tag:blogger.com,1999:blog-58420838297195831552024-03-05T06:42:39.961-08:00Adv. Rajas Pingle [Cyber Law Expert]This blog is dedicated for Cyber Crime Awareness (News, Safety tips, Articles etc..), so that the general public can safeguard themselves in Cyber Space.
Created by:
Adv. Rajas Pingle
Pune, India Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-5842083829719583155.post-77540792321115171862017-10-14T00:23:00.000-07:002017-10-14T00:23:41.331-07:00Netflix Phishing<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbuB_byBQti7lUSh5wXRVLtl83-vo_Lzv73Fq8d1FbHLPQ_8oanDagFF4T0mVTDGrL1bTzpEF9ObAaseX_SE2JjORgSbGKP5tNeILEezR1GplrmUGCVmjL30bIZDz6P3zu0WLx5kpIWQk/s1600/unnamed.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="640" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbuB_byBQti7lUSh5wXRVLtl83-vo_Lzv73Fq8d1FbHLPQ_8oanDagFF4T0mVTDGrL1bTzpEF9ObAaseX_SE2JjORgSbGKP5tNeILEezR1GplrmUGCVmjL30bIZDz6P3zu0WLx5kpIWQk/s640/unnamed.jpg" width="640" /></a></div>
<br />
<br />
<div class="reader-flag-content__wrapper mb4 clear-both" data-ember-action-10320="10320" data-ember-action="" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; clear: both; color: rgba(0, 0, 0, 0.701961); display: flex; font-family: "Source Sans Pro", Helvetica, Arial, sans-serif, "Hiragino Kaku Gothic Pro", Meiryo, "Hiragino Sans GB W3", "Noto Naskh Arabic", "Droid Arabic Naskh", "Geeza Pro", "Simplified Arabic", "Noto Sans Thai", Thonburi, Dokchampa, "Droid Sans Thai", "Droid Sans Fallback", -apple-system, ".SFNSDisplay-Regular", "Heiti SC", "Microsoft Yahei", "Segoe UI"; font-size: 1.5rem; font-style: normal; font-variant-caps: normal; font-weight: normal; justify-content: flex-end; letter-spacing: normal; margin: 0px 0px 16px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: auto; word-spacing: 0px;">
</div>
<br />
<div class="ember-view" id="ember10319" style="-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Sans Pro", Helvetica, Arial, sans-serif, "Hiragino Kaku Gothic Pro", Meiryo, "Hiragino Sans GB W3", "Noto Naskh Arabic", "Droid Arabic Naskh", "Geeza Pro", "Simplified Arabic", "Noto Sans Thai", Thonburi, Dokchampa, "Droid Sans Thai", "Droid Sans Fallback", -apple-system, ".SFNSDisplay-Regular", "Heiti SC", "Microsoft Yahei", "Segoe UI"; font-size: 17px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: auto; outline: 0px; padding: 0px; text-align: start; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: auto; word-spacing: 0px;">
<div class="reader-article-content" style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; font-size: 17px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
Uncovered by PhishMe, this phishing attack starts with a Netflix branded email asking users to update their account details and has a link to direct them to a spoofed landing page asking for their email address and password. Once that has been entered the page then directs them to another page asking for them to update their credit card details, all while looking like a genuine Netflix page.</div>
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
These scammers are specifically targeting busy corporates and consumers. The scammer succeeds most of the time targeting corporate email accounts, as large number of people generally tend to use their corporate email accounts for consumer activities. Furthermore, the scammer hopes that you reuse the same password for your personal email account or, if the scammer is very lucky, for your work email account. </div>
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
Password re-use is a very simple mistake many people make, and by giving up one account detail, the user has fallen into the trap. As instructed by many Cyber Security Experts around the globe time and again, to have a separate password for each type of account access and use a secure password vault to store those passwords to retrieve when required, but unfortunately this practice is rarely followed by large number of people. </div>
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; font-size: 21px; font-weight: 700; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">-Adv. Rajas Pingle, Cyber Law Expert, Netlawgic Legal Services LLP.</strong></div>
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
- info@netlawgic.com</div>
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
- www.netlawgic.com</div>
<div style="background-position: 0px 0px; background-repeat: initial initial; border: 0px; box-sizing: inherit; color: rgba(0, 0, 0, 0.701961); font-family: "Source Serif Pro", serif; font-size: 21px; font-weight: 400; line-height: 32px; margin: 3.2rem 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
- http://rajaspingle.blogspot.in/</div>
</div>
</div>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0India20.593684 78.962880000000041-8.6044825 37.654286000000042 49.791850499999995 120.27147400000004tag:blogger.com,1999:blog-5842083829719583155.post-16421910868011466292015-09-15T05:15:00.000-07:002017-10-14T00:26:21.760-07:00<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<u><span style="font-size: x-large;">Change of Bank details fraud</span></u></h2>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBhbX8Mjq1VS3MmMq3VOnJZ2Y_QpnX1scoM_E6Z5vKGFvxS3mB8w2TRE3ejzLijoek9h3eQyB0bTdK8OFl4YEzz3tNNWGxPivw1TdgAbJx7pqGCJeXJAjPY0jcTtRufqnKwokEhgTI3iM/s1600/road-sign-464641_1280-1080x675.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBhbX8Mjq1VS3MmMq3VOnJZ2Y_QpnX1scoM_E6Z5vKGFvxS3mB8w2TRE3ejzLijoek9h3eQyB0bTdK8OFl4YEzz3tNNWGxPivw1TdgAbJx7pqGCJeXJAjPY0jcTtRufqnKwokEhgTI3iM/s640/road-sign-464641_1280-1080x675.jpg" width="640" /></a></div>
<div>
<br /></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">-Adv. Rajas Pingle, Cyber Law Expert, Netlawgic Legal Services LLP.</strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">-<a href="https://www.blogger.com/null" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #008cc9; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" target="_blank"> info@netlawgic.com</a></strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">- <a href="http://www.netlawgic.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #8c68cb; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">www.netlawgic.com</a></strong></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
Although not new in other countries, the “change of bank details” scam has taken Indian Companies by a storm, where large amount money is getting siphoned off from their respective bank accounts.</div>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: 'Helvetica Neue'; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 1.2; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="underline" style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline;">Modus Operandi</span> </strong></h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
The Fraudsters will hack into the email accounts of the targeted Companies and learn about the business transactions between <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Company A</strong> (the seller, the consignor) and <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Company B</strong> (the buyer, the paying company). Later, fraudsters, impersonating to be Company A, will send fictitious emails (which are very similar to genuine emails) to Company B, claiming that the payment receiving bank account number have changed, and requesting Company B to credit the amount payable to the designated bank account (Fraudster's bank account). Once the money is transferred to the fraudster's bank account, it will be further routed to different bank accounts or will be withdrawn within very short span of time.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
The Police investigation shows that its very difficult to pinpoint these fraudsters as they use advanced techniques to hide their 'Internet Protocol' addresses.</div>
<h3 style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.85098); font-family: 'Helvetica Neue'; font-size: 20px; font-stretch: inherit; font-weight: 400; line-height: 1.2; margin: 0px 0px 8px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span class="underline" style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">To avoid being the next victim, here are some simple precautions.</strong></span></h3>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
1) Get the landline numbers of the Supplier's office (even Skype accounts can be hacked) and get in touch with the respective senior management/employees of the Supplier Company.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
2) Ask each supplier for their bank accounts in advance and if at all theres a change in the bank account, confirm the same over landline/phone.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
3) Email accounts can be hacked we have already established that, for an extra level of safety: have invoices faxed to you, and check whether the sending fax number belongs to the Supplier’s Company.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
4)A small amount of wire transfer can be done to check the authenticity of the Supplier's bank account.</div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
5) Watch out for the give aways:</div>
<ul style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.701961); font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 27px; margin: 0px 0px 15px; outline: 0px; padding: 0px 0px 0px 35px; vertical-align: baseline;">
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Often the letter will include the invitation “in order to confirm this instruction, please call me on my direct dial number xxx” – this will be an unconnected rented line or accommodation office managed by the fraudsters;</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Similarly beware of supposedly confirmatory emails from almost identical email addresses, eg .com instead of .co.in, or, abcd@xyz1.com instead of abcd@xyz.com which has been set up by the fraudster for that purpose;</li>
<li style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 32px; margin: 0px 0px 15px; outline: 0px; padding: 0px; vertical-align: baseline;">Does the letter or email contain any errors? – often many typos can be found.</li>
</ul>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">6) <strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">The most important thing to do would be, to educate employees/staff in your Company/Organisation by inviting industry experts for trainings/informative sessions on 'Cyber Crimes & Information Technology Law' </strong></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law.</strong></span></div>
<div style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; color: #232629; font-family: Georgia, serif; font-size: 18px; font-stretch: inherit; line-height: 32px; margin-bottom: 32px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><strong style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Picture - http://siliconangle.com/blog/2015/08/10/ubiquiti-networks-falls-victim-to-46-7m-email-scam/</strong></span></div>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0India20.593684 78.962880000000041-8.6044825 37.654286000000042 49.791850499999995 120.27147400000004tag:blogger.com,1999:blog-5842083829719583155.post-25290779035974395682015-01-19T21:50:00.000-08:002015-01-19T21:50:22.554-08:00<div dir="ltr" style="text-align: left;" trbidi="on">
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDzvnj7RTijVLm_YDGnfYupawdqvsd7Pjr2xPSOu1jLtK3qo8zewWpznXikf9TwVm__RLSTu3miSnrjm7hB1Qb1N6eNhq7k1xTter5GVkiaxGqTCGVBj5vVxwBJdTb61N9QXTLog5PKRY/s1600/33d57b0.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDzvnj7RTijVLm_YDGnfYupawdqvsd7Pjr2xPSOu1jLtK3qo8zewWpznXikf9TwVm__RLSTu3miSnrjm7hB1Qb1N6eNhq7k1xTter5GVkiaxGqTCGVBj5vVxwBJdTb61N9QXTLog5PKRY/s1600/33d57b0.jpg" height="228" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><h2 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Helvetica, Arial, sans-serif; font-size: 36px; font-stretch: inherit; line-height: 40px; margin: 0px; padding: 0px 0px 10px; vertical-align: baseline;">
Power to Adjudicate vis-à-vis Compensation Suits</h2>
</td></tr>
</tbody></table>
<br />
<div>
<br /></div>
<div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">-Adv. Rajas Pingle, Cyber Law Expert, Netlawgic Legal Services LLP.</strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">-<a href="https://www.blogger.com/null" style="border: 0px; box-sizing: border-box; color: #0077b5; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;" target="_blank"> info@netlawgic.com</a></strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">- <a href="http://www.netlawgic.com/" style="border: 0px; box-sizing: border-box; color: #7b539d; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">www.netlawgic.com</a></strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">- http://rajaspingle.blogspot.in/</strong></div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Helvetica, Arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Introduction</strong></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
Keeping in mind the ever increasing amount Cyber Crimes in the country and the over burdened Courts to decide the cases relating to loss of a party, Legislators introduced Section 46 in Information Technology Act, 2000 which specifically empowers the IT Secretary (Adjudicating Officer) of a respective state to hear and decide compensation suits for which the amount does not exceed Rs. 5 Crore. Furthermore the Adjudicating Officer has been empowered with certain powers of Civil Court.</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Helvetica, Arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">When can a victim file a complaint before Adjudicating Officer?</strong></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
A person who is affected by the following acts of a perpetrator can file a complaint before Adjudicating Officer mainly under Section 43 and 43A of the Information Technology Act, 2000.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Section 43</strong>: If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network -</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(a) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">accesses or secures access </strong>to such computer;</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(b) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">downloads, copies or extracts any data</strong>, computer data base or information from such computer, including information or data held or stored in any removable storage medium;</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(c) introduces or causes to be introduced any <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">computer contaminant or computer virus </strong>into any computer;</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(d) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">damages or causes to be damaged </strong>any computer</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(e) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">disrupts or causes disruption </strong>of any computer</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(f) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">denies or causes the denial of access</strong> to any person authorized to access any computer</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(g) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">provides any assistance </strong>to any person to facilitate access to a computer,</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(h) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">charges the services availed</strong> of by a person to the account of another person by tampering with or manipulating any computer</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(i) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">destroys</strong><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">, deletes or alters </strong>any information residing in a computer resource</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(j) <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Steals, conceals, destroys or alters </strong>or causes any person to steal, conceal, destroy or alter any computer source code.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
Compensation limit - As per the loss</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Section 43A:</strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
Compensation limit - As per the loss</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Helvetica, Arial, sans-serif; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Duration of the Proceedings</strong></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
According to the Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, Rule 4(k) clearly states that, as far as possible, every application <strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">shall be heard and decided in four months and the whole matter in six months</strong>.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">How is the Quantum of Compensation decided?</strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
The following factors are taken into the consideration while adjudicating the matter;(a) the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default;</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(b) the amount of loss caused to any person as a result of the default;</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
(c) the repetitive nature of the default.</div>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Helvetica, Arial, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; padding: 0px; text-align: left; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">To sum up the article, people who have been affected by the instances like,</strong></h4>
<ul style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; padding: 0px; vertical-align: baseline;"><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Unauthorised Copying of Data/Data Theft;</strong></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; padding: 0px; vertical-align: baseline;"><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Credit/Debit Card fraud;</strong></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; padding: 0px; vertical-align: baseline;"><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Net Banking Fraud;</strong></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; padding: 0px; vertical-align: baseline;"><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Damage to the Computer;</strong></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; padding: 0px; vertical-align: baseline;"><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Body Corporate negligent in protecting your sensitive personal information;</strong></li>
<li style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; padding: 0px; vertical-align: baseline;"><strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Denial of access to the Computer (Mobile phone, tablet, Laptop etc..)</strong> and so forth..</li>
</ul>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
can approach the Adjudicating Officer which is the IT Secretary of every state.</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law.</strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;">Image - http://searchbuzz.co/wp-content/uploads/2012/05/ehh-630-gavel-keyboard-law-istock-630w.jpeg</strong></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; padding: 0px; vertical-align: baseline;">
Image Copyrights are with the Owner.</div>
</div>
<div>
<span style="color: white; font-size: 12px; font-style: italic; line-height: 14px;"><br /></span></div>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0tag:blogger.com,1999:blog-5842083829719583155.post-14288528348995669072014-11-05T03:21:00.000-08:002017-10-14T00:25:23.768-07:00Cyber Pornography<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="-webkit-text-stroke-color: rgb(0, 140, 180); -webkit-text-stroke-width: initial; color: #008cb4; font-family: Didot; font-size: 42px; margin-bottom: 15px; text-align: justify;">
Cyber Pornography</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify;">
<b>Adv. Rajas C. Pingle</b></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; min-height: 28px; text-align: justify;">
<br />
<b></b></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG8xyh7eS2JWJbxXsngqp1ezR2OT93prXbvxf3vbIWowbkSn6R1fg6Q7vxeuPlz9HotyQa-fDba0407G09tXto57MYal7l4FT6ehcEfAMSfntbmyEum8dIPm7NtdtSKnfmQdcDQZ5u0ng/s1600/stop-sign-with-adult-content-warnings-3d78792.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="251" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG8xyh7eS2JWJbxXsngqp1ezR2OT93prXbvxf3vbIWowbkSn6R1fg6Q7vxeuPlz9HotyQa-fDba0407G09tXto57MYal7l4FT6ehcEfAMSfntbmyEum8dIPm7NtdtSKnfmQdcDQZ5u0ng/s1600/stop-sign-with-adult-content-warnings-3d78792.jpg" width="320" /></a></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino;">
This post has been divided into following parts:</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin-bottom: 8px; min-height: 19px; text-align: justify;">
<br /></div>
<ul>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Current Scenario in India & in other Developed Countries;</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Advantages & Disadvantages of Pornography;</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Practicality of banning Cyber Pornography in India & Role of an Intermediary;</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Necessary amendments to Information Technology Act, 2000 for better Regulation, prosecution and conviction as far as Cyber Pornography Offences are concerned</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Educating the Police on Cyber Pornography Offences for quality investigation and Problems & Solutions while Investigating the Cyber Pornography Offences; And</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px; text-align: justify;"><span style="font-family: "helvetica";"></span>Awareness campaigns for educating Parents on Parental Control in curbing Cyber Pornography</li>
</ul>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 18px; min-height: 26px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; text-align: justify;">
<b>Current Scenario in India & other Countries</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;"><b>I</b></span><b>n India </b>Information Technology Act, 2000 deals with the issue of Cyber Pornography. Under the Act storing or private viewing of pornography is legal as it does not specifically restricts it. On the other hand transmitting or publishing the pornographic material is illegal, following are some sections of Information Technology Act, 2000 which prohibit cyber pornography with certain exceptions to Section 67 & 67A;</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
“Section 66A of the Information Technology Act, 2000 prohibits sending of offensive messages through communication service”</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
“Section 66E of the Information Technology Act, 2000 prohibits capturing, transmitting or publishing the image of a private area of a person without consent”</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
“Section 67 of the Information Technology Act, 2000 specifically prohibits, transmission or publication of obscene material in electronic form” </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
“Section 67A of the Information Technology Act, 2000 prohibits transmission or publication of material containing sexually explicit act in electronic form”</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
“Section 67B of the Information Technology Act, 2000 prohibits storying, private viewing, transmission or publication of material containing child pornography in electronic form”.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<b>Exception:</b> Section 67 and section 67A does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form- </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span class="Apple-tab-span" style="white-space: pre;"> </span>(i) the publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper, writing, drawing, painting, representation or figure is in the interest of science, literature, art, or learning or other objects of general concern; or </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span class="Apple-tab-span" style="white-space: pre;"> </span>(ii) which is kept or used bona fide for religious purposes. <span style="font-family: "times";"><br />
</span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
As far as the above sections relating to Cyber Pornography are concerned, Section 67A and 67B are the only sections which are non-bailable as per Section 77B of the Act, whereas others are bailable. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
We also have Section 69A of the Information Technology Act, 2000 where Central Government or its officer appointed can issue directions to other Government Agencies and Intermediaries to block such information for public access if it is necessary or expedient so to do in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above, now considering the topic of Cyber Pornography although blocking of Cyber Pornography is not explicitly mentioned in this section but it could be implied the term Public Order in the above mentioned section would mean ‘Maintenance of Law’. Hence an inference can be drawn that Cyber Pornography can be blocked under the said provision.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
On perusal of the above mentioned sections one could see there is a clear contradiction between Section 66E of the Information Technology Act, 2000 and other Pornography related sections as Section 66E prohibits capturing, transmitting or publishing the image of a private area of a person ‘without consent’ but the question arises here, is it allowed with consent?, whereas Section 67 and Section 67A of the Information Technology Act, 2000 prohibits the transmission and publication of obscene and sexually explicit material.<span style="font-size: 14px;"> </span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;"><b>I</b></span><b>n United States of America </b>with the exception of child pornography, the legal status of accessing Internet pornography is still somewhat unsettled, though many individual states have indicated that the creation and distribution of adult films and photography are legally termed as an act of prostitution.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
As of now in America Cyber Pornography is regulated and for the same the traditional method mentioned in the Landmark Judgement of <b>Miller Vs State of California</b> is used along with other legislations. The legality of pornography is determined by the Miller test, the test dictates that the opinion of the local community on a specific pornographic piece is most important in determining its legality. Thus, if a local community determines a pornographic work to meet its standard for obscenity then it is more likely to be banned. This means that a pornographic magazine that might be legal in California could be illegal in Alabama. This standard on pornographic legality is extremely difficult to uphold for the internet given that the internet contains ubiquitous amounts of pornography. It has been argued that if the Miller test were applied to the Internet then, in effect, the community standards for the most conservative community would become the standard for all U.S. based Web sites. The courts are currently examining this issue<sup></sup>.<span style="font-size: 14px;"> </span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;"><b>I</b></span><b>n United kingdom</b>, the possession of pornographic images for private use has never been an offence, however the sale or distribution of hardcore pornography through any channel was prohibited until the rules were relaxed in 2002. The UK citizens were always able to access pornography without breaking any laws except child pornography. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
In UK, pornography has been divided into three parts, softcore pornography, hardcore pornography and extreme pornography. Extreme pornography is illegal to even possess as on January 2009 and carries a three year imprisonment. Criminal Justice & Immigration Act, Sections 63 to 67 of the Act make it an offence to possess pornographic images that depict acts which threaten a person's life; acts which result in or are likely to result in serious injury to a person's anus, breasts or genitals; bestiality; or necrophilia. They also provide for the exclusion of classified films etc. and set out defences and the penalties for the offence<sup></sup>. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
The UK Government has instructed ISPs to filter legal pornography and other adult subjects <b>"by default"</b>. This would mean that anyone who wanted to view websites dealing with these sensitive subjects would have to choose to do so<span style="font-size: 14px;">. </span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;"><b>I</b></span><b>n Australia, </b>government has implemented rating based regulatory framework, criminal legislation in Australia prohibits production, dissemination and consumption of illegal pornography. It is illegal for internet content providers within Australia to 'broadcast' internet pornography classified as MA15+ to R18+ unless such internet pornography is subject to an age verification system or internet pornography which may be classified as X18+ to RC content that is not subject to an <b>Australian Communications and Media Authority</b> (ACMA) infringement notice through exceptions<sup></sup>. <b> </b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<b></b><br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
Cyber<b> </b>pornography hosted outside Australia classified by the ACMA under the Classification Board legislation will be blocked if such Cyber pornography is deemed by the AMCA to be refused classification , or 'potentially' refused classification. Refused classification (RC) does include real child abuse internet pornography and bestiality internet pornography. Cyber pornography is prohibited in Australia if it falls within the ‘RC’ or ‘X18+’ classifications or, for content hosted in Australia that is not restricted by an adult verification procedure, if it falls within the ‘R18+’ classification.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; text-align: justify;">
<b>Advantages & Disadvantages of Pornography</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; margin-bottom: 8px; min-height: 16px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin-bottom: 8px; text-align: justify;">
<b>Advantages - </b></div>
<ol>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Exhaust Value - Pornography can help in relieving sexual tension and can relax human body and mind.</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Can be a short cure for long distance relationships - Pornography can be a short cure for long distance relationships, as these people can use the scenes to satisfy natural urges that they would otherwise look to people who use this urge as a tool to take advantage of desperate individuals who are married or in a committed relationship.</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Can help in reduction of sexual crimes - There there have been studies that link pornography to crime, there have similar studies that do not link pornography to crime. Therefore, there is no concrete proof of an increase of violence or sexual crimes caused by pornography. It is currently believed that the sexual tension release by watching pornography probably decreases crimes more than it increases crimes.<span style="font-size: 14px;"> </span></li>
</ol>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; margin-bottom: 8px; min-height: 19px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin-bottom: 8px; text-align: justify;">
<b>Disadvantages</b><b> -</b></div>
<ol>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Unrealistic delusion - There are actors and actresses in the scene, because they display emotions of expectancy and euphoria, this is not necessarily true. This can lead to unrealistic expectations in real life and can end relationships.</li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>May end Marriages - This doesn't really come into a disadvantage, as it really depends upon the mind set of an individual, in some cases, as soon as your husband/wife views porn, chances are you’ll feel disrespected. Some spouses start feeling insecure, actually inadequate because of their partners. This may make a wedge in the marriage but as I said it really depends on the mindset of an individual. </li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Minor exploitation - If minors gain access to pornography, they immediately start thinking that this is what should be done and it changes the focus of life. Without proper education pornography can lead to unsocial behaviour causing a generation of confused and misinterpreting young class. The instances of people becoming pedophiles might also increase </li>
<li style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; margin: 0px 0px 8px; text-align: justify;"><span style="font-family: "helvetica";"></span>Religion and Beliefs - Not all, but some religions believe that pornography is a type of adultery or unfaithfulness.</li>
</ol>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; text-align: justify;">
<b>Practicality of banning Cyber Pornography & Role of an Intermediary in India</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;">I</span>n India, we already have provisions for blocking of Cyber Pornography vide Section 69A and Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 of the Information Technology Act, 2000 which lays down the procedure for actually blocking for access of information by public. According to me the procedure mentioned in the rules is a bit lengthy as one needs to write a complaint and send it to the concerned Nodal Officer appointed by the respective organisation and then if the concerned organisation is satisfied about the need to block the information, then only the Nodal Officer of the organisation will forward the same to designated officer appointed by the Central Government in this behalf, instead of going through all these hassles the Central Government can simply create a wing, where the cognisance of these complaints can be taken and acted upon immediately.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
The Information Technology Act, 2000 does not provide specific wording for blocking of Cyber Pornography for public access, one has to interpret Section 69A of the Information Technology Act, 2000 in such a way so as to include Cyber Pornography into the definition of ‘Public Order’ to put check on Cyber Pornography, where Courts in India have already interpreted Public Order as ‘Maintenance of Law’.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
Where completely removing pornographic websites will not be a feasible idea, as most of these pornographic websites have their servers outside India, in the Countries where Cyber Pornography is loosely regulated or completely legal, however these pornographic websites can either be completely blocked or regulated by new framework for Cyber Pornography altogether. Service providers as Intermediaries play a very important role as far as enforcement of the present law or future regulatory framework is concerned. Section 79 of the Information Technology Act, 2000 exempts liability of an Intermediary in certain scenarios, however as far as Cyber Pornography offences are concerned, Rule 3(4) of Information Technology (Intermediaries guidelines) Rules, 2011 will be applicable; </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<b>“The intermediary, on whose computer system the information is stored or hosted or published, upon obtaining knowledge by itself or been brought to actual knowledge by an affected person in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2) above, shall act within thirty six hours and where applicable, work with user or owner of such information to disable such information that is in contravention of sub-rule (2). Further the intermediary shall preserve such information and associated records for at least ninety days for investigation purposes”</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<b></b><br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
On the other hand, if at all we consider complete blocking of every pornographic website at ISP level by putting network filters, one of the downsides would be, everything would be blocked even the good literature or the websites including government websites providing sex education and health education as sometimes the filters provided by ISPs would not recognise the difference between violent pornographic website and a website providing education or good literature. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; margin-bottom: 12px; min-height: 14px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
The other challenge is blocking or taking down the offensive/objectionable content which is there on the website which do not have servers in India, these organisation don't really comply with the Indian Laws, so obviously Law Enforcement Authorities would have to request these organisation to take down the content and these organisation if they deem fit would do so, taking their own sweet time. The solution would be bringing these organisations within the ambit of Indian Laws by compelling them to establish their servers in India.<span style="font-size: 14px;"> <span style="font-size: 12px;"> </span></span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; text-align: justify;">
<b>Necessary Amendments to Information Technology Act, 2000</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; min-height: 19px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;">A</span>s we all know, Information Technology Act was introduced in the year 2000 and it was the first technology legislation in India and in the year 2008 the Act was amended and it turned out to be a Scenario Changer! Also Information Technology Rules, 2011 defined ‘Sensitive Personal Data’ & ‘Reasonable Security Practices’, which are remarkable welcome changes but nevertheless the current Act still lacks in many areas.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
The Cyber Pornography Offences are mainly defined in sections,66A 66E, 67, 67A and 67B, as already discussed above. All other Pornography related offences are bailable as per Section 77B of the Information Technology Act, 2000 the only exceptions being Section 67A & section 67B. This is the main reason why the offenders are committing pornography related offences and still have the audacity to repeat it, as they are entitled to bail as of right and not to mention the long trial period. These sections of the Act should be made non-bailable so as to strike fear into the minds of these offenders, this would definitely reduce the crime rate to some extent. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
Section 66A prohibits sending of offensive messages though communication service, but does not define the word ‘offensive’, the same should be clearly defined to avoid the misuse of this section. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
Section 67 which prohibits transmission or publication of obscene material in electronic form desperately needs an amendment as the word ‘Obscene’ is not specifically defined but nevertheless it gives out a partial definition which is, “any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it” but at the same time the Apex court bench of Justices K.S. Radhakrishnan and A.K. Sikri upheld the appeal in <b>Sportsworld case</b> in 2014 and ruled that a picture or article can be deemed obscene only if it is lascivious, appeals to prurient interests and tends to deprave and corrupt those likely to read, see or hear it.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<b></b><br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<b>“A picture of a nude/semi-nude woman… cannot per se be called obscene…. Only those sex-related materials which have a tendency of ‘exciting lustful thoughts’ can be held to be obscene, but the obscenity has to be judged from the point of view of an average person, by applying contemporary community standard(s),” the court said.</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<b></b><br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<b>“Applying the community tolerance test, we are not prepared to say such a photograph is suggestive of depraved minds and designed to excite sexual passion… which would depend upon the particular posture and background</b><b><sup></sup></b><b>,” </b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<b></b><br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
The Apex Court in this case has applied the same test of Community Standards as mentioned in the case of Miller Vs. State of California, USA. This issue should obviously be examined further for clarity in the section.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
There is an obvious contradiction between Section 66E and other pornography related sections, Section 66E prohibits capturing, transmitting or publishing the image of a private area of a person without consent but if it is done with consent then it is allowed, whereas Section 67 and Section 67A of the Information Technology Act, 2000 prohibits the transmission and publication of obscene and sexually explicit material. The words “transmitting or publishing” should be removed by amendment to resolve this issue. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
In India storing or private viewing of pornography is legal as the Information Technology Act, 2000 does not specifically restricts it, according to me Cyber Pornography should be divided into three parts namely Softcore Pornography, Hardcore Pornography and Extreme Pornography, by defining and adding these types it would be easier to regulate and restrict pornography in general. By amending the Cyber Pornography sections Government can include and prohibit even storing or private viewing of Hardcore and Extreme Pornography. </div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
As per Rule 3(4) of the Information Technology (Intermediaries guidelines) Rules, 2011 the intermediary shall preserve such information and associated records for at least ninety days for investigation purposes. The stipulated period of preserving the information should be increased from ninety days to one hundred and eighty days, so that the Law Enforcement Agencies could obtain the data even at a later stage in cases which are filed after 90 days.</div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; min-height: 28px; text-align: justify;">
<b></b><br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; min-height: 28px; text-align: justify;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; text-align: justify;">
<b>Educating the Police on Cyber Pornography Offences for quality investigation and problems & solutions while investigating the Cyber Pornography Offences.</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 28px;">T</span>he first step towards curbing Cyber Pornography is, getting highest conviction rate, the ultimate effect of this would strike fear in the mind of the offender and as per jurisprudence will have deterrent effect on the offender. This will only happen if the evidence gathered by the investigating agencies is appreciated in the Court of Law. Currently the Defence Lawyers are taking advantage of lack of knowledge as far as evidence gathering in Cyber Pornography Offences is concerned. Courses should be organised at the State level by inviting Cyber Experts, this will ensure quality of investigation and evidence gathering in Cyber Offences in general.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; min-height: 19px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
While investigating Cyber Pornography Offences, sometimes the necessary information is required from the Intermediary to forward the investigation, but as some of these intermediaries consider themselves outside the ambit of Indian Laws, getting information from is tiresome process. In some cases, even after providing a Court Order to get the necessary information for investigation, some of the intermediaries don’t provide the information. The solution for this is, these intermediaries should be told to install their servers in India to route the internet traffic from India through these servers, this will ensure their liability under Indian Laws and specifically under Information Technology Act, 2000 and would also speed up the investigation process.<span style="font-size: 14px;"> </span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(87, 85, 82); -webkit-text-stroke-width: initial; color: #575552; font-family: Didot; font-size: 22px; text-align: justify;">
<b>Awareness Campaigns for Educating Parents on Parental Control to curb Cyber Pornography</b></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 12px; min-height: 16px; text-align: justify;">
<br /></div>
<br />
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; text-align: justify; text-indent: 30px;">
<span style="font-size: 12px;"> </span><span style="font-size: 28px;">I</span>t is known fact, that children/minors are most prone to Cyber Pornography as we have entered into twenty first century and everyone has a Computer at their home. Indian Government should start running campaigns for educating parents on parental control, which can be helpful in curbing Cyber Pornography at its grass root level. Parental Control software or Antivirus which has inbuilt Parental Control should be made available by the Government officially, so that it is easily downloaded and subsequently installed on every computer.</div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; text-align: justify; text-indent: 30px;">
<br /></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; font-family: Palatino; font-size: 14px; text-align: justify; text-indent: 30px;">
</div>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: "georgia" , "times new roman" , serif;">Adv. Rajas C Pingle</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: "georgia" , "times new roman" , serif;">[Cyber Law & Cyber Security Expert]</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: "georgia" , "times new roman" , serif;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law.</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: "georgia" , "times new roman" , serif;">Website - <a href="http://www.netlawgic.com/" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #7b539d; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">www.netlawgic.com</a></span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><div style="color: #444444; font-weight: normal; line-height: 18px;">
<span style="font-family: "georgia" , "times new roman" , serif;"><b><span style="color: #333333; line-height: 26px;">LinkedIn - </span><a href="http://in.linkedin.com/in/rajaspingle/" style="color: #4d469c; line-height: 26px; text-decoration: none;"><span style="color: #674ea7;">in.linkedin.com/in/rajaspingle/</span></a></b></span></div>
<div style="-webkit-text-stroke-color: rgb(0, 0, 0); -webkit-text-stroke-width: initial; color: black; font-family: Palatino; font-weight: normal; line-height: normal; text-align: justify; text-indent: 30px;">
<br style="color: #444444; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 18px; text-align: left; text-indent: 0px;" /></div>
</strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<span style="font-family: "georgia" , "times new roman" , serif; font-style: inherit; font-variant: inherit;">Facebook - </span><a href="https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline" style="color: #4d469c; font-family: Georgia, 'Times New Roman', serif; font-style: inherit; font-variant: inherit; text-decoration: none;">https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline</a></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: "georgia" , "times new roman" , serif;">Image <span style="font-weight: normal;">- </span></span></strong><span style="background-color: transparent;"><span style="color: #674ea7; font-family: "georgia" , "times new roman" , serif;">http://image.yaymicro.com/rz_512x512/3/d78/stop-sign-with-adult-content-warnings-3d78792.jpg</span></span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: "georgia" , "times new roman" , serif;">Image copyrights are with the respective owner.</span></strong></h4>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com1India20.593684 78.962880000000041-8.6044825 37.654286000000042 49.791850499999995 120.27147400000004tag:blogger.com,1999:blog-5842083829719583155.post-44504572396383812012014-10-09T23:59:00.000-07:002015-01-27T05:53:46.200-08:00Data Theft/Unauthorized Copying of Data - Legal Remedy<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; margin: 0px 0px 30px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;">
<u><i><span style="font-family: Georgia, Times New Roman, serif; font-size: x-large;"><span style="color: #333333;"><span style="line-height: 26px;">Data Theft/Unauthorized Copying of Data - Legal Remedy</span></span></span></i></u></h2>
<div style="text-align: center;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><br /></span></strong></div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><img alt="" class="left" data-loading-tracked="true" src="https://media.licdn.com/mpr/mpr/p/8/005/08e/2b2/072bdb6.jpg" /></span></strong></h3>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-stretch: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #333333;"><span style="font-size: 20px; font-style: inherit; font-variant: inherit; line-height: inherit;">What is data theft/</span><span style="font-size: 20px; line-height: 26px;">Unauthorized Copying of Data</span><span style="font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: inherit;"> ?</span></span></span></span></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #4d4f51;"><span style="line-height: 24px;">Data theft/Unauthorized copying of data in simple term means accessing and stealing/copying computer based confidential information with intention to cause wrongful loss to the owner of the confidential information and wrongful gain to the perpetrator.</span></span></span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Data theft is an increasing problem for Individual computer users as well as big corporate firms.</span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">What are the common modes of data theft/</span></strong><span style="font-family: Georgia, 'Times New Roman', serif;">Unauthorized Copying of Data</span><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">?</span></strong></h3>
<ol style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">USB (Pen) Drives & Memory cards</strong> - These are the easiest and cheapest option according to these perpetrators and are very easy to hide. The memory cards are now coming in 256GB and 512 GB variants, so it has become even more easy to move large amount of data.</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Portable Hard Drives</strong> - These are also one of the popular mediums for the obvious reasons 'Large Storage Capacity'.</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">CD/DVD</strong> - This medium was popular back in the days but has become obsolete now.</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Email</strong> - Some perpetrators simply use email to transfer files from their official account to personal account or home computer, they move the data slowly over the period of time to avoid detection by IT department for sending large amount of data. These perpetrators send these emails to their private accounts on the pretext of 'working from home'.</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Web-Mail</strong> - Some web-mail interfaces provide larger file attachments than the conventional email service providers.</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Printing - </strong>Some perpetrator would not leave any electronic evidence behind, they simply take prints of the key documents and steal the same in hard copies.</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Remote Access -</strong> This can either be used in the way of unauthorized access (Hacking) or authorized access, as some organisation provide remote access to their employees so that they can work from their home computers, this also makes tracing the data difficult for law enforcement agencies or private investigators.</span></li>
</ol>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">What can be stolen/copied?</span></strong></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Everything stored in an organisation has some potential value, some of the targets for data thieves are as follows:</span></div>
<ol style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Customer contact & Financial data such as credit card and debit card information;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">source codes & Algorithms;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">marketing information such as Plans, Contact list & media files;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">network credentials such as passwords & Certificates;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">proprietary process descriptions and operating methodologies;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">personnel records and private employee data;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">legal data concerning ongoing or planned litigation or contract actions;</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">other user’s private documents stored on company computers; and</span></li>
<li style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">company strategic data, including the communications of managerial and executive staff.</span></li>
</ol>
<h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">What is the legal remedy for data theft/</span></strong><span style="font-family: Georgia, 'Times New Roman', serif;">Unauthorized Copying of Data</span><strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">?</span></strong></h3>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #4d4f51;"><span style="line-height: 24px;">In India the first technology legislation came into being in the year 2000, that is 'Information Technology Act'. The Act did not provide for sufficient protection or solutions in data theft/unauthorized copying of data scenarios in those days, as the compensation bracket was limited, only in the year 2008 the amended Information Technology Act came into force with one of the important amendments as far as Section 43 and compensation awarded under the section is concerned, the compensation limit was removed.</span></span></span></div>
<div class="page" style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="layoutArea" style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="column" style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Section 43 - Penalty and Compensation for damage to computer, computer system, etc.</span></strong></div>
</div>
</div>
</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #4d4f51;"><span style="line-height: 24px;">Now the Complainant can approach the Adjudicating officer (Who is an IT Secretary of each state) appointed under Section 46 of the Information Technology Act, 2000 (As amended in the year 2008). The respective Adjudicating officer is competent to handle the claim up to Rs. 5 Crore and if the claim amount is exceeding Rs. 5 Crore the Complainant will have to approach the Competent Court.</span></span></span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">The Adjudicating Officer is the quickest remedy available to the Complainant, as according to Information Technology Act the Adjudicating Officer has to pass the final order within the period of 6 months from the date of filing of the Complaint.</span></div>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Website - <a href="http://www.netlawgic.com/" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #7b539d; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">www.netlawgic.com</a></span></strong></h4>
<div>
<span style="font-family: Georgia, Times New Roman, serif;"><b><span style="background-color: white; color: #333333; font-size: 20px; line-height: 26px;">LinkedIn - </span><a href="http://in.linkedin.com/in/rajaspingle/" style="background-color: white; color: #4d469c; font-size: 20px; line-height: 26px; text-decoration: none;"><span style="color: #674ea7;">in.linkedin.com/in/rajaspingle/</span></a></b></span></div>
<br />
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, 'Times New Roman', serif; font-style: inherit; font-variant: inherit;">Facebook - </span><a href="https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline" style="color: #4d469c; font-family: Georgia, 'Times New Roman', serif; font-style: inherit; font-variant: inherit; text-decoration: none;">https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline</a></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Adv. Rajas C Pingle</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">(Cyber Law & Cyber Security Expert)</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law.</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Image - http://www.tradesecretslaw.com/articles/unfair-competition/</span></strong></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-stretch: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Image copyrights are with the respective owner.</span></strong></h4>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0tag:blogger.com,1999:blog-5842083829719583155.post-2118101419262400792014-10-07T03:43:00.000-07:002014-10-07T07:04:59.345-07:00Privacy Wars 2.0<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="background-color: white; border: 0px; box-sizing: border-box; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; text-align: left; vertical-align: baseline;">
<h2 style="text-align: center;">
<span style="line-height: 26px;"><span style="font-family: Georgia, Times New Roman, serif; font-size: x-large;"><u><br /></u></span></span></h2>
<h2 style="text-align: center;">
<span style="line-height: 26px;"><span style="font-family: Georgia, Times New Roman, serif; font-size: x-large;"><u><br /></u></span></span></h2>
<h2 style="text-align: center;">
<span style="line-height: 26px;"><span style="font-family: Georgia, Times New Roman, serif; font-size: x-large;"><u>Privacy Wars 2.0</u></span></span></h2>
</div>
<div style="color: #333333; font-size: 15px; line-height: 20px; margin-bottom: 1em; margin-top: 1em; text-align: left;">
<strong><span style="font-family: Georgia, Times New Roman, serif;"><img alt="" class="left" data-mce-src="http://m.c.lnkd.licdn.com/mpr/mpr/p/5/005/08d/077/2816534.jpg" src="http://m.c.lnkd.licdn.com/mpr/mpr/p/5/005/08d/077/2816534.jpg" style="float: left; margin-bottom: 1em; margin-right: 1em; max-width: 606px;" /></span></strong></div>
<div style="color: #333333; font-size: 15px; line-height: 20px; margin-bottom: 1em; margin-top: 1em;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></div>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h3 style="color: #333333; font-size: 1.5em; font-weight: normal; line-height: 27px; margin: 1em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;"><br /></span></h3>
<h4 style="color: #333333; font-size: 1.17em; font-weight: normal; line-height: 21.0599994659424px; margin: 1.33em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;">As we enter the new era of mobile technology innovations, the key players (Apple & Google Inc.) have decided to take their user's privacy to a completely different level altogether.</span></h4>
<h4 style="color: #333333; font-size: 1.17em; font-weight: normal; line-height: 21.0599994659424px; margin: 1.33em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;">Apple and Google are trying to implement new privacy policies, which will make the data stored on the users phones inaccessible by others (Including these tech giants) except the user itself. The issue is part of a long-running debate over whether tech gadgets should have privacy-protecting encryption which makes it difficult/nearly impossible for law enforcement to access in time-sensitive investigations.</span></h4>
<h4 style="color: #333333; font-size: 1.17em; font-weight: normal; line-height: 21.0599994659424px; margin: 1.33em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;">What concerns me here is, while the law enforcement agencies investigate a particular offence which involves these respective mobile phones, it is going to be extremely difficult to decrypt the information in time which will help to solve the time sensitive crime and not to mention the hassles while fulfilling the conditions and proving the evidence under section 65(b) of the Indian Evidence Act.</span></h4>
<h4 style="color: #333333; font-size: 1.17em; font-weight: normal; line-height: 21.0599994659424px; margin: 1.33em 0px;">
<span style="font-family: Georgia, Times New Roman, serif;">The companies here will be putting law enforcement agencies in a very tight spot as in any case where the mobile phone plays an important part, but at the same time the perpetrator will enjoy the power to store and exploit the data beyond the reach of Law </span></h4>
<div>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #333333;">Website - </span><a href="http://www.netlawgic.com/"><span style="color: #674ea7;">www.netlawgic.com</span></a></span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="color: #333333;">LinkedIn - </span><a href="http://in.linkedin.com/in/rajaspingle/" style="text-decoration: none;"><span style="color: #674ea7;">in.linkedin.com/in/rajaspingle/</span></a></span></div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><span style="font-style: inherit; font-variant: inherit;">Facebook - </span><a href="https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline" style="color: #4d469c; font-style: inherit; font-variant: inherit; text-decoration: none;">https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline</a></span></div>
</div>
<h4 style="text-align: left;">
<span style="font-family: Georgia, Times New Roman, serif;">Adv. Rajas C Pingle </span></h4>
<h4 style="text-align: left;">
<span style="font-family: Georgia, Times New Roman, serif;">(Cyber Law & Cyber Security Expert)</span></h4>
<h4 style="color: #333333; line-height: 21.0599994659424px; margin: 1.33em 0px; text-align: left;">
<span style="font-family: Georgia, Times New Roman, serif;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law. Image copyrights are with the respective owner.</span></h4>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0tag:blogger.com,1999:blog-5842083829719583155.post-37088836936583756302014-10-04T06:28:00.002-07:002014-10-07T07:04:47.409-07:00Sextortion - The new internet devil<div dir="ltr" style="text-align: left;" trbidi="on">
<h1 class="article-title" style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 36px; line-height: 40px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<u><span style="font-weight: normal;"><span style="font-family: Georgia, Times New Roman, serif;"><br /></span></span></u></h1>
<h1 class="article-title" style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 36px; line-height: 40px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<u><span style="font-weight: normal;"><span style="font-family: Georgia, Times New Roman, serif;"><br /></span></span></u></h1>
<h1 class="article-title" style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 36px; line-height: 40px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<u><span style="font-weight: normal;"><span style="font-family: Georgia, Times New Roman, serif;">'Sextortion' - The new internet devil</span></span></u></h1>
<div>
<br /></div>
<div>
<u><span style="font-family: Georgia, Times New Roman, serif;"><br /></span></u></div>
<div>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<img alt="" class="center" data-loading-tracked="true" src="https://media.licdn.com/mpr/mpr/p/5/005/078/327/1011bcf.jpg" style="border: 0px; box-sizing: border-box; display: block; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px auto 15px; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" /></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</h4>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; line-height: 24px; margin-bottom: 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<ul style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; line-height: 24px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">What is sextortion?</span></strong></h4>
</li>
</ul>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">A form of sexual exploitation that employs non-physical forms of coercion by threatening to release sexual images or information to extort monetary or sexual favors from the victim.</span></h4>
<ul style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; line-height: 24px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="underline" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Modus Operandi</span></span></strong></h4>
</li>
</ul>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">1) </strong>The scammers persuade the dater to send sexually explicit photos. Once they get the photos, the scammers identify themselves as law enforcement, telling the dater they sent the pictures to a minor.</span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">They then tell the person to pay up in order to avoid arrest.</span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">The scammers are not only identifying themselves as law enforcement, they are also using actual names of officers.</span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">“These people are being contacted by Detective Don Peterson and it isn’t me,” Peterson told the paper.</span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">More than 100 people have paid between $500 to $1,500 to try to avoid arrest.</span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">2)</strong> The groups is to create online accounts of females and post pictures of attractive ladies to draw clients. They would then post pornographic images and entice their victims to have video chats with them, usually with lewd content and conversation.<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" />Once they obtain the incriminating videos, the groups would threaten to send the video chats to the victim's friends or relatives unless they send money.<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" />The victims are allegedly forced to send $500 to $2,000 – or P20,000 to P90,000 – through Western Union in exchange for the removal of the online video chat.</span></h4>
<h4 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span class="underline" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">How to prevent sextortion?</span></span></strong></h4>
<div class="page" style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-size: 16px; line-height: 24px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="section" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="layoutArea" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="column" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Talk about sextortion</span></h4>
</li>
</ul>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Sextortion thrives on silence; spread knowledge. Talk to two people and ask them to spread the word to two more. Keep the chain going.</span></h4>
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Spread the word</span></h4>
</li>
</ul>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Without a name – SEXTORTION – it is difficult to lift an abuse out of the realm of bad things we know happen and passively accept as the way of the world, and into the realm of things we will no longer tolerate and actively seek to change.</span></h4>
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Learn more about sextortion</span></h4>
</li>
</ul>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Once you become aware of sextortion, you see how pervasive it is. Gather and share information about sextortion.</span></h4>
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Examine your existing legal framework</span></h4>
</li>
</ul>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Assess the adequacy of your country’s legal framework for prosecuting sextortion.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">1) Section 66E of Information Technology Act</span></strong></h4>
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Violation of Privacy - Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person</span></strong></h4>
</li>
</ul>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">2) Section 67 of Information Technology Act</span></strong></h4>
<div class="layoutArea" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="column" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Punishment for publishing or transmitting obscene material in electronic form</span></strong></h4>
</li>
</ul>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">3) Section 67A of Information Technology Act</span></strong></h4>
</div>
</div>
<div class="section" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="layoutArea" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="column" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="page" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="section" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="layoutArea" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div class="column" style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<ul style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form</span></strong></h4>
</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Interpol investigation</span></strong></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">An INTERPOL-coordinated operation targeting organized crime networks behind ‘sextortion’ cases around the world has resulted in the arrest of 58 individuals, including three men linked to the group which harassed Scottish teenager Daniel Perry.<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" />Perry, a 17-year-old victim of an online blackmail attempt, died after jumping off the Forth Road Bridge near Edinburgh in July last year.<br style="box-sizing: border-box;" /><br style="box-sizing: border-box;" />In the first operation of its kind, information shared between the INTERPOL Digital Crime Centre (IDCC), Hong Kong Police Force, Singapore Police Force and the Philippines National Police (PNP) Anti-Cybercrime Group led to the identification of between 190 and 195 individuals working for organized crime groups operating out of the Philippines.</span></h4>
<div>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: Georgia, Times New Roman, serif; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Website - <a href="http://www.netlawgic.com/">www.netlawgic.com</a></span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">LinkedIn - <a href="http://in.linkedin.com/in/rajaspingle/">in.linkedin.com/in/rajaspingle/</a></span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">Facebook - <a href="https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline">https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline</a></span></h4>
</div>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;"><strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for information and awareness purpose and merely a possible interpretation of the law. </strong><strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Image copyrights are with the respective owner.</strong></span></h4>
</div>
</div>
</div>
</div>
</div>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0tag:blogger.com,1999:blog-5842083829719583155.post-77866785298312200212014-10-04T06:00:00.001-07:002014-10-07T07:03:47.171-07:00The bad side of information<div dir="ltr" style="text-align: left;" trbidi="on">
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 36px; font-weight: normal; line-height: 40px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<u><span style="font-family: Georgia, Times New Roman, serif;"><i><br /></i></span></u></h2>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 36px; font-weight: normal; line-height: 40px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<u><span style="font-family: Georgia, Times New Roman, serif;"><i><br /></i></span></u></h2>
<h2 style="background-color: white; border: 0px; box-sizing: border-box; color: #333333; font-size: 36px; font-weight: normal; line-height: 40px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<u><span style="font-family: Georgia, Times New Roman, serif;"><i>The bad side of information</i></span></u></h2>
<div class="article-meta" style="background-color: white; border: 0px; box-sizing: border-box; color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 16px; margin: 0px; outline: 0px; padding: 0px 0px 10px; text-align: center; vertical-align: baseline;">
<br />
<ul class="activity-counts" style="border-color: rgb(215, 215, 215); border-style: solid; border-width: 0px 1px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: none; margin: 0px 20px; outline: 0px; padding: 0px 20px; vertical-align: baseline;">
<li class="views" style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: 18px; margin: 0px; outline: 0px; padding: 0px; vertical-align: middle;"><span aria-hidden="true" class="icon" style="border: 0px; box-sizing: border-box; color: #bbbbbb; display: table-cell; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px 8px 0px 0px; position: relative; top: 1px; vertical-align: middle;"></span><span class="count" style="border: 0px; box-sizing: border-box; display: table-cell; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: middle;"><br /></span><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; vertical-align: baseline; width: 1px;">Views</span></li>
<li class="likes" style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: 18px; margin: 0px 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: middle;"><a class="like-toggle " href="https://www.blogger.com/null" role="button" style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: middle;" tabindex="0"><span aria-hidden="true" class="icon" style="border: 0px; box-sizing: border-box; color: #bbbbbb; display: table-cell; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px 8px 0px 0px; position: relative; top: 1px; vertical-align: middle;"></span><span class="count" data-like-count="6" style="border: 0px; box-sizing: border-box; display: table-cell; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: middle;"><br /></span><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; vertical-align: baseline; width: 1px;">Likes</span></a></li>
<li class="comments" style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-size: 14px; font-style: inherit; font-variant: inherit; line-height: 18px; margin: 0px 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: middle;"><a class="action-comment" href="https://www.linkedin.com/pulse/article/20140725080717-109191746-the-bad-side-of-information?trk=prof-post#comments-8682072583506141114" style="border: 0px; box-sizing: border-box; color: #4d4f51; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: middle;"><span aria-hidden="true" class="icon" style="border: 0px; box-sizing: border-box; color: #bbbbbb; display: table-cell; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px 8px 0px 0px; position: relative; top: 1px; vertical-align: middle;"><br /></span><span class="count" style="border: 0px; box-sizing: border-box; display: table-cell; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: middle;"><br /></span><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; vertical-align: baseline; width: 1px;">Comments</span></a></li>
</ul>
<ul class="social-shares" style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: none; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: middle; zoom: 1;"><a class="share-button share-linkedin" data-li-uetrk-click="share-li" data-share-type="linkedin" href="http://www.linkedin.com/shareArticle?url=http://www.linkedin.com/pulse/article/20140725080717-109191746-the-bad-side-of-information" role="button" style="border: 0px; box-sizing: border-box; color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"><span aria-hidden="true" class="icon" style="border: 0px; box-sizing: border-box; color: #0075b4; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"></span><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; vertical-align: baseline; width: 1px;">Share on LinkedIn</span></a></li>
<li style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: middle; zoom: 1;"><a class="share-button share-facebook" data-li-uetrk-click="share-fb" data-share-type="facebook" href="http://www.facebook.com/sharer/sharer.php?u=http://www.linkedin.com/pulse/article/20140725080717-109191746-the-bad-side-of-information&t=The%20bad%20side%20of%20information" role="button" style="border: 0px; box-sizing: border-box; color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"><span aria-hidden="true" class="icon" style="border: 0px; box-sizing: border-box; color: #425f9e; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"></span><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; vertical-align: baseline; width: 1px;">Share on Facebook</span></a></li>
<li style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: middle; zoom: 1;"><a class="share-button share-googleplus" data-li-uetrk-click="share-gp" data-share-type="googleplus" href="https://plus.google.com/u/0/share?url=http://www.linkedin.com/pulse/article/20140725080717-109191746-the-bad-side-of-information" role="button" style="border: 0px; box-sizing: border-box; color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"><span style="font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit;"><span aria-hidden="true" class="icon" style="border: 0px; box-sizing: border-box; color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"></span></span><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; text-decoration: none; vertical-align: baseline; width: 1px;">Share on Google Pluse</span></a></li>
<li style="border: 0px; box-sizing: border-box; display: inline-block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: middle; zoom: 1;"><a class="share-button share-twitter" data-li-uetrk-click="share-twtr" data-share-text=""The bad side of information" by @rajasgt on @LinkedIn" data-share-type="twitter" href="https://twitter.com/intent/tweet?&url=http://www.linkedin.com/pulse/article/20140725080717-109191746-the-bad-side-of-information&text=%22The%20bad%20side%20of%20information%22%20by%20%40rajasgt%20on%20%40LinkedIn" role="button" style="border: 0px; box-sizing: border-box; color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"><span class="label" style="border: 0px; box-sizing: border-box; clip: rect(1px 1px 1px 1px); color: #7b539d; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 1px; line-height: inherit; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; position: absolute !important; text-decoration: none; vertical-align: baseline; width: 1px;">Share on Twitter</span></a></li>
</ul>
</div>
<div class="article-body" style="background-color: white; border: 0px; box-sizing: border-box; font-size: 16px; line-height: 24px; margin: 0px; outline: 0px; overflow: hidden; padding: 25px 0px 0px; vertical-align: baseline;">
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-family: inherit; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<img alt="" class="center" data-loading-tracked="true" src="https://media.licdn.com/mpr/mpr/p/7/005/076/322/327c9a7.jpg" style="border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px auto 15px; max-width: 100%; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;" /></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif; font-style: inherit; font-variant: inherit;"> We hear much conflicting information about what we should and shouldn’t be posting online. It’s confusing and unnerving not to know what we can do to protect ourselves.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
Individual responsibility is important, but we are at a stage where it is not sufficient. The problem is much larger than any one individual’s ability to control their personal information, because there are so many new ways every week or every month in which we can be tracked or things can be inferred about us. It’s absolutely unreasonable to expect consumers and citizens, who are all engaged in so many other activities, to also have the ability to continuously update their knowledge about what new tracking method the industry has discovered and to be able to fend it off.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
Right now in India it’s essentially the case that when you post information online, you give up control of it. So there are terms of service which are mandatory under the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 that regulate the sites you use, like on Facebook and Twitter and Pinterest — though those can change — but even within those, you’re essentially handing control of your data over to the companies and implementation of those rules are far fetched. And they can kind of do what they want with it, within reason. You don’t have the legal right to request that data be deleted, to change it, to refuse to allow companies to use it. Some companies may give you that right, but you don’t have a natural, legal right to control your personal data. So if a company decides they want to sell it or market it or release it or change your privacy settings, they can do that.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
According to the rules mentioned above, Sensitive personal data or information of a person means such personal information which consists of information relating to;—</span></h4>
<div style="border: 0px; box-sizing: border-box; color: #4d4f51; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<ol style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(i) password;</span></h4>
</li>
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(ii) financial information such as Bank account or credit card or debit card or</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
other payment instrument details ;</span></h4>
</li>
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(iii) physical, physiological and mental health condition;</span></h4>
</li>
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(iv) sexual orientation;</span></h4>
</li>
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(v) medical records and history;</span></h4>
</li>
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(vi) Biometric information;</span></h4>
</li>
<li style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 5px; outline: 0px; padding: 0px; vertical-align: baseline;"><h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
(vii) any detail relating to the above clauses as provided to body corporate for</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
providing service; and</span></h4>
</li>
</ol>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">(viii) any of the information received under above clauses by body corporate for</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
processing, stored or processed under lawful contract or otherwise:</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
In Europe, users have more of a right to their data, and recently there was a decision in Spain where a man had sued Google because when people searched for him, it was coming up with information about financial problems that he had had a long time ago.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
So in Europe users have legal right over their data in a certain way, but its not the scenario in many of the countries. There should be more stringent rules regulating this thin line where companies are using user data for their profit.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
People should be made more aware about the kind of information they share and the information which is going to form part of the database by the companies for their profits. Now a days one just cannot foresee that who, when and where his information is going to be used and for what purpose. It is advisable to think 10 times before putting out any information on the internet, because once it is there it is beyond your control.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
This information we give out is going to get into the hands of companies, governments, and could potentially be used in evil ways. I don’t think not using the services provided by the intermediaries (Body Corporates) is the solution to that. The only solution is a legal one where people have control over how their data is used and there are limitations and real regulation on data brokers and other companies that have this data, we need the amendment which regulates every minute aspect of information and we need it fast.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">
If an intermediary fails to protect your Sensitive personal data/information then you have a remedy in the form of a Complaint before the Hon'ble Adjudicating Officer of the respective state.</span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="border: 0px; box-sizing: border-box; font-family: Georgia, Times New Roman, serif; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">Website - <a href="http://www.netlawgic.com/">www.netlawgic.com</a></span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: Georgia, Times New Roman, serif;">LinkedIn - <a href="http://in.linkedin.com/in/rajaspingle/">in.linkedin.com/in/rajaspingle/</a></span></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, 'Times New Roman', serif; font-style: inherit; font-variant: inherit; font-weight: inherit;">Facebook - </span><a href="https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline" style="font-family: Georgia, 'Times New Roman', serif; font-style: inherit; font-variant: inherit; font-weight: inherit;">https://www.facebook.com/pages/Cyber-Crime-Awareness/246665595391183?sk=timeline</a></strong></h4>
<h4 style="border: 0px; box-sizing: border-box; color: #333333; font-size: 20px; font-style: inherit; font-variant: inherit; font-weight: normal; line-height: 26px; margin: 0px 0px 30px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;">Disclaimer: This does not constitute a legal opinion and would not create Attorney-Client relationship. This article is only for education and awareness purpose and merely a possible interpretation of the law. Image copyrights are with the respective owner.</span></strong></h4>
<div>
<strong style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><span style="font-family: Georgia, Times New Roman, serif;"><br /></span></strong></div>
<ol style="border: 0px; box-sizing: border-box; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 0px 0px 30px 40px; outline: 0px; padding: 0px; vertical-align: baseline;">
</ol>
</div>
</div>
</div>
</div>
Rajashttp://www.blogger.com/profile/08116800364061650410noreply@blogger.com0