SlideShare a Scribd company logo
KERALA STATE COMMISSION FOR PROTECTION OF CHILD RIGHTS
Expert Consultation on Legislative and Executive Action to Improve
Security of Children in Cyber Space.
Karnika Seth
Cyberlaw Expert & Partner,
Seth Associates
© SethAssociates, 2014All Rights Reserved
Protecting Children
in cyberspace
•93% of teens (12-17) go online
•75% of teens (12-17) have cell phones
•1 in 3 teens (12-17) have experienced online
harassment.
•73% of teens (12-17) have profiles on social
networking sites.[
•97% of teens (12-17) play computer, web,
portable, or console games
•4% of cell-owning teens (12-17) say that they
have sent sexually suggestive nude/semi-nude
messages to others via text message.
•93% of teens (12-17) go online
•75% of teens (12-17) have cell phones
•1 in 3 teens (12-17) have experienced online
harassment.
•73% of teens (12-17) have profiles on social
networking sites.[
•97% of teens (12-17) play computer, web,
portable, or console games
•4% of cell-owning teens (12-17) say that they
have sent sexually suggestive nude/semi-nude
messages to others via text message.
Source: Lenhart A. Social
Media and Young Adults.
Pew Internet and
American Life Project,
2010.
Children using Internet-2013
Protecting children in cyberspace
Protecting children in cyberspace
Types of Cyber crimes
 Credit card frauds
 Cyber pornography
 Sale of illegal articles-narcotics, weapons, wildlife
 Online gambling
 Intellectual Property crimes- software piracy, copyright
infringement, trademarks violations, theft of computer
source code
 Email spoofing
 Forgery
 Defamation
 Cyber stalking (section 509 IPC)
 Phising
 Cyber terrorism Crime against persons
Crime against Government
Crime against property
Internet & Child Exploitation
 Internet addiction
• Cyber bullying
• Cyber stalking
• Child pornography
• Child abuse
• Identity theft cases
• Cheating & fraud
• Lured into criminal activities
• Theft of personal information
 Blackmail and harassment frauds
 Child Extortion
General concerns for children online
May inadvertently or intentionally access adult pornographic or
violent material
Links or emails with innocent subjects that actually contain
pornography
Links contain malware –keyloggers that steal personal information
Children being approached or observed in chat rooms
Children’s identities, location or vulnerability being sourced from
material available online
Social networking sites may introduce child pornography, cyber
harassment or stalking .
Internet is becoming an addiction if unsupervised
Exploitation of children on Internet –Gaps &
challenges
•TECHNICAL-Anonymity exists on
internet-criminals prefer this medium
•Nature of internet such , automatic ads
or popups
•Virus floats quickly
•Easy access-no geographic limitations-
quantity huge
•SOCIOLOGICAL_Difference in
cultures across globe-all types of content
available
•Gaps in definition of adulthood across
countries
•Increased generation gap
•Internet addiction
•Commercial trading ,
Peer-to-peer networks
LEGAL-Lack of awareness of do’s and
don’ts on internet
•Low conviction rate
Strategies to meet Challenges
• TECHNICAL-Blocking automatic popups which are inappropriate
• Using strong antivirus
• Frequent change of passwords
• Use of protection settings and software such as Netnanny,etc
• Role of govt bodies/ ISPs /NGOs in reporting child abuse /child
pornography
• Blocking of illegal websites by CERT
• SOCIAL-
• Encourage reporting of child abuse cases
• Allow internet use for limited hours and under supervision
• Act as friend to your child
• Checking webhistory files
• school workshops,role of school counsellor
Strategies to meet Challenges
• Involve NGOs on reporting child abuse
• Set up Rehabilitation centres for victims
LEGAL- create cyberawareness of rights and duties in
cyberspace
Setting up helpline for reporting abuse
Punish the offenders of law
Storage of logs-no time period prescribed by central govt
Sign a cybercrime convention for effective extradition of
criminals abroad
Police & Media to adopt a child centric approach
International instruments on child
protection
 Convention on the Rights of the Child (1989)
●● Optional Protocol to the Convention on the Rights of the Child on the sale of
children, child prostitution and child pornography (OPSC, 2000)
●● Protocol to Prevent, Suppress and Punish Trafficking against Persons,
Especially Women and Children, supplementing the United Nations
Convention against Transnational Organized Crime (‘Palermo Protocol’, 2000)
●● Council of Europe Convention on Cybercrime (2001)
●● Council of Europe Convention on the Protection of Children against Sexual
Exploitation and Sexual Abuse (2007)
In India, IT Act,2000 deals with safety of children in the online
environment.
Cybercrimes under Information Technology Act,2000
Hacking –
Section 66
Sending of
offensive false
messages(s.66
A)
Identity theft
(s. 66C)
Cheating by
personation
(s.66D)
Violation of
privacy (s.66E)
Cyber terrorism
(s.66F)
Publishing
sexually explicit
content(s. 67A)
Child
pornography
(s.67B)
Stolen computer
resource(s.66B)
Attempt to
commit an
offence (s.84C)
Abetment to
commit an
offence(s.84B)
Publishing
obscene material
(Section 67)
Types of child pornography offences
( section 67B)
 View
 View + collect child pornography
 View, collect + distribute+publish+transmit+causes to be published or
transmits child pornography
 View, collect and distribute child pornography +
download+exchange+advertises+promotes commit contact offences
 View, collect and distribute child pornography, commit contact offences +
produce child pornography
 Facilitate abusing children online
 Records own abuse or of others pertaining to sexually explicit act with
children-
 Punishable with imprisonment of 5 years and fine upto 10 lacs
 Blocking of illegal websites –Section 69A IT Act,2000
Cyber café Rules,2011
Maintenance of log register
Photo identity card requested
Minor without photo identity card to be accompanied by an
adult
History of websites accessed by a user kep by café for one
year
Computers in café equipped with commercially available
filtering software to avoid acess to child pornography or
obscene content
Board declaring computers not to be used for illegal activity
to be displayed
Regular inspections of cybercafes
Case studies
DPS MMS case (Bazee.com)
Adnan murder case-orkut case
Noida MMS scandal
Air force Bal Bharati School case
According to latest NCRB statistics in 2012 there were 589 cases
registered under IT Act & IPC dealing with transmitting obscene
information and 497 persons were arrested in India
http://ncrb.nic.in/
The Noida MMS Scandal
 In February 2009, an MBA student in
Noida a boy circulated video clip of his 23
-year-old-girlfriend doing striptease for
him to his classmates using the girl's e-mail
id.
 After the girl refused to marry him, the
boy who had access to the girl's mail id and
circulated that MMS clip to fellow
students.
 Police registered a case of criminal
intimidation following a complaint filed by
the girl's family
Air force Bal Bharati School
Air force Bal Bharati School case , Delhi; class(XII)
student created pornographic site as revenge against his
classmates (girls) and posted pornographic images of his
classmates and lady teachers on internet. He was then
suspended by school and arrested by Police under IPC
and IT Act; though Juvenile Court allowed his bail
thereafter.
Possible reliefs to a cybercrime
victim- strategy adoption
 A victim of cybercrime needs to immediately report the matter to his local
police station and to the nearest cybercrime cell
 Depending on the nature of crime there may be civil and criminal remedies.
 In civil remedies , injunction and restraint orders , blocking of websites, may
be sought, together with damages, delivery up of infringing matter and/or
account for profits.36 hr deadline for blocking or approach court.
 Call police helpline
 In criminal remedies, a cybercrime case will be registered by police if the
offence is cognisable and if the same is non cognisable, a complaint should be
filed with metropolitan magistrate
 For certain offences, both civil and criminal remedies may be available to the
victim
Before lodging a cybercrime case
Important parameters-
Gather ample evidence admissible in a court of law
Fulfill the criteria of the pecuniary ,territorial and subject matter
jurisdiction of a court.
Determine jurisdiction – case may be filed where the offence is
committed or where effect of the offence is felt ( S. 177 to 179,
Crpc)
Preparation for prosecution
 Collect all evidence available & saving snapshots of evidence
 Seek a cyberlaw expert’s immediate assistance for advice on preparing for
prosecution
 Prepare a background history of facts chronologically as per facts
 Pen down names and addresses of suspected accused.
 Form a draft of complaint and remedies a victim seeks
 Cyberlaw expert & police could assist in gathering further evidence e.g tracing
the IP in case of e-mails, search & seizure or arrest as appropriate to the
situation
 A cyber forensic study of the hardware/equipment/ network server related to
the cybercrime is generally essential
Precautions for online safety -Secure online
connections
Install and keep up-to-date anti-virus, anti-spyware, and
firewall
Microsoft Malicious Software Removal Tool http://www.microsoft.com/downloads/details.aspx?
FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
CCleaner (Free) http://www.ccleaner.com/download/
Anti-Spyware – A-Squared (free) http://download5.emsisoft.com/a2FreeSetup.exe
AVG Free http://free.grisoft.com/
Use Commercial Web Filtering Software
Free - http://www.k9webprotection.com/
Net Nanny (2007 best) http://www.netnanny.com/
Check internet cache
@winspy (free) http://www.acesoft.net/winspy
Spector Pro to track everything done on a PC
http://www.spectorsoft.com/products/SpectorPro_Windows
Useful softwares
Monitoring Software
Spectorsoft.com or 1-888-598-2788
Safety-net.info or 1-800-513-1916
Software4Parents.com or 1-866-345-8371
PCmagazine.com (search “parental monitoring”)
Enabling protection through filters-
IE browser protection
Enabling protection through filters-
IE browser protection
4. Select filter settings for the categoriSelect filter settings for
the categories shown: Language, Nudity, Sex, Violence. The
further right you push the slider, the more content is
allowed.
5. Click on the Approved Sites tab. Here you can type in any
specific websites that you might want to be treated
specially. You can come back and change this list later,
perhaps after feedback from your family.
'Approved Sites' list
6. Navigate to the General tab, and click on Create Password.
This will set you up as Administrator, and prevent other
users from altering the Content Advisor settings.
Change the Rating Settings to block types of content
 es shown: Language, Nudity, Sex, Violence. The further right
you push the slider, the more content is allowed.
Change the Rating Settings to block types of content
Enabling protection through filters-
IE browser protection
The ten commandments of child protection
in cyberspace-
1. Rules from “real” life apply: courtesy, kindness, modesty,
dignity, respect for the law and for others, etc.
2. Don’t talk to strangers
3. Keep your private information private
4. Never agree to meet an online friend without your parents
5. There are no guarantees that what you say or post on the
Internet is private
The ten commandments of child protection
in cyberspace-
6. Information (including photos, videos, etc.) posted on the
Internet can last forever
7. Tell your parents if you encounter something uncomfortable
8. Don’t reply to unknown screen names on IM
9. Never open e-mail from strangers or click on any attachments
10. Find the “good” online – good friends, good Web sites, good
games – and enjoy
Do’s and dont’s- bestpractices on
social media
Express yourself but not use abusive language
Donot invade privacy of others
Verify friend/follower requests
Check downloads etc for viruses
Donot disclose other person or your own sensitive personal
information
Communicate with strangers cautiously
Use strong passwords and privacy protect features
Read terms of use and how your information is used by
service provider before you use a service
Thank you!
SETH ASSOCIATES
ADVOCATES AND LEGAL CONSULTANTS
New Delhi Law Office:
C-1/16, Daryaganj, New Delhi-110002, India
Tel:+91 (11) 65352272, +91 9868119137
Corporate Law Office:
B-10, Sector 40, NOIDA-201301, N.C.R ,India
Tel: +91 (120) 4352846, +91 9810155766
Fax: +91 (120) 4331304
E-mail: mail@sethassociates.com

More Related Content

PPTX
Cyber crime
PPTX
Cyber Crime
PPTX
Cyber Crime
PDF
Cybercrimes (Against Children)
PPTX
PPTX
Computer Crime
PPTX
cyber stalking
PPTX
Cyber security for children
Cyber crime
Cyber Crime
Cyber Crime
Cybercrimes (Against Children)
Computer Crime
cyber stalking
Cyber security for children

What's hot (20)

PPTX
Internet Fraud
PPTX
Cyber crime against children
PPTX
Cyber crime ppt
PPTX
Cyber Crime and Security
PDF
Cyber crime
PPTX
Children as target of cyber crimes
PPTX
Cyber crime
PPTX
Cyber crime
PPT
Cyber Crime and Security
PDF
Cyber security awareness for students
PPSX
Cyber crime and cyber security
PPTX
Cyber Crime
PPTX
CYBER CRIME( DU PRESENTATION FOR FYUP)
PPTX
Cyber crime
PPTX
Social Media Cyber Security Awareness Briefing
PPT
presentation on cyber crime and security
PPT
Social media & cyber crime
PPTX
Cyber crime
PPT
Cybercrime presentation
PPT
Internet Fraud
Cyber crime against children
Cyber crime ppt
Cyber Crime and Security
Cyber crime
Children as target of cyber crimes
Cyber crime
Cyber crime
Cyber Crime and Security
Cyber security awareness for students
Cyber crime and cyber security
Cyber Crime
CYBER CRIME( DU PRESENTATION FOR FYUP)
Cyber crime
Social Media Cyber Security Awareness Briefing
presentation on cyber crime and security
Social media & cyber crime
Cyber crime
Cybercrime presentation
Ad

Viewers also liked (20)

PPT
Internet Safety
PPTX
E safety live
PPTX
Digital parenting seminars
PDF
Safer internet day mo i cpc 2 feb 2014sb
PPTX
Presentation slides
PDF
Filtering for in and of on education
PDF
Sacred Breath Manual
PPTX
Case of baazee
PPT
Know it All - Parents eSafety Presentation
PPTX
Power point cybercrime
PPT
censorship bme-1
PPT
Cyber Safety How Children Can Protect Themselves From Online Threats
PPT
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
DOC
Assignment of cyber crimes for oumh1203
PPT
Women Safety by MBA Media Management , ASCO
PDF
Cyber Crime Awareness Project
PDF
Bihar State Report November-2016
PPTX
Cyber Crime
DOC
Cyber crime final report
PPTX
Legal challenges in E-commerce
Internet Safety
E safety live
Digital parenting seminars
Safer internet day mo i cpc 2 feb 2014sb
Presentation slides
Filtering for in and of on education
Sacred Breath Manual
Case of baazee
Know it All - Parents eSafety Presentation
Power point cybercrime
censorship bme-1
Cyber Safety How Children Can Protect Themselves From Online Threats
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
Assignment of cyber crimes for oumh1203
Women Safety by MBA Media Management , ASCO
Cyber Crime Awareness Project
Bihar State Report November-2016
Cyber Crime
Cyber crime final report
Legal challenges in E-commerce
Ad

Similar to Protecting children in cyberspace (20)

PPTX
Cyber crime
PPTX
Cyber crime
PPTX
Cyber Law in India.pptx
PPTX
Cyber crime and issues
PPTX
Cyber Crimeand Cyber Laws
PPTX
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
PPTX
Cyber crime ppt
PDF
Cybercrimeppt 160421074211
PPTX
Cyber crimes its classifications and preventions
PPTX
CYBERCRIME.pptx.........................
PPTX
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPTX
cybercrime.pptx
PPT
SITA LAB PPT (XYBER CRIME)
PPTX
Unit-3 Cyber Crime PPT.pptx
PDF
cyber crimes in India LAWS & Guidelines_
PPTX
presentation_on_cyber_crimes_slides.pptx
PPTX
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
PDF
Laws On Cyber Crimes Alongwith It Act And Relevant Rules Pk Singh
PPTX
Cybercrime-UnderstandingRRs1-4-25-2.pptx
PPT
Cyber crime
Cyber crime
Cyber crime
Cyber Law in India.pptx
Cyber crime and issues
Cyber Crimeand Cyber Laws
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
Cyber crime ppt
Cybercrimeppt 160421074211
Cyber crimes its classifications and preventions
CYBERCRIME.pptx.........................
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
cybercrime.pptx
SITA LAB PPT (XYBER CRIME)
Unit-3 Cyber Crime PPT.pptx
cyber crimes in India LAWS & Guidelines_
presentation_on_cyber_crimes_slides.pptx
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
Laws On Cyber Crimes Alongwith It Act And Relevant Rules Pk Singh
Cybercrime-UnderstandingRRs1-4-25-2.pptx
Cyber crime

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Cloud computing and distributed systems.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
KodekX | Application Modernization Development
PPTX
A Presentation on Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KodekX | Application Modernization Development
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf

Protecting children in cyberspace

  • 1. KERALA STATE COMMISSION FOR PROTECTION OF CHILD RIGHTS Expert Consultation on Legislative and Executive Action to Improve Security of Children in Cyber Space. Karnika Seth Cyberlaw Expert & Partner, Seth Associates © SethAssociates, 2014All Rights Reserved Protecting Children in cyberspace
  • 2. •93% of teens (12-17) go online •75% of teens (12-17) have cell phones •1 in 3 teens (12-17) have experienced online harassment. •73% of teens (12-17) have profiles on social networking sites.[ •97% of teens (12-17) play computer, web, portable, or console games •4% of cell-owning teens (12-17) say that they have sent sexually suggestive nude/semi-nude messages to others via text message. •93% of teens (12-17) go online •75% of teens (12-17) have cell phones •1 in 3 teens (12-17) have experienced online harassment. •73% of teens (12-17) have profiles on social networking sites.[ •97% of teens (12-17) play computer, web, portable, or console games •4% of cell-owning teens (12-17) say that they have sent sexually suggestive nude/semi-nude messages to others via text message. Source: Lenhart A. Social Media and Young Adults. Pew Internet and American Life Project, 2010. Children using Internet-2013
  • 5. Types of Cyber crimes  Credit card frauds  Cyber pornography  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code  Email spoofing  Forgery  Defamation  Cyber stalking (section 509 IPC)  Phising  Cyber terrorism Crime against persons Crime against Government Crime against property
  • 6. Internet & Child Exploitation  Internet addiction • Cyber bullying • Cyber stalking • Child pornography • Child abuse • Identity theft cases • Cheating & fraud • Lured into criminal activities • Theft of personal information  Blackmail and harassment frauds  Child Extortion
  • 7. General concerns for children online May inadvertently or intentionally access adult pornographic or violent material Links or emails with innocent subjects that actually contain pornography Links contain malware –keyloggers that steal personal information Children being approached or observed in chat rooms Children’s identities, location or vulnerability being sourced from material available online Social networking sites may introduce child pornography, cyber harassment or stalking . Internet is becoming an addiction if unsupervised
  • 8. Exploitation of children on Internet –Gaps & challenges •TECHNICAL-Anonymity exists on internet-criminals prefer this medium •Nature of internet such , automatic ads or popups •Virus floats quickly •Easy access-no geographic limitations- quantity huge •SOCIOLOGICAL_Difference in cultures across globe-all types of content available •Gaps in definition of adulthood across countries •Increased generation gap •Internet addiction •Commercial trading , Peer-to-peer networks LEGAL-Lack of awareness of do’s and don’ts on internet •Low conviction rate
  • 9. Strategies to meet Challenges • TECHNICAL-Blocking automatic popups which are inappropriate • Using strong antivirus • Frequent change of passwords • Use of protection settings and software such as Netnanny,etc • Role of govt bodies/ ISPs /NGOs in reporting child abuse /child pornography • Blocking of illegal websites by CERT • SOCIAL- • Encourage reporting of child abuse cases • Allow internet use for limited hours and under supervision • Act as friend to your child • Checking webhistory files • school workshops,role of school counsellor
  • 10. Strategies to meet Challenges • Involve NGOs on reporting child abuse • Set up Rehabilitation centres for victims LEGAL- create cyberawareness of rights and duties in cyberspace Setting up helpline for reporting abuse Punish the offenders of law Storage of logs-no time period prescribed by central govt Sign a cybercrime convention for effective extradition of criminals abroad Police & Media to adopt a child centric approach
  • 11. International instruments on child protection  Convention on the Rights of the Child (1989) ●● Optional Protocol to the Convention on the Rights of the Child on the sale of children, child prostitution and child pornography (OPSC, 2000) ●● Protocol to Prevent, Suppress and Punish Trafficking against Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime (‘Palermo Protocol’, 2000) ●● Council of Europe Convention on Cybercrime (2001) ●● Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse (2007) In India, IT Act,2000 deals with safety of children in the online environment.
  • 12. Cybercrimes under Information Technology Act,2000 Hacking – Section 66 Sending of offensive false messages(s.66 A) Identity theft (s. 66C) Cheating by personation (s.66D) Violation of privacy (s.66E) Cyber terrorism (s.66F) Publishing sexually explicit content(s. 67A) Child pornography (s.67B) Stolen computer resource(s.66B) Attempt to commit an offence (s.84C) Abetment to commit an offence(s.84B) Publishing obscene material (Section 67)
  • 13. Types of child pornography offences ( section 67B)  View  View + collect child pornography  View, collect + distribute+publish+transmit+causes to be published or transmits child pornography  View, collect and distribute child pornography + download+exchange+advertises+promotes commit contact offences  View, collect and distribute child pornography, commit contact offences + produce child pornography  Facilitate abusing children online  Records own abuse or of others pertaining to sexually explicit act with children-  Punishable with imprisonment of 5 years and fine upto 10 lacs  Blocking of illegal websites –Section 69A IT Act,2000
  • 14. Cyber café Rules,2011 Maintenance of log register Photo identity card requested Minor without photo identity card to be accompanied by an adult History of websites accessed by a user kep by café for one year Computers in café equipped with commercially available filtering software to avoid acess to child pornography or obscene content Board declaring computers not to be used for illegal activity to be displayed Regular inspections of cybercafes
  • 15. Case studies DPS MMS case (Bazee.com) Adnan murder case-orkut case Noida MMS scandal Air force Bal Bharati School case According to latest NCRB statistics in 2012 there were 589 cases registered under IT Act & IPC dealing with transmitting obscene information and 497 persons were arrested in India http://ncrb.nic.in/
  • 16. The Noida MMS Scandal  In February 2009, an MBA student in Noida a boy circulated video clip of his 23 -year-old-girlfriend doing striptease for him to his classmates using the girl's e-mail id.  After the girl refused to marry him, the boy who had access to the girl's mail id and circulated that MMS clip to fellow students.  Police registered a case of criminal intimidation following a complaint filed by the girl's family
  • 17. Air force Bal Bharati School Air force Bal Bharati School case , Delhi; class(XII) student created pornographic site as revenge against his classmates (girls) and posted pornographic images of his classmates and lady teachers on internet. He was then suspended by school and arrested by Police under IPC and IT Act; though Juvenile Court allowed his bail thereafter.
  • 18. Possible reliefs to a cybercrime victim- strategy adoption  A victim of cybercrime needs to immediately report the matter to his local police station and to the nearest cybercrime cell  Depending on the nature of crime there may be civil and criminal remedies.  In civil remedies , injunction and restraint orders , blocking of websites, may be sought, together with damages, delivery up of infringing matter and/or account for profits.36 hr deadline for blocking or approach court.  Call police helpline  In criminal remedies, a cybercrime case will be registered by police if the offence is cognisable and if the same is non cognisable, a complaint should be filed with metropolitan magistrate  For certain offences, both civil and criminal remedies may be available to the victim
  • 19. Before lodging a cybercrime case Important parameters- Gather ample evidence admissible in a court of law Fulfill the criteria of the pecuniary ,territorial and subject matter jurisdiction of a court. Determine jurisdiction – case may be filed where the offence is committed or where effect of the offence is felt ( S. 177 to 179, Crpc)
  • 20. Preparation for prosecution  Collect all evidence available & saving snapshots of evidence  Seek a cyberlaw expert’s immediate assistance for advice on preparing for prosecution  Prepare a background history of facts chronologically as per facts  Pen down names and addresses of suspected accused.  Form a draft of complaint and remedies a victim seeks  Cyberlaw expert & police could assist in gathering further evidence e.g tracing the IP in case of e-mails, search & seizure or arrest as appropriate to the situation  A cyber forensic study of the hardware/equipment/ network server related to the cybercrime is generally essential
  • 21. Precautions for online safety -Secure online connections Install and keep up-to-date anti-virus, anti-spyware, and firewall Microsoft Malicious Software Removal Tool http://www.microsoft.com/downloads/details.aspx? FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en CCleaner (Free) http://www.ccleaner.com/download/ Anti-Spyware – A-Squared (free) http://download5.emsisoft.com/a2FreeSetup.exe AVG Free http://free.grisoft.com/ Use Commercial Web Filtering Software Free - http://www.k9webprotection.com/ Net Nanny (2007 best) http://www.netnanny.com/ Check internet cache @winspy (free) http://www.acesoft.net/winspy Spector Pro to track everything done on a PC http://www.spectorsoft.com/products/SpectorPro_Windows
  • 22. Useful softwares Monitoring Software Spectorsoft.com or 1-888-598-2788 Safety-net.info or 1-800-513-1916 Software4Parents.com or 1-866-345-8371 PCmagazine.com (search “parental monitoring”)
  • 23. Enabling protection through filters- IE browser protection
  • 24. Enabling protection through filters- IE browser protection 4. Select filter settings for the categoriSelect filter settings for the categories shown: Language, Nudity, Sex, Violence. The further right you push the slider, the more content is allowed. 5. Click on the Approved Sites tab. Here you can type in any specific websites that you might want to be treated specially. You can come back and change this list later, perhaps after feedback from your family. 'Approved Sites' list 6. Navigate to the General tab, and click on Create Password. This will set you up as Administrator, and prevent other users from altering the Content Advisor settings. Change the Rating Settings to block types of content  es shown: Language, Nudity, Sex, Violence. The further right you push the slider, the more content is allowed. Change the Rating Settings to block types of content
  • 25. Enabling protection through filters- IE browser protection
  • 26. The ten commandments of child protection in cyberspace- 1. Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for the law and for others, etc. 2. Don’t talk to strangers 3. Keep your private information private 4. Never agree to meet an online friend without your parents 5. There are no guarantees that what you say or post on the Internet is private
  • 27. The ten commandments of child protection in cyberspace- 6. Information (including photos, videos, etc.) posted on the Internet can last forever 7. Tell your parents if you encounter something uncomfortable 8. Don’t reply to unknown screen names on IM 9. Never open e-mail from strangers or click on any attachments 10. Find the “good” online – good friends, good Web sites, good games – and enjoy
  • 28. Do’s and dont’s- bestpractices on social media Express yourself but not use abusive language Donot invade privacy of others Verify friend/follower requests Check downloads etc for viruses Donot disclose other person or your own sensitive personal information Communicate with strangers cautiously Use strong passwords and privacy protect features Read terms of use and how your information is used by service provider before you use a service
  • 29. Thank you! SETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTS New Delhi Law Office: C-1/16, Daryaganj, New Delhi-110002, India Tel:+91 (11) 65352272, +91 9868119137 Corporate Law Office: B-10, Sector 40, NOIDA-201301, N.C.R ,India Tel: +91 (120) 4352846, +91 9810155766 Fax: +91 (120) 4331304 E-mail: mail@sethassociates.com