SlideShare a Scribd company logo
1 of 16
“Being Safe Online”
Efforts of Government of India
For making child and young population
safe and secure
Presented By:
Manish Kumar
Gupta
Vice Chair of
CWG-COP, ITU
Director,
Ministry of
Communications
Government of
India
Mobile and online services have become affordable and accessible.
Exceptional uptake in urban areas and exemplary expansion in rural areas.
We are using online services for communication, banking, filing of taxes, sale and
purchase and other financial transactions.
These functions are expected to grow manifold in near future.
Children and young people are and will be major consumers of digital
technologies.
Promoting ability to deal with the risks and cope with the ill-effects with minimal
damage, is likely to be a more effective and lasting strategy.
Indian as well as Global Scenario..
Largest
child
population
in the
world
472
million
children
below 18
225
million
girls
39% of
total
population
India census 2011
Children in India
Statutory Provisions, Guidelines and related Acts/Codes
Indian Penal Code (IPC) 1860
Information Technology (IT) Act 2000 and amendment act (ITAA) 2008
Protection of Children from Sexual Offences (POCSO) Act 2012
Copyright Act 1957
Instructions of Ministry of Communications and Ministry of Electronics and
Information Technology.
Guidelines of National Commission for the Protection of Child Rights (NCPCR).
Provisions Under IPC 1860
Voyeurism and violation of privacy is a crime under Section 354C.
Stalking is a crime under Section 354D.
Sending obscene material is a crime of sexual harassment under Section 354A.
An act intends to insult the ‘modesty’ of a woman is a crime under Section 509
Provisions under IT act 2000 and amendment act 2008.
Section 66E: Capturing, publishing or transmitting the image of a private area of any
person is an punishable offence.
Section 67 & 67A: Sending obscene material is an punishable offence.
Section 67B :Transmitting material depicting children, including nude or sexually
explicit pictures of self (Child Sexual Abuse Material-CSAM).
Section 66C: Hacking of account or creating a fake account (identity theft) in
someone else’s name is an offence.
Section 66D :Impersonation; assumes the identity of someone else with the
intention of fooling or deceiving the person is an offence
Section 66B:Stolen Computer; receiving or retaining any stolen computer resource
or communication device is an punishable offence.
Provisions under Protection of Children from Sexual Offences (POCSO) Act 2012
Section 11 & 12:
Sexual harassment any
part of the body of the
child or the
involvement of the
child in a sexual act is
an offence.
Section 13 & 14:
Use of child for
pornographic or sexual
gratification purposes is
an heinous crime. (from
10 years to life
imprisonment)
Provisions Under Copyright Act 1957
In India the offense is not
only in viewing prohibited
content, but also in making
a prejudicial distribution, a
public exhibition or letting
for sale or hire without
appropriate permission
copyright-protected
material.
The messages by the ISPs,
displayed when users try to
open blocked websites,
said, “Viewing,
downloading, exhibiting or
duplicating an illicit copy of
the contents is punishable
as an offence under the
Copyright Act, 1957.”
Instructions of Department of
Telecommunications, Ministry of Communications
On the basis of the
guidelines of ITU and
UNICEF for industry on
child online protection,
DOT issued instructions
to all ISPs.
Installation of end user
Child safety filters
(Parental control
Filters) these filtering
programmes may be
essentially free as part
of the OS of electronic
devices or part of
package available from
ISPs or TSPs.
An Inter-Ministerial
Committee (IMC)
recommended solutions to
Curb Online Child Sexual
Abuse Material (CSAM).
ISPs having cable landing
station Gateway/ ILD
licences in India should
disable/remove the online
CSAM dynamically based
on Internet Watch
Foundation (IWF) list under
section 79 (2) (c) of IT Act
2000.
Instructions of Ministry of Electronics and Information Technology.
National Commission for the Protection of Child Rights (NCPCR),Government of India.
In India Child Online Safety is a matter of great
concern, accordingly National Commission for the
Protection of Child Rights (NCPCR) issued broad
guidelines for raising awareness among all stake
holders informing children, parents, educators and
general public regarding online safety of children.
Misuse of digital footprint
and future complications.
Threats of online Grooming,
Desensitization and Identity
theft etc.
Bribing, Flattery, Phishing,
Pharming and Cyberbullying
Legal implications of certain
online action and content.
Major risks being
active online
Responsible use and self
regulation
Activation of parental
controls
Strong security Software
Unique passwords and
two factor
authentication
Advices for
minimal risks
Do not give out personal
information
Do not share inappropriate
pictures with anyone
Do not open emails or
attachments from people you do
not know.
Do not become online ‘friends’
with people you don’t know.
Golden rules to
follow when online
Child helpline 1098 and
Aarambhindia Hotline
(supported by IWF)
CyberMom Mechanism
POCSO(Protection of
Children from Sexual
Offences ) E-box
Reporting to Authorities
(Parents, School and
Police)
Advice on Reporting
Mechanism and
Remedies
Thanks
manishk.gupta81@gov.in
GSM +919013130395

More Related Content

Similar to S19-CLCWGCOP15-INF-0002!!PPT-E.pptx

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
Hemant
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
Rahuljain40418
 
5. Implementing evidence-based policy internationally: practice, politics, et...
5. Implementing evidence-based policy internationally: practice, politics, et...5. Implementing evidence-based policy internationally: practice, politics, et...
5. Implementing evidence-based policy internationally: practice, politics, et...
UNICEF Office of Research - Innocenti
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
segughana
 

Similar to S19-CLCWGCOP15-INF-0002!!PPT-E.pptx (20)

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTTCYBER PRESENTATION FOR ANY WORK NEEDEDTT
CYBER PRESENTATION FOR ANY WORK NEEDEDTT
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Business law
Business lawBusiness law
Business law
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Awareness about cybercrime among youth
Awareness about cybercrime among youthAwareness about cybercrime among youth
Awareness about cybercrime among youth
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
5. Implementing evidence-based policy internationally: practice, politics, et...
5. Implementing evidence-based policy internationally: practice, politics, et...5. Implementing evidence-based policy internationally: practice, politics, et...
5. Implementing evidence-based policy internationally: practice, politics, et...
 
A Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks TodayA Study On Types Of Cyber Crimes And Cyber Attacks Today
A Study On Types Of Cyber Crimes And Cyber Attacks Today
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John CarrCTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

S19-CLCWGCOP15-INF-0002!!PPT-E.pptx

  • 1. “Being Safe Online” Efforts of Government of India For making child and young population safe and secure Presented By: Manish Kumar Gupta Vice Chair of CWG-COP, ITU Director, Ministry of Communications Government of India
  • 2. Mobile and online services have become affordable and accessible. Exceptional uptake in urban areas and exemplary expansion in rural areas. We are using online services for communication, banking, filing of taxes, sale and purchase and other financial transactions. These functions are expected to grow manifold in near future. Children and young people are and will be major consumers of digital technologies. Promoting ability to deal with the risks and cope with the ill-effects with minimal damage, is likely to be a more effective and lasting strategy. Indian as well as Global Scenario..
  • 4. Statutory Provisions, Guidelines and related Acts/Codes Indian Penal Code (IPC) 1860 Information Technology (IT) Act 2000 and amendment act (ITAA) 2008 Protection of Children from Sexual Offences (POCSO) Act 2012 Copyright Act 1957 Instructions of Ministry of Communications and Ministry of Electronics and Information Technology. Guidelines of National Commission for the Protection of Child Rights (NCPCR).
  • 5. Provisions Under IPC 1860 Voyeurism and violation of privacy is a crime under Section 354C. Stalking is a crime under Section 354D. Sending obscene material is a crime of sexual harassment under Section 354A. An act intends to insult the ‘modesty’ of a woman is a crime under Section 509
  • 6. Provisions under IT act 2000 and amendment act 2008. Section 66E: Capturing, publishing or transmitting the image of a private area of any person is an punishable offence. Section 67 & 67A: Sending obscene material is an punishable offence. Section 67B :Transmitting material depicting children, including nude or sexually explicit pictures of self (Child Sexual Abuse Material-CSAM). Section 66C: Hacking of account or creating a fake account (identity theft) in someone else’s name is an offence. Section 66D :Impersonation; assumes the identity of someone else with the intention of fooling or deceiving the person is an offence Section 66B:Stolen Computer; receiving or retaining any stolen computer resource or communication device is an punishable offence.
  • 7. Provisions under Protection of Children from Sexual Offences (POCSO) Act 2012 Section 11 & 12: Sexual harassment any part of the body of the child or the involvement of the child in a sexual act is an offence. Section 13 & 14: Use of child for pornographic or sexual gratification purposes is an heinous crime. (from 10 years to life imprisonment)
  • 8. Provisions Under Copyright Act 1957 In India the offense is not only in viewing prohibited content, but also in making a prejudicial distribution, a public exhibition or letting for sale or hire without appropriate permission copyright-protected material. The messages by the ISPs, displayed when users try to open blocked websites, said, “Viewing, downloading, exhibiting or duplicating an illicit copy of the contents is punishable as an offence under the Copyright Act, 1957.”
  • 9. Instructions of Department of Telecommunications, Ministry of Communications On the basis of the guidelines of ITU and UNICEF for industry on child online protection, DOT issued instructions to all ISPs. Installation of end user Child safety filters (Parental control Filters) these filtering programmes may be essentially free as part of the OS of electronic devices or part of package available from ISPs or TSPs.
  • 10. An Inter-Ministerial Committee (IMC) recommended solutions to Curb Online Child Sexual Abuse Material (CSAM). ISPs having cable landing station Gateway/ ILD licences in India should disable/remove the online CSAM dynamically based on Internet Watch Foundation (IWF) list under section 79 (2) (c) of IT Act 2000. Instructions of Ministry of Electronics and Information Technology.
  • 11. National Commission for the Protection of Child Rights (NCPCR),Government of India. In India Child Online Safety is a matter of great concern, accordingly National Commission for the Protection of Child Rights (NCPCR) issued broad guidelines for raising awareness among all stake holders informing children, parents, educators and general public regarding online safety of children.
  • 12. Misuse of digital footprint and future complications. Threats of online Grooming, Desensitization and Identity theft etc. Bribing, Flattery, Phishing, Pharming and Cyberbullying Legal implications of certain online action and content. Major risks being active online
  • 13. Responsible use and self regulation Activation of parental controls Strong security Software Unique passwords and two factor authentication Advices for minimal risks
  • 14. Do not give out personal information Do not share inappropriate pictures with anyone Do not open emails or attachments from people you do not know. Do not become online ‘friends’ with people you don’t know. Golden rules to follow when online
  • 15. Child helpline 1098 and Aarambhindia Hotline (supported by IWF) CyberMom Mechanism POCSO(Protection of Children from Sexual Offences ) E-box Reporting to Authorities (Parents, School and Police) Advice on Reporting Mechanism and Remedies