SlideShare a Scribd company logo
Remedies for CyberCrimes Against Women:
some thoughts
Dr. Debarati Halder
Advocate & Managing Director
Centre for Cyber victim Counseling (CCVC)
Tirunelveli
www.cybervictims.org
• Cyber crime against
women is :
“Crimes targeted against
women with a motive to
intentionally harm the
victim, using modern
telecommunication
networks such as the
internet (chat rooms,
emails, notice boards and
groups) and mobile
phones(SMS/MMS)”.
Debarati Halder & K.
Jaishankar(2012)
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
How cyber
victimization affects
the concept of
violence against
women?
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
 portrayal of women
in the most
indecent manner.
 Stalking
 Harassing
messages
 Workplace
harassment with
digital aide
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Available legal remedies for women
and young girls for indecent portrayal

•

Sections 67, 67a of the Information
technology Act,2000(amended in
2008)
Section 66a of the Information
Technology Act (amended in 2008)
Section 66C(punishment for identity
theft), 66D(punishment for cheating
by impersonation) along with 67B,
66E of the IT Act offer remedy.

.Section 292,293,294 IPC





Section 354C IPC (inserted by
Criminal Law Amendment Act, 2013
Section 509 IPC
Section 499,500 IPC
S.s 3 &4 of The Indecent Represent
of Women (prohibition) Act

12/25/13

•

Usage of children for creation of
content(S.13, Protection of children
from sexual offences act, S.67B (c) I T
Act.

(i) Production, storing, distribution of the
content(S.11 (ii) & (iii)
(ii) Sexual harassment in the course of
creation of content S.67B (d) IT Act
and S.11 Protection of children from
sexual offences Act

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Online stalking
• In one word, when ‘following’ is added by Mens rea to
commit harm and it is successfully digitally carried out,
we can say cyber stalking has happened (Halder &
Jaishankar,2010).
• S.354D of the Criminal Law Amendment Act, 2013 also
addresses stalking by man and includes the following
acts:
 Following/contacting/trying to contact repeatedly
 Monitoring a woman either physically or online
 Watching/spying a woman
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Remedies offered by the laws
 prevention of the crime
 Introducing new rights
 Expanding the scope of the independent duty
of the police
 Retributive jurisprudential measures

12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Where does law/criminal justice
mechanism fail?
 Attitude of the victim
 Patriarchal society
 Fear of revealing past history
 Media and privacy issues
 Preconceived notion about the police and
criminal justice system

12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
The other option ?
 Liability of the website
 Forms of reporting
 Usage of police-social media channel

12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Self protecting measures
• Controlled data contribution
• Closing the doors by effective password
choosing.
• Expanding friend-circle with prior information
• Usage of multiple email ids
• Self detection of suspicious accounts
• Willingness to report a crime and not
encourage hacking.
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Building up effective friend circle
online

12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Counselling through “Therapeutic
Jurisprudence” way

12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Awareness
Spreading awareness through
two blogs : “Cyber crime against
women in India and the laws”©
(http://debaraticyberspace.blogspot.in/
) &
“Cyber victimization”
©(http://cybervictims.blogspot.in/)
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder
Enjoy the internet era
 Write to us for any help @
ccvcindia@cybervictims.org or
ccvcindia@gmail.com
 Call us @ 09894700935
Dr. Debarati Halder
Advocate & Managing Director
Centre for Cyber victim Counseling
Tirunelveli
www.cybervictims.org
12/25/13

Online Victimisation of Women: Trends &
Issues by Debarati Halder

More Related Content

What's hot

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Crime PREVENTION
Crime PREVENTIONCrime PREVENTION
Crime PREVENTION
Adamas University
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Crime Against women
Crime Against womenCrime Against women
Crime Against womenKashmira_180
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
Mukarram Dhorajiwala
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Crime against-women
Crime against-womenCrime against-women
Crime against-women
Saurabh Verma
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 

What's hot (20)

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Crime PREVENTION
Crime PREVENTIONCrime PREVENTION
Crime PREVENTION
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Crime Against women
Crime Against womenCrime Against women
Crime Against women
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Crime against-women
Crime against-womenCrime against-women
Crime against-women
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Viewers also liked

Crime against women
Crime against womenCrime against women
Crime against womenPayel Ghosh
 
crime against women in india
crime against women in indiacrime against women in india
crime against women in india
Suraj Singh
 
16 Days 2013: Presentation on Take Back the Tech
16 Days 2013: Presentation on Take Back the Tech16 Days 2013: Presentation on Take Back the Tech
16 Days 2013: Presentation on Take Back the Tech
The Prajnya Trust
 
16 Days 2013: Presentation on Hollaback! Chennai
16 Days 2013: Presentation on Hollaback! Chennai16 Days 2013: Presentation on Hollaback! Chennai
16 Days 2013: Presentation on Hollaback! Chennai
The Prajnya Trust
 
VIOLENCE AGAINST WOMEN
VIOLENCE AGAINST WOMENVIOLENCE AGAINST WOMEN
VIOLENCE AGAINST WOMEN
rambhu21
 
Mike Halder Resume
Mike Halder ResumeMike Halder Resume
Mike Halder ResumeMike Halder
 
16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...
16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...
16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...The Prajnya Trust
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
Gaurav Lakha
 
Cyber laws
Cyber lawsCyber laws
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crimeJayakumar PP
 
Crime against women for official presentation
Crime against women for official presentationCrime against women for official presentation
Crime against women for official presentation
HIMANSHU SINGH
 
The Challenges of Preventing & Responding to Violence Against Women Crimes on...
The Challenges of Preventing & Responding to Violence Against Women Crimes on...The Challenges of Preventing & Responding to Violence Against Women Crimes on...
The Challenges of Preventing & Responding to Violence Against Women Crimes on...Margolis Healy
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Mariam Sb
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
Sanjay Kumar
 
Crimes against children
Crimes against childrenCrimes against children
Crimes against childrensrchalla
 
Presentation1
Presentation1Presentation1
Presentation1
Titiksha Jain
 
HeForShe Certificate - Chandan Tanwar
HeForShe Certificate - Chandan TanwarHeForShe Certificate - Chandan Tanwar
HeForShe Certificate - Chandan Tanwarchandan tanwar
 
Gender Equality as a Vehicle for Achieving Inclusive and Sustainable Growth
Gender Equality as a Vehicle for Achieving Inclusive and Sustainable GrowthGender Equality as a Vehicle for Achieving Inclusive and Sustainable Growth
Gender Equality as a Vehicle for Achieving Inclusive and Sustainable GrowthUNDP Eurasia
 
Women safety - delhi-case study recommendations (c)uttipec
Women safety - delhi-case study recommendations (c)uttipecWomen safety - delhi-case study recommendations (c)uttipec
Women safety - delhi-case study recommendations (c)uttipec
Uttipec Dda
 

Viewers also liked (20)

Crime against women
Crime against womenCrime against women
Crime against women
 
crime against women in india
crime against women in indiacrime against women in india
crime against women in india
 
16 Days 2013: Presentation on Take Back the Tech
16 Days 2013: Presentation on Take Back the Tech16 Days 2013: Presentation on Take Back the Tech
16 Days 2013: Presentation on Take Back the Tech
 
16 Days 2013: Presentation on Hollaback! Chennai
16 Days 2013: Presentation on Hollaback! Chennai16 Days 2013: Presentation on Hollaback! Chennai
16 Days 2013: Presentation on Hollaback! Chennai
 
VIOLENCE AGAINST WOMEN
VIOLENCE AGAINST WOMENVIOLENCE AGAINST WOMEN
VIOLENCE AGAINST WOMEN
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Mike Halder Resume
Mike Halder ResumeMike Halder Resume
Mike Halder Resume
 
16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...
16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...
16 Days 2013: Presentation by Kalpana Viswanath on safety audits and urban pl...
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 
Crime against women for official presentation
Crime against women for official presentationCrime against women for official presentation
Crime against women for official presentation
 
The Challenges of Preventing & Responding to Violence Against Women Crimes on...
The Challenges of Preventing & Responding to Violence Against Women Crimes on...The Challenges of Preventing & Responding to Violence Against Women Crimes on...
The Challenges of Preventing & Responding to Violence Against Women Crimes on...
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 
Crimes against children
Crimes against childrenCrimes against children
Crimes against children
 
Presentation1
Presentation1Presentation1
Presentation1
 
HeForShe Certificate - Chandan Tanwar
HeForShe Certificate - Chandan TanwarHeForShe Certificate - Chandan Tanwar
HeForShe Certificate - Chandan Tanwar
 
Gender Equality as a Vehicle for Achieving Inclusive and Sustainable Growth
Gender Equality as a Vehicle for Achieving Inclusive and Sustainable GrowthGender Equality as a Vehicle for Achieving Inclusive and Sustainable Growth
Gender Equality as a Vehicle for Achieving Inclusive and Sustainable Growth
 
Women safety - delhi-case study recommendations (c)uttipec
Women safety - delhi-case study recommendations (c)uttipecWomen safety - delhi-case study recommendations (c)uttipec
Women safety - delhi-case study recommendations (c)uttipec
 

Similar to 16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes against Women

Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
Mubarak Al Hadadi
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
Finlaw Associates
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationdh24gold
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanSVS College
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipPaul I
 
We Want to be SAFE, Stop abuse of people with disabilities
We Want to be SAFE, Stop abuse of people with disabilitiesWe Want to be SAFE, Stop abuse of people with disabilities
We Want to be SAFE, Stop abuse of people with disabilities
Board Resource Center - BRC
 
Digital Democracy by Katarzyna Anna Klimowicz and David Duenas-Cid
Digital Democracy by Katarzyna Anna Klimowicz and David Duenas-CidDigital Democracy by Katarzyna Anna Klimowicz and David Duenas-Cid
Digital Democracy by Katarzyna Anna Klimowicz and David Duenas-Cid
Luke Turkus Solarski
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
Dobby12
 
Children & Youths Online
Children & Youths OnlineChildren & Youths Online
Children & Youths Onlineveilma
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
RandyMcCall
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
HODCSEKncet
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
sepulvedamd
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
damarissepulveda
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
legal and ethical issue full.pptx
legal and ethical issue full.pptxlegal and ethical issue full.pptx
legal and ethical issue full.pptx
AswathyAs24
 
legal and ethical issue full.pptx
legal and ethical issue full.pptxlegal and ethical issue full.pptx
legal and ethical issue full.pptx
AswathyAs24
 
legal and ethical issue full.pptx
legal and ethical issue full.pptxlegal and ethical issue full.pptx
legal and ethical issue full.pptx
AswathyAs24
 

Similar to 16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes against Women (20)

Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 
Youth Victimization
Youth VictimizationYouth Victimization
Youth Victimization
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
We Want to be SAFE, Stop abuse of people with disabilities
We Want to be SAFE, Stop abuse of people with disabilitiesWe Want to be SAFE, Stop abuse of people with disabilities
We Want to be SAFE, Stop abuse of people with disabilities
 
Digital Democracy by Katarzyna Anna Klimowicz and David Duenas-Cid
Digital Democracy by Katarzyna Anna Klimowicz and David Duenas-CidDigital Democracy by Katarzyna Anna Klimowicz and David Duenas-Cid
Digital Democracy by Katarzyna Anna Klimowicz and David Duenas-Cid
 
Cyber bullying.pdf
Cyber bullying.pdfCyber bullying.pdf
Cyber bullying.pdf
 
Children & Youths Online
Children & Youths OnlineChildren & Youths Online
Children & Youths Online
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber BullyingCyberbullyng: Demystifying and Deescalating Cyber Bullying
Cyberbullyng: Demystifying and Deescalating Cyber Bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Cyberbullying pp-bt28th
Cyberbullying pp-bt28thCyberbullying pp-bt28th
Cyberbullying pp-bt28th
 
legal and ethical issue full.pptx
legal and ethical issue full.pptxlegal and ethical issue full.pptx
legal and ethical issue full.pptx
 
legal and ethical issue full.pptx
legal and ethical issue full.pptxlegal and ethical issue full.pptx
legal and ethical issue full.pptx
 
legal and ethical issue full.pptx
legal and ethical issue full.pptxlegal and ethical issue full.pptx
legal and ethical issue full.pptx
 

More from The Prajnya Trust

Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...
Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...
Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...
The Prajnya Trust
 
End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...
End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...
End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...
The Prajnya Trust
 
Celebrating Prajnya at 12... and you!
Celebrating Prajnya at 12... and you!Celebrating Prajnya at 12... and you!
Celebrating Prajnya at 12... and you!
The Prajnya Trust
 
Prajnya10souvenir
Prajnya10souvenirPrajnya10souvenir
Prajnya10souvenir
The Prajnya Trust
 
Prajnya: The Journey
Prajnya: The JourneyPrajnya: The Journey
Prajnya: The Journey
The Prajnya Trust
 
16 reasons, 16 days
16 reasons, 16 days16 reasons, 16 days
16 reasons, 16 days
The Prajnya Trust
 
Prajnya Gender Equality Election Checklist
Prajnya Gender Equality Election ChecklistPrajnya Gender Equality Election Checklist
Prajnya Gender Equality Election Checklist
The Prajnya Trust
 
Why support the 2016 Prajnya 16 Days Campaign?
Why support the 2016 Prajnya 16 Days Campaign?Why support the 2016 Prajnya 16 Days Campaign?
Why support the 2016 Prajnya 16 Days Campaign?
The Prajnya Trust
 
Invitation to Vasundhara, a special giving circle for Prajnya
Invitation to Vasundhara, a special giving circle for PrajnyaInvitation to Vasundhara, a special giving circle for Prajnya
Invitation to Vasundhara, a special giving circle for Prajnya
The Prajnya Trust
 
Celebrating Women Human Rights Defenders
Celebrating Women Human Rights Defenders Celebrating Women Human Rights Defenders
Celebrating Women Human Rights Defenders
The Prajnya Trust
 
300,000: End the silence around gender violence: 2014 Prajnya fundraising drive
300,000: End the silence around gender violence: 2014 Prajnya fundraising drive300,000: End the silence around gender violence: 2014 Prajnya fundraising drive
300,000: End the silence around gender violence: 2014 Prajnya fundraising drive
The Prajnya Trust
 
16 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 201316 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 2013The Prajnya Trust
 
Prajnya: Who we are and why we need your support
Prajnya: Who we are and why we need your supportPrajnya: Who we are and why we need your support
Prajnya: Who we are and why we need your support
The Prajnya Trust
 
With your help, we can do anything!
With your help, we can do anything!With your help, we can do anything!
With your help, we can do anything!The Prajnya Trust
 
whatyouenable
whatyouenablewhatyouenable
whatyouenable
The Prajnya Trust
 
Prajnya 2012 Fundraising Appeal
Prajnya 2012 Fundraising AppealPrajnya 2012 Fundraising Appeal
Prajnya 2012 Fundraising Appeal
The Prajnya Trust
 

More from The Prajnya Trust (17)

Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...
Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...
Dr. Aiswarya Rao: Reporting Gender Violence in the context of People with Dis...
 
End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...
End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...
End the Silence! Support the 2020 Prajnya 16 Days Campaign against Gender Vio...
 
Celebrating Prajnya at 12... and you!
Celebrating Prajnya at 12... and you!Celebrating Prajnya at 12... and you!
Celebrating Prajnya at 12... and you!
 
Prajnya10souvenir
Prajnya10souvenirPrajnya10souvenir
Prajnya10souvenir
 
Prajnya: The Journey
Prajnya: The JourneyPrajnya: The Journey
Prajnya: The Journey
 
16 reasons, 16 days
16 reasons, 16 days16 reasons, 16 days
16 reasons, 16 days
 
Prajnya Gender Equality Election Checklist
Prajnya Gender Equality Election ChecklistPrajnya Gender Equality Election Checklist
Prajnya Gender Equality Election Checklist
 
Why support the 2016 Prajnya 16 Days Campaign?
Why support the 2016 Prajnya 16 Days Campaign?Why support the 2016 Prajnya 16 Days Campaign?
Why support the 2016 Prajnya 16 Days Campaign?
 
Invitation to Vasundhara, a special giving circle for Prajnya
Invitation to Vasundhara, a special giving circle for PrajnyaInvitation to Vasundhara, a special giving circle for Prajnya
Invitation to Vasundhara, a special giving circle for Prajnya
 
Celebrating Women Human Rights Defenders
Celebrating Women Human Rights Defenders Celebrating Women Human Rights Defenders
Celebrating Women Human Rights Defenders
 
300,000: End the silence around gender violence: 2014 Prajnya fundraising drive
300,000: End the silence around gender violence: 2014 Prajnya fundraising drive300,000: End the silence around gender violence: 2014 Prajnya fundraising drive
300,000: End the silence around gender violence: 2014 Prajnya fundraising drive
 
16 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 201316 Days 2013: Presentation based on UN Study, December 6, 2013
16 Days 2013: Presentation based on UN Study, December 6, 2013
 
Prajnya: Who we are and why we need your support
Prajnya: Who we are and why we need your supportPrajnya: Who we are and why we need your support
Prajnya: Who we are and why we need your support
 
With your help, we can do anything!
With your help, we can do anything!With your help, we can do anything!
With your help, we can do anything!
 
Wringing water from stone
Wringing water from stoneWringing water from stone
Wringing water from stone
 
whatyouenable
whatyouenablewhatyouenable
whatyouenable
 
Prajnya 2012 Fundraising Appeal
Prajnya 2012 Fundraising AppealPrajnya 2012 Fundraising Appeal
Prajnya 2012 Fundraising Appeal
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 

16 Days 2013: Presentation by Dr. Debarati Halder, Remedies for Cyber-Crimes against Women

  • 1. Remedies for CyberCrimes Against Women: some thoughts Dr. Debarati Halder Advocate & Managing Director Centre for Cyber victim Counseling (CCVC) Tirunelveli www.cybervictims.org
  • 2. • Cyber crime against women is : “Crimes targeted against women with a motive to intentionally harm the victim, using modern telecommunication networks such as the internet (chat rooms, emails, notice boards and groups) and mobile phones(SMS/MMS)”. Debarati Halder & K. Jaishankar(2012) 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 3. How cyber victimization affects the concept of violence against women? 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 4.  portrayal of women in the most indecent manner.  Stalking  Harassing messages  Workplace harassment with digital aide 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 5. Available legal remedies for women and young girls for indecent portrayal  • Sections 67, 67a of the Information technology Act,2000(amended in 2008) Section 66a of the Information Technology Act (amended in 2008) Section 66C(punishment for identity theft), 66D(punishment for cheating by impersonation) along with 67B, 66E of the IT Act offer remedy. .Section 292,293,294 IPC     Section 354C IPC (inserted by Criminal Law Amendment Act, 2013 Section 509 IPC Section 499,500 IPC S.s 3 &4 of The Indecent Represent of Women (prohibition) Act 12/25/13 • Usage of children for creation of content(S.13, Protection of children from sexual offences act, S.67B (c) I T Act. (i) Production, storing, distribution of the content(S.11 (ii) & (iii) (ii) Sexual harassment in the course of creation of content S.67B (d) IT Act and S.11 Protection of children from sexual offences Act Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 6. Online stalking • In one word, when ‘following’ is added by Mens rea to commit harm and it is successfully digitally carried out, we can say cyber stalking has happened (Halder & Jaishankar,2010). • S.354D of the Criminal Law Amendment Act, 2013 also addresses stalking by man and includes the following acts:  Following/contacting/trying to contact repeatedly  Monitoring a woman either physically or online  Watching/spying a woman 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 7. Remedies offered by the laws  prevention of the crime  Introducing new rights  Expanding the scope of the independent duty of the police  Retributive jurisprudential measures 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 8. Where does law/criminal justice mechanism fail?  Attitude of the victim  Patriarchal society  Fear of revealing past history  Media and privacy issues  Preconceived notion about the police and criminal justice system 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 9. The other option ?  Liability of the website  Forms of reporting  Usage of police-social media channel 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 10. Self protecting measures • Controlled data contribution • Closing the doors by effective password choosing. • Expanding friend-circle with prior information • Usage of multiple email ids • Self detection of suspicious accounts • Willingness to report a crime and not encourage hacking. 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 11. Building up effective friend circle online 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 12. Counselling through “Therapeutic Jurisprudence” way 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 13. Awareness Spreading awareness through two blogs : “Cyber crime against women in India and the laws”© (http://debaraticyberspace.blogspot.in/ ) & “Cyber victimization” ©(http://cybervictims.blogspot.in/) 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder
  • 14. Enjoy the internet era  Write to us for any help @ ccvcindia@cybervictims.org or ccvcindia@gmail.com  Call us @ 09894700935 Dr. Debarati Halder Advocate & Managing Director Centre for Cyber victim Counseling Tirunelveli www.cybervictims.org 12/25/13 Online Victimisation of Women: Trends & Issues by Debarati Halder