SlideShare a Scribd company logo
1 of 19
For Women Empowerment
Netiquettes
Cyber Ethics for e commerce
 Use proper signature
 Respectful comments
 Obey laws
 Appropriate language
 Don’t reveal sensitive information
 Be tolerant and careful
 Shop securily
 Update antivirus
 Purchase from Secured E Commerce
merchants
 Read refund Policy
 Make sure call is genuine
 Ambiguity
 Hacking
 Legal loophole
 Charity fraud
 Unfriendly return policy
 Selling counterfeit products
 Phishing
 Employment scam
 Shoulder surfing
 Dumpster diving
 Pretexting
 Don’t share sensitive financialinformation
like
 Credit card numbers, personal verification
details, OTP etc
 Passwords comprising ofcharacters and
numbersrather than proper wordsare more
secure. Forexample, instead of,
usingwelcome use W3LcOmE.
 : An example of a strong password is
“Cartoon-Duck-14-Coffee-Glvs”. It is long,
contains uppercase letters, lowercase
letters, numbers, and special characters. It is
a unique password created by a random
password generator and it is easy to
remember. Strong passwords should not
contain personal information.
 Remember you should have a completely
unique password for each website and
service
 Don’t use your Facebook password for other
social media accounts like Twitter, Instagram,
LinkedIn, etc. This advice is especially
crucial around sensitive accounts like your
Gmail (or any email account), financial, or
medical sites.Your digital world can come
crashing down when you reuse account
passwords
 Turning on two-factor authentication (2FA) is
crucial on all your accounts especially the really
sensitive ones.This second layer of security may
be called:Two-Step Authentication (2SA)Two-
Factor Authentication (2FA)Multifactor
Authentication (MFA)
 Lie on your security questionsWhen websites
add layers of security, they often make you
create or select security questions and provide
answers. Since you’re now using a password
manager with a strong master password, you can
lie on these answers.This decreases the
possibility that an attacker might find your real-
world security answers from social media or
other publically available sources
 With so many of us using social media today,
sites like Facebook, Twitter, and LinkedIn
make perfect targets for scams.Here are our
top 10 tips to stay safe on social media:
 Use a strong password. The longer it is, the
more secure it will be.
 Use a different password for each of your
social media accounts.
 Set up your security answers. This option is
available for most social media
Cyber law and
Women
 Section 354A:- Sexual harassment and punishment for
sexual harassment1A man committing any of the
following acts—physical contact and advances
involving unwelcome and explicit sexual overtures;
ora demand or request for sexual favours; orshowing
pornography against the will of a woman; ormaking
sexually coloured remarks, shall be guilty of the
offence of sexual harassment.Any man who commits
the offence specified in clause (i) or clause (ii) or
clause (iii) of sub-section (1) shall be punished with
rigorous imprisonment for a term which may extend
to three years, or with fine, or with both.Any man
who commits the offence specified in clause (iv) of
sub-section (1) shall be punished with imprisonment
of either description for a term which may extend to
one year, or with fine, or with both.1 Criminal Law
(Amendment) Act, 2013
 ) Any man who—follows a woman and contacts, or attempts to
contact such woman to foster personal interaction repeatedly
despite a clear indication of disinterest by such woman; or
monitors the use by a woman of the internet, email or any other
form of electronic communication, commits the offence of
stalking; Provided that such conduct shall not amount to stalking
if the man who pursued it proves that—it was pursued for the
purpose of preventing or detecting crime and the man accused of
stalking had been entrusted with the responsibility of prevention
and detection of crime by the State; orit was pursued under any
law or to comply with any condition or requirement imposed by
any person under any law; or in the particular circumstances such
conduct was reasonable and justified.(2) Whoever commits the
offence of stalking shall be punished on first conviction with
imprisonment of either description for a term which may extend
to three years, and shall also be liable to fine; and be punished
on a second or subsequent conviction, with imprisonment of
either description for a term which may extend to five years, and
shall also be liable to fine.
 Section 354C:- Voyeurism Any man who watches, or
captures the image of a woman engaging in a private act in
circumstances where she would usually have the
expectation of not being observed either by the
perpetrator or by any other person at the behest of the
perpetrator or disseminates such image shall be punished
on first conviction with imprisonment of either description
for a term which shall not be less than one year, but which
may extend to three years, and shall also be liable to fine,
and be punished on a second or subsequent conviction,
with imprisonment of either description for a term which
shall not be less than three years, but which may extend
to seven years, and shall also be liable to fine.
Explanations For the purpose of this section, “private act”
includes an act of watching carried out in a place which, in
the circumstances, would reasonably be expected to
provide privacy and where the victim’s genitals, posterior
or breasts are exposed or covered only in underwear; or
the victim is using a lavatory; or the victim is doing a
sexual act that is not of a kind ordinarily done in public.
Where the victim consents to the capture of the images or
 ) Any man who—follows a woman and contacts, or attempts to
contact such woman to foster personal interaction repeatedly
despite a clear indication of disinterest by such woman;
ormonitors the use by a woman of the internet, email or any
other form of electronic communication,commits the offence of
stalking;Provided that such conduct shall not amount to stalking
if the man who pursued it proves that—it was pursued for the
purpose of preventing or detecting crime and the man accused of
stalking had been entrusted with the responsibility of prevention
and detection of crime by the State; orit was pursued under any
law or to comply with any condition or requirement imposed by
any person under any law; orin the particular circumstances such
conduct was reasonable and justified.(2) Whoever commits the
offence of stalking shall be punished on first conviction with
imprisonment of either description for a term which may extend
to three years, and shall also be liable to fine; and be punished
on a second or subsequent conviction, with imprisonment of
either description for a term which may extend to five years, and
shall also be liable to fine.
Beware …. Be
Safe….
Thank you

More Related Content

Similar to Cyber ethics pp power point presentation

Penal code presentation. abduction, assault, criminal force, extortion, force...
Penal code presentation. abduction, assault, criminal force, extortion, force...Penal code presentation. abduction, assault, criminal force, extortion, force...
Penal code presentation. abduction, assault, criminal force, extortion, force...Mamunur Rashid
 
Child Online Protection
Child Online ProtectionChild Online Protection
Child Online ProtectionSalieCatungal
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraJason Nathu
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
OFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTYOFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTYYogeshDesai32
 
(02) prosec. del rosario
(02) prosec. del rosario(02) prosec. del rosario
(02) prosec. del rosarioMcypp Ncmf
 
Financial Crimes - basic law.pptx
Financial Crimes - basic law.pptxFinancial Crimes - basic law.pptx
Financial Crimes - basic law.pptxjossycherianpuncha
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Pocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopalPocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopalSeena Rajagopal
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
 

Similar to Cyber ethics pp power point presentation (20)

Penal code presentation. abduction, assault, criminal force, extortion, force...
Penal code presentation. abduction, assault, criminal force, extortion, force...Penal code presentation. abduction, assault, criminal force, extortion, force...
Penal code presentation. abduction, assault, criminal force, extortion, force...
 
12620.ppt
12620.ppt12620.ppt
12620.ppt
 
Child Online Protection
Child Online ProtectionChild Online Protection
Child Online Protection
 
Privacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing EraPrivacy and the Law in the Oversharing Era
Privacy and the Law in the Oversharing Era
 
Sexual offences
Sexual offencesSexual offences
Sexual offences
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
OFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTYOFFENCES AGAINST PROPERTY
OFFENCES AGAINST PROPERTY
 
POCSO BAP.ppt
POCSO BAP.pptPOCSO BAP.ppt
POCSO BAP.ppt
 
(02) prosec. del rosario
(02) prosec. del rosario(02) prosec. del rosario
(02) prosec. del rosario
 
Financial Crimes - basic law.pptx
Financial Crimes - basic law.pptxFinancial Crimes - basic law.pptx
Financial Crimes - basic law.pptx
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
R.A. 7610
R.A. 7610R.A. 7610
R.A. 7610
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Pocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopalPocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopal
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Anti-terrorism law
Anti-terrorism lawAnti-terrorism law
Anti-terrorism law
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Cyber ethics pp power point presentation

  • 2.
  • 4.  Use proper signature  Respectful comments  Obey laws  Appropriate language  Don’t reveal sensitive information  Be tolerant and careful
  • 5.  Shop securily  Update antivirus  Purchase from Secured E Commerce merchants  Read refund Policy  Make sure call is genuine
  • 6.  Ambiguity  Hacking  Legal loophole  Charity fraud  Unfriendly return policy  Selling counterfeit products
  • 7.  Phishing  Employment scam  Shoulder surfing  Dumpster diving  Pretexting
  • 8.  Don’t share sensitive financialinformation like  Credit card numbers, personal verification details, OTP etc
  • 9.  Passwords comprising ofcharacters and numbersrather than proper wordsare more secure. Forexample, instead of, usingwelcome use W3LcOmE.
  • 10.  : An example of a strong password is “Cartoon-Duck-14-Coffee-Glvs”. It is long, contains uppercase letters, lowercase letters, numbers, and special characters. It is a unique password created by a random password generator and it is easy to remember. Strong passwords should not contain personal information.
  • 11.  Remember you should have a completely unique password for each website and service  Don’t use your Facebook password for other social media accounts like Twitter, Instagram, LinkedIn, etc. This advice is especially crucial around sensitive accounts like your Gmail (or any email account), financial, or medical sites.Your digital world can come crashing down when you reuse account passwords
  • 12.  Turning on two-factor authentication (2FA) is crucial on all your accounts especially the really sensitive ones.This second layer of security may be called:Two-Step Authentication (2SA)Two- Factor Authentication (2FA)Multifactor Authentication (MFA)  Lie on your security questionsWhen websites add layers of security, they often make you create or select security questions and provide answers. Since you’re now using a password manager with a strong master password, you can lie on these answers.This decreases the possibility that an attacker might find your real- world security answers from social media or other publically available sources
  • 13.  With so many of us using social media today, sites like Facebook, Twitter, and LinkedIn make perfect targets for scams.Here are our top 10 tips to stay safe on social media:  Use a strong password. The longer it is, the more secure it will be.  Use a different password for each of your social media accounts.  Set up your security answers. This option is available for most social media
  • 15.  Section 354A:- Sexual harassment and punishment for sexual harassment1A man committing any of the following acts—physical contact and advances involving unwelcome and explicit sexual overtures; ora demand or request for sexual favours; orshowing pornography against the will of a woman; ormaking sexually coloured remarks, shall be guilty of the offence of sexual harassment.Any man who commits the offence specified in clause (i) or clause (ii) or clause (iii) of sub-section (1) shall be punished with rigorous imprisonment for a term which may extend to three years, or with fine, or with both.Any man who commits the offence specified in clause (iv) of sub-section (1) shall be punished with imprisonment of either description for a term which may extend to one year, or with fine, or with both.1 Criminal Law (Amendment) Act, 2013
  • 16.  ) Any man who—follows a woman and contacts, or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman; or monitors the use by a woman of the internet, email or any other form of electronic communication, commits the offence of stalking; Provided that such conduct shall not amount to stalking if the man who pursued it proves that—it was pursued for the purpose of preventing or detecting crime and the man accused of stalking had been entrusted with the responsibility of prevention and detection of crime by the State; orit was pursued under any law or to comply with any condition or requirement imposed by any person under any law; or in the particular circumstances such conduct was reasonable and justified.(2) Whoever commits the offence of stalking shall be punished on first conviction with imprisonment of either description for a term which may extend to three years, and shall also be liable to fine; and be punished on a second or subsequent conviction, with imprisonment of either description for a term which may extend to five years, and shall also be liable to fine.
  • 17.  Section 354C:- Voyeurism Any man who watches, or captures the image of a woman engaging in a private act in circumstances where she would usually have the expectation of not being observed either by the perpetrator or by any other person at the behest of the perpetrator or disseminates such image shall be punished on first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine, and be punished on a second or subsequent conviction, with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine. Explanations For the purpose of this section, “private act” includes an act of watching carried out in a place which, in the circumstances, would reasonably be expected to provide privacy and where the victim’s genitals, posterior or breasts are exposed or covered only in underwear; or the victim is using a lavatory; or the victim is doing a sexual act that is not of a kind ordinarily done in public. Where the victim consents to the capture of the images or
  • 18.  ) Any man who—follows a woman and contacts, or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman; ormonitors the use by a woman of the internet, email or any other form of electronic communication,commits the offence of stalking;Provided that such conduct shall not amount to stalking if the man who pursued it proves that—it was pursued for the purpose of preventing or detecting crime and the man accused of stalking had been entrusted with the responsibility of prevention and detection of crime by the State; orit was pursued under any law or to comply with any condition or requirement imposed by any person under any law; orin the particular circumstances such conduct was reasonable and justified.(2) Whoever commits the offence of stalking shall be punished on first conviction with imprisonment of either description for a term which may extend to three years, and shall also be liable to fine; and be punished on a second or subsequent conviction, with imprisonment of either description for a term which may extend to five years, and shall also be liable to fine.