme Court of Delhi barred the defendant from sending
defamatory, defamatory, defamatory, insulting, defamatory and defamatory emails to plaintiffs
or sister companies around the world including their Managers and their Marketing and
Marketing departments. In addition, the Honorable Judge also barred the defendant from
publishing, transmitting or causing to be published any information in the real world such as
cyberpace which is defamatory or defamatory or harassing the plaintiffs. The Delhi High Court
order is of great importance as this is the first time that an Indian court has ruled in a matter of
cyber defamation and issued an order preventing the defendant from defaming the plaintiffs by
sending abusive emails.
• Sony.Sambandh.Com Case
The complaint was lodged by Sony India Private Ltd, which operates a website called
www.sonysambandh.com, targeting Indigenous Indians. In May 2002, someone hacked into a
website under Barbara Campa and ordered a set of Sony Color Television and a wireless headset.
He gave her his credit card number to pay and asked for the products to be forwarded to Arif
Azim in Noida. After a month and a half the credit card operators informed the company that this
was an unauthorized transaction as the real owner denied the transaction. The company has filed
a complaint against online fraud at the Central Bureau of Investigation. The court convicted Arif
Azim for fraud under Sections 418, 419 and 420 of the Indian Penal Code. This was the first time
that a cyber-case had been dropped. Judgment is very important for the whole nation. Apart from
being the first case in a cybercrime case, it has been shown that the Indian Penal Code can be
used effectively in certain categories of cybercrime that are not listed under the Information
Technology Act 2000.
• Nasscom v. Ajay Sood And Others
The plaintiff in this case was the National Association of Software and Service Companies
(Nasscom), India's main software company. Defendants were using a participatory agency
involved in poaching and hiring people. To obtain personal information, which they can use for
hunting purposes, defendants write and send emails to third parties in the name of Nasscom. The
Supreme Court upheld the plaintiff's trademark rights and passed an order prohibiting defendants
from using a trade name or other deceptive name such as Nasscom. In terms of the waiver, the
defendants agreed to pay a sum of Rs1.6 to the plaintiff as damages for infringing the plaintiff's
trademark rights. Delhi HC pointed out that although there is no law in India to punish criminal
identity theft, it treats identity theft as an illegal act by defining it in Indian law “as a bad
representation during a trade that leads to confusing the source and the e-mail source causing
serious damage is not only misused. "The court held that, to the consumer but also to the person
whose name, identity or password is a criminal offense for stealing sensitive information such as
transmitting and defaming a plaintiff's image.
The case achieves clear objectives: It brings the act of “criminal theft of sensitive information”
into the context of Indian law or no specific law; It removes the misconception that there is no
"cultural harm" in India by violating IP rights.
• Bazee.com case
On December 9, 2004, an article appeared entitled “DPS sex video on baazee.com”. The news
article states: “India's largest online trading site baazee.com has posted this MMS clip under the
heading 'DPS girls having fun' with a member ID of 27877408. The chief executive officer of the
Baazee.com website was summoned by the Delhi High Court for allowing the clip to be
auctioned off under sections 67 and 85 of the IT Act, 2000. While Section 67 prohibits the
publication of pornographic material, Section 85 allows for personal prosecution who is
responsible for the company's business for offenses. . The incident sparked a sudden panic across
the country and many discussions about the inefficiency of the IT Act, 2000 and the need for
amendments began. Also, in the aftermath of this scandal, as a result of controversies over guilt,
debt and online property prosecution, a number of important decisions were made including the
ban on the use of cell phones in colleges and school centers throughout India.
• PNB, Pune case
In a major compensation from cyber-criminal lawsuits, Maharashtra IT secretary Rajesh
Aggarwal has ordered Punjab National Bank to pay Rs 45 lakh to Manmohan Singh Matharu,
MD of Pune-based Poona Auto Ancillaries. The fraudster had transferred Rs 80.10 lakh from
Matharu's PNB account in Pune after Matharu responded to an email to steal sensitive
information. Matharu has been asked to share the debt since he responded to an email to steal
sensitive information. Matharu is one of 13 cases of e-fraud, all from Maharashtra and has a
record in six provinces, where the country's IT Secretary, acting as a jurisdiction officer under
the IT Act 2000, last month issued sensitive instructions to nine banks, four telecommunications
firms and two mobile replacement sites. These charges include e-mail fraud, hacking of bank
accounts, credit card fraud, duplicate SIM card fraud, and identity theft, among others.
• Syed Asifuddin and Ors. Vs. State of Andhra Pradesh
In this case, Tata Indicom employees used a 32-bit electronic number (ESN) attached to mobile
phone theft and were only given Reliance Infocomm. The Court held that the violation of the
source code applies to Section 65 of the Information Technology Act.
• Bomb Hoax Mail
In 2009, a 15-year-old Bangalore boy was arrested by the city's cyber-crime cell (CCIC) for
allegedly sending an e-mail to a private news station. In an e-mail, he said he had planted five
bombs in Mumbai, and challenged police to find them early.
Mumbai police have registered a case of 'cyber-terrorism' - the first in the province since the
Information Technology Act was amended - to which a threatening email was sent to the BSE
and NSE on Monday. MRA Marg and Cyber Crime Investigation Cell police are jointly
investigating the case. The suspect is being held in custody.
MRA Marg police have registered frauds with intent to defraud, criminal charges under the IPC
and cyber terrorism cases under IT law.
Since prevention is always better than cure, a smart internet user should take certain steps while
using the internet and should follow certain cyber crime prevention measures, these steps can
also be considered as suggestions:
 A person should not send his / her credit card number to any unsecured site, to monitor
fraud.
 One should avoid disclosing any personal information to strangers by email or chat.
 One should avoid sending any image to strangers online such as abusing the growing
image events day by day.
 Parents should always be on the lookout for sites that your children find, to prevent any
form of child abuse or corruption.
 Website owners should monitor traffic and check for any malfunctions on the site. It is
the responsibility of website owners to adopt a specific cyber crime prevention policy as
the number of internet users is growing day by day.
 Strict legislation must be passed by Legislatures taking into account the interests of
cyclists (cybercitizen or an organization or individual who has actively participated in
online communities and on the Internet user).
 Web servers that use social networking sites must be physically protected from internal
company networks.
 Anti-virus software to protect against viral attacks should be used by all network users
and should also reset the volumes so that a person does not experience data loss in the
event of contamination.
 It is best to use a security system by the body corporate to control the information on the
sites.
 The IT department must pass certain computer security guidelines and notices and must
also issue stricter laws to curb cybercrime.
 Since cyber-crime is a major threat to all countries in the world, certain steps must be
taken at the global level to prevent cybercrime.
 A special and professional police team will be established.
 Complete justice must be provided to victims of cyber-crime in the form of corrective
action and offenders to be punished with a maximum penalty so that they can anticipate
cyber criminals.

MAJOR OUTCOMES

¾ Most respondents do not feel the need to read the policy guidelines, terms and conditions of
ISPs and social networking websites before entering into an agreement with these sites and
opening their accounts; ¾ Most respondents are not interested in sharing their profile or account
and password with their partners and children; Most respondents like to participate in real-life
entertainment, however, most are unaware of spam and phishing emails for sensitive information
and are often out of curiosity in response to these emails. Responders Many respondents do not
choose to chat with completely unknown people on social networking sites and they know that
such conversations - friends can be false; many do not choose to share their secrets with their
chat buddies. But they would like to chat with people they have met and are familiar with social
media and follow their responses to various posts. It doesn't matter if these people have ever met
in real life or not; such chat partners can exchange their emails for professional and personal
purposes. Users Several Internet users see that in the cyber space they do not need to follow strict
rules of communication when in a group or forum; many such internet users are unaware of the
basic rules of cyber. Systems The value systems of Indian society are different from those of
European countries. The biggest problems in the cyber space arise when Indian users try to
embrace western cyber culture in India’s social value system; prominent examples of the brutal
attacks on women by cyber bullying, the use of abusive or cruel language in groups or forums
that attack people's and religious sentiments and similar treatment by Indian law. Def. Cyber
denigration, threatening text messages etc. It is common in India. Cybercrime is on the rise. ¾
The use of abusive words in the cyber space by Indian internet users is on the rise. 20 CCVC 22
sites social networking sites such as Orkut (maximum) and Facebook are used to harass women
by posting fake / off-profile profiles, pornographic descriptions etc. Ity Most respondents do not
understand the nature of hunting. ¾ Most respondents know about hacking but few are able to
protect themselves from hacking. ¾ Impersonation, emotional and financial cheating, harassment
by making duplicate profiles in the cyber space, retaliation through the cyber space to break
romantic bonds etc. are on the rise in India. ¾ Many are aware that hacking, cybercrime,
economic fraud, sending threatening messages etc can invite legal problems; but major Indian
internet users are unaware that tracking can also call for punitive actions. Similarly, bullying,
texting, impersonation and deception, texting, and the like can also attract retaliatory actions.
Many Indian users know that they have a right to protect their privacy in the cyber environment.
However, we understand that this 'confidentiality' may reflect their lives, financial information
and this may not include awareness of the right to privacy and the right to be protected from the
misuse of information already in their profiles, etc. Etc. Very few respondents, especially women
who like to report abuse to the police as they see this could lead to future abuse; however, many
are aware of the reporting methods offered by social networking websites and some users also
use these options. ¾ Women are more likely to be abused than men in the cyber area; Women
Most women receive emails from anonymous men with disturbing content, friend requests etc.
and those emails can be the result of data mining. Women Many women are victims of many
forms of abuse perpetrated by their ex-partners, including ex-boyfriends. Women Many women
receive hateful messages through sexual or non-sexual remarks, annoying comments etc.
Because of their feminine ideas expressed on both blogs or forum walls and the state of the
wedding, profile pictures, profile statements displayed on the main profile page.1

SUGGESTIONS

1. Awareness campaigns should be organized from the grassroots level such as schools and
colleges on cyber behaviour and potential cyber-crimes such as economic fraud, tracking
activity, degrading material, misuse of email and social networking sites etc.
2. The police, social workers, lawyers and the private sector should be invited to educational
institutions, corporate offices, clubs, public awareness campaigns - campaigns, conferences and
conferences and anti-cyber-criminal conduct for adults involving both genders. Reporting cyber
bullying should be encouraged at all levels directly to the police and NGOs serving this purpose.
3. Strict laws should be introduced to prevent cyberbullying. The current Information
Technology law covers only a few categories of cyber-crimes, which is why a separate criminal
law should be enacted.
4. Conferences and workshops should be arranged so that police personnel can better understand
the types of harassment and quick responses to complainants. Legal and academic professionals,
NGOs working for this purpose etc. It should be brought to those conferences and workshops.
CONCLUSION
The scenario of cyber abuse in India needs to be studied in detail. It is even though cyber ill-
treatment includes abuse of fundamental rights and also gender harassments, hardly any solid
step has been taken to curtail it. Most social networking sites follow to western cyber cultures
and cyber rules and regulations which may give rise to opportunities to experiment with the
personal freedoms, especially freedom of speech and expression and right to privacy.
In the Indian social value system, some of such cyber cultures may give rise to severe misuse of
fundamental rights guaranteed by Indian constitution.  Matured internet users must understand
that what is offensive in the real space, must be maintained as offensive in the cyber space also.

1
https://www.cybervictims.org/CCVCresearchreport2010.pdf
Cyber hang out has opened the entry to a global village which may form its own culture, rules
and ethics. But that in no way should encourage abuse of personal rights and freedom.

Suggestions

There are some recommendations:

1. Awareness campaign must be arranged from grassroots levels such as schools and colleges
about cyber ethics and probable cybercrimes like economic cheatings, stalking activities,
defamatory activities, misusing email and social networking web sites etc.

2. Police, social workers, lawyers and NGOs must be invited to educational institutes, corporate
offices, clubs, social awareness ‐ campaigns, workshops and seminars to talk about legalities and
illegalities of cyber conduct among adults inclusive of both the genders. Reporting of cyber
harassment must be encouraged at all levels directly to police and also to NGOs working for the
cause.  

3. More strict laws must be brought in to curb individual abuse in the cyber space. The present
Information Technology Act includes only few sections for cybercrimes, hence a separate law on
cybercrimes should be created. 

4. Seminars and workshops must be arranged for police personnel for better understanding of
such sorts of victimization and prompt responses towards the complainants. Legal and academic
experts, NGOs working for this cause extra must be brought in for such seminars and workshops.
Reference

 https://www.itlaw.in/cyber-crime-in-india
 https://www.cybervictims.org/CCVCresearchreport2010.pdf
 https://www.itlaw.in/judgements

You might also like