SlideShare a Scribd company logo
1 of 11
Speech before theSpeech before the
Group responsible for drafting theGroup responsible for drafting the
manual about safe use of internetmanual about safe use of internet
CYBER BULLYING
THE COURT’S ROLE
Speaker: Georgios C. Vlamis,
District Court Judge
UNDER CYPRUS CRIMINAL CODE
(CAP. 154)
 Any child less than 14 years old is not criminally liable for any
act or omission.
 The Court may impose to a person older 14 years old found
guilty any of the following type of sentence:
• life imprisonment
• imprisonment
• pecuniary penalty
• order to pay damages
• bail assurance
• probation
• others provided by special acts e.g. guardianship order that
imposes the execution of community services
2
The current legal framework in Cyprus against
cyber bullying
The dangers hiding behind the daily use of internet and
generally technology led to update the legislation in the
island in an attempt to ensure safe use by children.
As a result of this, the following Acts have been
enacted:
 The Electronic Communication and Posting Services
Act 2004 (112(I)/2004)
 Against the Cyber Crime Acts 2004-2013
(22/III/2004)
3
The Electronic Communication and Posting
Services Act 2004 (112(I)/2004
 Its context is harmonized with the provisions of European
Directive 2002/58/EC which process private data and at the same
time protects private life through the electronic communication
sector
 This legislation (112(I)/2004) incorporates specific rules dealing
with personal data and protecting the rights of users
 The Act also states that if someone:
sends a message (voice or text) to somebody else knowing
that it in not true with the intention to cause harassment or
annoyance, or
sends a message (voice or text) to someone else which is
obvious offensive or indecent or disgraceful or threatening,
is committing criminal offence and if found guilty faces pecuniary
penalty up to €1.700.
4
The Electronic Communication and Posting
Services Act 2004 (112(I)/2004 (continued)
 The Act also states that if anybody:
intentionally amend or intervene to the context of any
message which does not belong to him, or
prevent the dispatch, transfer or delivery any message
which does not belong to him, or
intentionally reveal or use the contents of any message
or information resulting from a message which does not
belong to him or is related to the personal data of
another person,
is committing criminal offence and if found guilty faces
either imprisonment up to 6 months or pecuniary penalty
up to €1.700 or both.
5
Against the Cyber Crime Acts 2004-2013
(22(III/2004)
 It is the main legislation against cyber crime.
 It is the enactment that ratifies the European Convention against
cyber crime which has been signed in Budapest on 23.11.2001
 This legislation stipulates, amongst others, that:
 Whoever, with intention and without any right, obtains access to
electronic computer system by breaching the safety measures is
committing criminal offence and if found guilty faces either
imprisonment up to 5 years or pecuniary penalty up to €34.172,03 or
both
 Whoever, with intention and without any right, destroys, deletes,
amends or conceals data from computer is committing criminal
offence and if found guilty faces either imprisonment up to 5 years or
pecuniary penalty up to €34.172,03 or both.
 Whoever is involved with children’s pornography material used in a
computer system is committing criminal offence and if found guilty
faces either imprisonment up to 5 years or pecuniary penalty up to
€42.715,04 or both.
6
Specialized Department
The Forensic Laboratory for electronic data:
 has been created and operates since April 2009
 is part of the Cypriot Police
 undertakes criminal case related to cyber crime
 examines electronic marks (such as computers,
electronic address of computers, internet platforms,
websites, e-mail address, satellite receptions etc.)
 its personnel has the necessary experience to
investigate criminal cases which are related to
internet offences or offences in connection with
computers.
7
Prevention of cyber bullying prevention
 Preventing steps against cyber bullying involving children is
responsibility of parents, school management and its staff and
relevant authorities specializing in effectively informing the
children and dealing with this matter.
 Indicatively I should mention that:
Parents should be alerted and learn how to react in front of this
situation. They must also immediately report such a case to
the school and cooperate with the management and the staff.
Also report the incident to the police.
School management must issue regulations which should serve
both to students and their parents.
School staff must cooperate with management in cultivating an
environment which does not facilitate cyber bullying.
School management and staff must closely cooperate with
parents.
School management and staff must attend seminars organized
by specialists on bullying so as to be able to administer with
efficiency if such a case appears.
School management and staff must cooperate with relevant
authorities specializing in dealing with this matter.
8
How the Court faces a cyber bullying case
 If a cyber bullying situation falls within any of the above
stated criminal offence, then provided there is adequate
evidence the case is presented by the police before the court.
 If upon hearing the accused is found guilty or if the accused
pleads guilty in any of the criminal offence is facing, the court
will impose him a sentence.
 The imposition of sentence serves two purposes:
(1) To punish the accused with the proper and fair,
under the circumstances and based on the presented
facts of the case, sentence.
(2) To pass a message on the society that such behaviour is
unacceptable.
9
How the Court faces a cyber bullying case (continued)
 The sentence usually operates as deterrent factor on others
who intend to commit the same offence on other victims. In
this way society is protected.
 In case the accused found guilty is older than 14 years old but
younger than 18 years old, the obligation to attend seminars
on cyber bullying provided by experts on this matter and/or
undertake to execute community services as probable proper
sentence will not be excluded. I would rather say it seems to
be more probable than any other type of sentence. In this way
the young person gets punishment and at the same time it
helps him/her to understand his/her mistake and therefore
gets a lesson for not repeating such behaviour.
10
THANK YOU VERY MUCH FOR YOUR
PATIENCE!!!
I AM NOW AT YOUR DISPOSAL FOR ANY
QUESTIONS OR CLARIFICATIONS YOY MAY
HAVE.
11

More Related Content

What's hot

Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Zephyrum
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
b5thom
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure english
ThinkB4UClick
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
opiedog1
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 

What's hot (20)

SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible Use
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
University of the Highlands & Islands - e-Safety & e-Safeguarding
University of the Highlands & Islands - e-Safety & e-SafeguardingUniversity of the Highlands & Islands - e-Safety & e-Safeguarding
University of the Highlands & Islands - e-Safety & e-Safeguarding
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
E behaviour code brochure english
E behaviour code brochure englishE behaviour code brochure english
E behaviour code brochure english
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Your e image presentation 2
Your e image presentation 2Your e image presentation 2
Your e image presentation 2
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Module 10
Module 10 Module 10
Module 10
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 

Similar to CYBER BULLYING THE COURT’S ROLE

Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
segughana
 
Pal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimePal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrime
Mustafa Jarrar
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
Rahuljain40418
 

Similar to CYBER BULLYING THE COURT’S ROLE (20)

Tomasz Czajkowski
Tomasz CzajkowskiTomasz Czajkowski
Tomasz Czajkowski
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
Pal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimePal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrime
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Health q 2 l-3
Health q 2 l-3Health q 2 l-3
Health q 2 l-3
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime Law
 
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and ResearchPresentation by Egya Kwamena Jallow to African Security Dialogue and Research
Presentation by Egya Kwamena Jallow to African Security Dialogue and Research
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Criminal Law
Criminal LawCriminal Law
Criminal Law
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 

More from InterMediaKT

More from InterMediaKT (20)

Let women-choose-publication
Let women-choose-publicationLet women-choose-publication
Let women-choose-publication
 
Annual report 2020
Annual report 2020Annual report 2020
Annual report 2020
 
InterMediaKT Newsletter 6
InterMediaKT Newsletter 6InterMediaKT Newsletter 6
InterMediaKT Newsletter 6
 
InterMediaKT Newsletter #5
InterMediaKT Newsletter #5 InterMediaKT Newsletter #5
InterMediaKT Newsletter #5
 
InterMediaKT Newsletter 4
InterMediaKT Newsletter 4InterMediaKT Newsletter 4
InterMediaKT Newsletter 4
 
InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019 InterMediaKT - Annual Report 2019
InterMediaKT - Annual Report 2019
 
InterMediaKT Newsletter 3
InterMediaKT Newsletter 3InterMediaKT Newsletter 3
InterMediaKT Newsletter 3
 
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu | GATES Yearbook - An Erasmus+ Project | play4impact.eu |
GATES Yearbook - An Erasmus+ Project | play4impact.eu |
 
InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019InterMediaKT Newsletter 2 - August 2019
InterMediaKT Newsletter 2 - August 2019
 
Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός Hλεκτρονικός Eκφοβισμός
Hλεκτρονικός Eκφοβισμός
 
O5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GRO5 - Cyberbullying guide - Short version - GR
O5 - Cyberbullying guide - Short version - GR
 
O5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PTO5 - Cyberbullying guide - Short version - PT
O5 - Cyberbullying guide - Short version - PT
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
Guide 3 - Tips for kids
Guide 3 - Tips for kidsGuide 3 - Tips for kids
Guide 3 - Tips for kids
 
Guide 2 - Tips for teachers
Guide 2 - Tips for teachersGuide 2 - Tips for teachers
Guide 2 - Tips for teachers
 
O5 - Cyberbullying Guide
O5 - Cyberbullying GuideO5 - Cyberbullying Guide
O5 - Cyberbullying Guide
 
Online threats and responsible behavior (Bulgarian Safer Internet Centre)
Online threats and responsible behavior (Bulgarian Safer Internet Centre)Online threats and responsible behavior (Bulgarian Safer Internet Centre)
Online threats and responsible behavior (Bulgarian Safer Internet Centre)
 
School Mediation student training
School Mediation student trainingSchool Mediation student training
School Mediation student training
 
Open Coffee Patras XIX - Tapely
Open Coffee Patras XIX - TapelyOpen Coffee Patras XIX - Tapely
Open Coffee Patras XIX - Tapely
 
Open Coffee Patras XIX - Eestec in entrepreneurship
Open Coffee Patras XIX - Eestec in entrepreneurshipOpen Coffee Patras XIX - Eestec in entrepreneurship
Open Coffee Patras XIX - Eestec in entrepreneurship
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 

CYBER BULLYING THE COURT’S ROLE

  • 1. Speech before theSpeech before the Group responsible for drafting theGroup responsible for drafting the manual about safe use of internetmanual about safe use of internet CYBER BULLYING THE COURT’S ROLE Speaker: Georgios C. Vlamis, District Court Judge
  • 2. UNDER CYPRUS CRIMINAL CODE (CAP. 154)  Any child less than 14 years old is not criminally liable for any act or omission.  The Court may impose to a person older 14 years old found guilty any of the following type of sentence: • life imprisonment • imprisonment • pecuniary penalty • order to pay damages • bail assurance • probation • others provided by special acts e.g. guardianship order that imposes the execution of community services 2
  • 3. The current legal framework in Cyprus against cyber bullying The dangers hiding behind the daily use of internet and generally technology led to update the legislation in the island in an attempt to ensure safe use by children. As a result of this, the following Acts have been enacted:  The Electronic Communication and Posting Services Act 2004 (112(I)/2004)  Against the Cyber Crime Acts 2004-2013 (22/III/2004) 3
  • 4. The Electronic Communication and Posting Services Act 2004 (112(I)/2004  Its context is harmonized with the provisions of European Directive 2002/58/EC which process private data and at the same time protects private life through the electronic communication sector  This legislation (112(I)/2004) incorporates specific rules dealing with personal data and protecting the rights of users  The Act also states that if someone: sends a message (voice or text) to somebody else knowing that it in not true with the intention to cause harassment or annoyance, or sends a message (voice or text) to someone else which is obvious offensive or indecent or disgraceful or threatening, is committing criminal offence and if found guilty faces pecuniary penalty up to €1.700. 4
  • 5. The Electronic Communication and Posting Services Act 2004 (112(I)/2004 (continued)  The Act also states that if anybody: intentionally amend or intervene to the context of any message which does not belong to him, or prevent the dispatch, transfer or delivery any message which does not belong to him, or intentionally reveal or use the contents of any message or information resulting from a message which does not belong to him or is related to the personal data of another person, is committing criminal offence and if found guilty faces either imprisonment up to 6 months or pecuniary penalty up to €1.700 or both. 5
  • 6. Against the Cyber Crime Acts 2004-2013 (22(III/2004)  It is the main legislation against cyber crime.  It is the enactment that ratifies the European Convention against cyber crime which has been signed in Budapest on 23.11.2001  This legislation stipulates, amongst others, that:  Whoever, with intention and without any right, obtains access to electronic computer system by breaching the safety measures is committing criminal offence and if found guilty faces either imprisonment up to 5 years or pecuniary penalty up to €34.172,03 or both  Whoever, with intention and without any right, destroys, deletes, amends or conceals data from computer is committing criminal offence and if found guilty faces either imprisonment up to 5 years or pecuniary penalty up to €34.172,03 or both.  Whoever is involved with children’s pornography material used in a computer system is committing criminal offence and if found guilty faces either imprisonment up to 5 years or pecuniary penalty up to €42.715,04 or both. 6
  • 7. Specialized Department The Forensic Laboratory for electronic data:  has been created and operates since April 2009  is part of the Cypriot Police  undertakes criminal case related to cyber crime  examines electronic marks (such as computers, electronic address of computers, internet platforms, websites, e-mail address, satellite receptions etc.)  its personnel has the necessary experience to investigate criminal cases which are related to internet offences or offences in connection with computers. 7
  • 8. Prevention of cyber bullying prevention  Preventing steps against cyber bullying involving children is responsibility of parents, school management and its staff and relevant authorities specializing in effectively informing the children and dealing with this matter.  Indicatively I should mention that: Parents should be alerted and learn how to react in front of this situation. They must also immediately report such a case to the school and cooperate with the management and the staff. Also report the incident to the police. School management must issue regulations which should serve both to students and their parents. School staff must cooperate with management in cultivating an environment which does not facilitate cyber bullying. School management and staff must closely cooperate with parents. School management and staff must attend seminars organized by specialists on bullying so as to be able to administer with efficiency if such a case appears. School management and staff must cooperate with relevant authorities specializing in dealing with this matter. 8
  • 9. How the Court faces a cyber bullying case  If a cyber bullying situation falls within any of the above stated criminal offence, then provided there is adequate evidence the case is presented by the police before the court.  If upon hearing the accused is found guilty or if the accused pleads guilty in any of the criminal offence is facing, the court will impose him a sentence.  The imposition of sentence serves two purposes: (1) To punish the accused with the proper and fair, under the circumstances and based on the presented facts of the case, sentence. (2) To pass a message on the society that such behaviour is unacceptable. 9
  • 10. How the Court faces a cyber bullying case (continued)  The sentence usually operates as deterrent factor on others who intend to commit the same offence on other victims. In this way society is protected.  In case the accused found guilty is older than 14 years old but younger than 18 years old, the obligation to attend seminars on cyber bullying provided by experts on this matter and/or undertake to execute community services as probable proper sentence will not be excluded. I would rather say it seems to be more probable than any other type of sentence. In this way the young person gets punishment and at the same time it helps him/her to understand his/her mistake and therefore gets a lesson for not repeating such behaviour. 10
  • 11. THANK YOU VERY MUCH FOR YOUR PATIENCE!!! I AM NOW AT YOUR DISPOSAL FOR ANY QUESTIONS OR CLARIFICATIONS YOY MAY HAVE. 11