Cyber safety for WomenCyber safety for Women Lina Acca Mathew, Assistant Professor, Government Law College, ErnakulamLina Acca Mathew, Assistant Professor,

Slides:



Advertisements
Similar presentations
How safe are our children over the Internet?-Cyber safety law and policy in India Lina Acca Mathew Assistant Professor of Law Govt. Law College, Ernakulam.
Advertisements

How to protect yourself, your computer, and others on the internet
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
ESafety 92% of secondary school children have had experience of being cyber-bullied (NFER eSafety report, 2012)
Haygrove School – E Safety Induction E Safety Update #protecting your professional identity.
On-line Child Protection Year 10 E-safety. E-safety awareness and guidance is directly taught the Year 10 PSHE programme and ICT course. Safeguarding.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
High School 101 Online Safety Tuesday, August 19 th, 8 th period.
Intentional and repeated use of technology to harass, threaten, embarrass, or target another person.
Sexting and Cyber-bullying Legal Issues Deputy Phyllis Applin Livingston County Sheriff’s Office.
The Grooming Process. Trafod Sexual Abuse and Trauma Centre.
Sex Offender Registration and Community Notification Meeting The purpose of community notification is to provide information to protect you and your family,
Cyber bullying and internet safety Parents meeting: staying safe online.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Sex, Laws and Videos: 21st Century Sex Crimes Use of Recording Devices, Film, Cell Phones, Computers and the Internet Ginger Kimes Staff Attorney Prosecutor.
+ Cybersafety and Children Ms. Kerrie Lisko, Guidance Counselor Lory Sakay, Student Support Specialist.
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
Cyber and Internet Safety El Rodeo School September 11, 2013.
REVENGE PORN ROUNDTABLE 5 TH SEPTEMBER WHAT IS REVENGE PORN?  Revenge porn is when a partner or ex-partner shares images of sexual nature without.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
 What is Harassment?  Define, list terms, different types and/or examples of what you believe Harassment is.  Respond to Harassment Video 
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Sophia Dermouche & Maheen Khalid
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
1 Is it illegal or unsuitable? SID 2013 quiz for adults who work/volunteer with children, young people and vulnerable adults © e-Safer.
Cyber Crimes.
1 Is it illegal or unsuitable? SID 2013 quiz for parents and carers © e-Safer Suffolk 2013.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
“Cyber Crime in India”
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
SEXTING. Is this ever ok? (click Yes, No or Maybe TWICE as applicable) 1. Sending a sexually explicit selfie at age Sending a sexually explicit.
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Online Safety Parent Workshop Helping to keep your children safe online.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
CYBERBULLYING Cyberbullying is when someone bullies others over the internet or on a mobile phone by sending abusive s or texts directly or by posting.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
Combing the words “sex” with “texting” describes the act of someone sending sexually explicit messages or images of themselves electronically - primarily.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
Digital Crimes Cell Phone Computer. Malicious Use of a Telephone MCL e Threatening physical harm or damage to a person or property in the course.
Abuse of Cyberspace Law and Policy. Guiding questions What are the various kinds of abuse? What is the law with regard to this? What are the agencies.
Sexual Harassment of Women in the Workplace Lina Acca Mathew, Assistant Professor, Government Law Colleges Kerala.
How safe are our children over the Internet
Cyber and Internet Safety (Parents’ Night)
Sharing Images – The Law
Cyber Crime.
IT ACT 2000 and 2008 Important Sections Awareness Presentation
Safeguarding your child in the digital world
Sexting What is meant by sexting?.
Sexual Harassment Ms Juliana Lohar Arz 04/08/12.
Harmful Digital Communications Act 2015 URLs
Social Networking.
Online safety.
Presentation transcript:

Cyber safety for WomenCyber safety for Women Lina Acca Mathew, Assistant Professor, Government Law College, ErnakulamLina Acca Mathew, Assistant Professor, Government Law College, Ernakulam

Cyberspace  Without borders  Anonymous  Easily Accessible  Dynamic Information and Communication Technologies William Gibson– Neuromancer(1984) John Perry Barlow, ‘present day nexus of computer and telecom networks’ (1990)

Cognizable, non cognizable, bailable and non-bailable offences Cognizable offences Cyber terrorism-non bailable Transmission of sexually explicit acts-non-bailable Child pornography-non-bailable Failure to assist in intercepting, monitoring or decryption Failure of intermediary to block access of information Access to protected system-non bailable Bailable offences Hacking, stalking, cheating, identity theft, violation of privacy

The NCRB (2012) figures also gave an interesting insight into the changing mind-set of Kerala State: in 96 cases registered under cyber crimes, the motive was harassment of women 48 cases were for committing fraud or illegal gain 44 cases were for money 19 for causing disrepute to others. out of 312 persons arrested as suspects in cases for cyber crimes, 73 were neighbours, friends or relatives.

NCRB (2012 statistics) for Kerala State regarding arrests for cyber crimes: 15 persons below age of persons aged years 44 persons aged years 11 persons years  Out of the cases registered under IT Act in the Kerala State, 147 were for publishing or electronic transmission of obscene material, which is the highest among other States. Maharashtra came second with 76 cases.

Reasons for growth of cyber crimes against women The transcendental nature of the internet- no boundaries, ever changing Low equipment cost Numerous vulnerable targets- Loneliness is a prime cause as many female students and staff live away from family and work for long hours over the computers. Thereby computers become their trusted pal. Easy concealment due to anonymity Most of the cyber crimes remain unreported due to the hesitation and shyness of the victim and her fear of defamation of family’s name.

How does cyber victimization affect the concept of violence against women?

Risks faced by women over the internet  Violation of body privacy  Online harassment  Cyber stalking  Exposure to online fraudsters  Portraying women in a most indecent manner  Workplace harassment with digital aid

Online/Mobile harassment/Cyber bullying and Cyber stalking Harassment through electronic means by sending grossly offensive or menacing information, and persistently causing annoyance, injury, insult etc is punishable with imprisonment for a term which may extend to three years and with fine- Section 66A, Information Technology Act

Sending offensive messages through a computer resource or communications device (Section 66A, ITA)- cognizable, bailable any information that is grossly offensive or has menacing character or any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device, or any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages Punishment: imprisonment for a term which may extend to three years and with fine.

Section 354A IPC - ‘Sexual harassment’ A man committing any of the following acts- physical contact and advances involving unwelcome and explicit sexual overtures; or a demand or request for sexual favours; or showing pornography against the will of a woman; or making sexually coloured remarks, shall be guilty of the offence of sexual harassment. The first three offences of sexual harassment carry punishment of rigorous imprisonment for a term which may extend to three years, or with fine, or with both. The last offence of sexual harassment carries punishment of imprisonment of either description for a term which may extend to one year, or with fine, or with both.

Section 354D IPC- ‘Stalking’ Any man who- follows a woman and contacts, or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman; or monitors the use by a woman of the internet, or any other form of electronic communication, commits the offence of stalking: Whoever commits the offence of stalking shall be punished on first conviction with imprisonment of either description for a term which may extend to three years and shall also be liable to fine;

Violation of Body Privacy- s. 66E cognizable, bailable Capturing the image of a private body part of a person is punishable with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or both- Section 66E, Information Technology Act

Section 354C IPC -‘Voyeurism’. Any man who watches, or captures the image of a woman engaging in a private act in circumstances where she would usually have the expectation of not being observed either by the perpetrator or by any other person at the behest of the perpetrator or disseminates such image shall be punished on first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine, and shall be punished on a second or subsequent conviction, with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine. “private act” includes an act of watching carried out in a place which, in the circumstances, would reasonably be expected to provide privacy and where the victim’s genitals, posterior or breasts are exposed or covered only in underwear, or the victim is using a lavatory; or the victim is doing a sexual act that is not of a kind ordinarily done in public. Where the victim consents to the capture of the images or any act but not to their dissemination to third persons and where such image or act is disseminated, such dissemination shall be considered an offence under this section.

Section 67: Punishment for publishing or transmitting obscene material in electronic form – cognizable, bailable Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to three years and with fine which may extend to five lakh rupees

Section 67A: material containing sexually explicit act, etc. in electronic form cognizable, non-bailable Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees.

INDIA –Section 67B Information Technology Act 2000 cognizable, non-bailable ‘Whoever,- (a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct; or ( b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children,

Information Technology Act-Section 67B Punishment  1 st conviction– 5 years+ Rs. 10 lakh fine  2 nd conviction- 7 years +Rs.10 lakh fine This Section covers --  using children for child pornography  Perpetrator of abuse may be adult or child  predating on children for online grooming, both by adult and child offenders

Do’s and Don'ts Don’t ever put too much personal details on Facebook, Google+, LinkedIn, or other social networking as it might get misused. Always make two kinds of online presence: a professional presence for your colleagues and clients and a private presence meant for socializing. The presence should be with some online identity that consists of a dummy profile photo and details. Do not reveal mother’s name or your personal tastes, distastes, hobbies, which can be used to profile you and segregate you for targeted cyber crimes. Don’t post your personal memoirs like snaps, where you are partying, or where you are on vacation. This helps to further profile you.

Dos and Don’ts Ensure that your private moments or bedroom pictures are not on your computers, which are hooked to the Internet and specifically on computers, where you download torrents. While in hotel or in changing rooms of malls, ensure to check for a two-way mirror. Ensure that your Webcam on computer is plugged out when not in use, and mobile phones with camera are kept in reverse direction

Dos and don’ts All data can be retrieved even if you destroy your mobile phone. Avoid misusing your phone. Install filters in your computer in order to prevent children from inadvertently accessing illegal data on the internet. Do not give classified information to any one online. In order to purchase over the internet it is often safer to use the Cash on Delivery option.

Dos and Don’ts Close the doors by effective password selection Expand friends circle with prior information alone Use multiple ids Be willing to report crime and not encourage hacking

The legal interface Contact the cyber crime cell in your district to report any kind of harassment Website liability Blocking of websites

Why does law fail? Preconceived notions about police and the criminal justice system Attitude of the victim Patriarchal society Fear of revealing past history Privacy issues