SlideShare a Scribd company logo
1 of 3
 HYPERLINK 
http://www.neerajaarora.com/hi-tech-peeping-toms-a-man-with-tiny-digicam-had-%e2%80%98wrong-click%e2%80%99/
 Hi-Tech Peeping Toms- A Man with Tiny Digicam had wrong click A new phenomenon of video voyeurism also known as cyber peeping has emerged in recent times where images of private area of an individual are captured without his knowledge and then transmitted widely without his consent thus violating privacy rights. Video Voyeurism is the act of secretly or discreetly photographing certain parts of the body mostly unclothed without the person’s consent. Video voyeurism typically refers to up-skirt or down-blouse images taken of women without their consent. We have seen the rise in the cases of video voyeurism, where the victims have been clicked without ever knowing that they have been clicked revealing their private parts. The phenomenal growth of the internet and its user, mostly of the younger age has given rise to this up-skirt and down-blouse photography which one can view easily at host of video voyeurism websites. The voyeurs who are psychopath to satisfy their lust see surreptitious video surveillance as a form of high-tech hunting and take pride in showcasing their talent in various video voyeurism Web sites which has mushroomed at the World Wide Web and mostly go free taking shelter under the current gap in the law. The Acts of video voyeurism are not only an invasion of a person’s privacy, but are also a serious threat to the liberties of a free society as we know and also against our high moral & cultural values or ethos. These criminal activities undermine the most basic levels of privacy to which every citizen is entitled.  Realizing the ever growing menace of the Video Voyeurism, the USA, passed federal legislation known as the Video Voyeurism Prevention Act of 2004, which prohibits knowingly capturing an image of private area of an individual by video tape, photograph, film, or any means or broadcast without that individual consent and under circumstances in which the individual has a reasonable expectation of privacy. Thus the said law, make it a crime to secretly record or distribute images of people in places where they have a reasonable expectation of privacy, such as bathrooms, dressing rooms, locker rooms, hotel rooms and mall etc. The law defines a 
private area
 as the naked or undergarment clad genitals, pubic area, buttocks, or female breast of an individual. The law however makes an exception and does not apply to people engaged in lawful law enforcement or intelligence activities. The relevant section 1801 of ˜Video Voyeurism Prevention Act of 2004 states:   1801. Video voyeurism  Whoever, in the special maritime and territorial jurisdiction of the United States, has the intent to capture an image of a private area of an individual without their consent, and knowingly does so under circumstances in which the individual has a reasonable expectation of privacy, shall be fined under this title or imprisoned not more than one  year, or both.  In this section  (1) the term capture, with respect to an image, means to videotape, photograph, film, record by any means, or broadcast;  (2) the term broadcast means to electronically transmit a visual image with the intent that it be viewed by a person or persons;  (3) the term a private area of the individual means the naked or undergarment clad genitals, pubic area, buttocks, or female breast of that individual;  (4) the term female breast means any portion of the female breast below the top of the areola; and  (5) the term under circumstances in which that individual has a reasonable expectation of privacy means  (A) circumstances in which a reasonable person would believe that he or she could disrobe in privacy, without being concerned that an image of a private area of the individual was being captured; or  (B) circumstances in which a reasonable person would believe that a private area of the individual would not be visible to the public, regardless of whether that person is in a public or private place.  (c) This section does not prohibit any lawful law enforcement, correctional, or intelligence activity. India followed the US Legislation in proposed amendment to IT Act, 2000  In India also, we have seen increasing incidents of video voyeurism due to advance technology that has made today’s hidden cameras tiny, sleek and adapted for WiFi connections to make transfer of the captured film or movie clip to the web easier and faster. Internet is a product of US Technology, so issues relating to Internet are heavily flavored by US Constitutional and Legal doctrines. The legislature was aware of this problem and there was no stringent law to specifically deal with the menace of video voyeurism which was rampant due to modern technology. The amendment proposed to the IT Act, inserted a new Section 66E which specifically addresses video voyeurism which is inspired by the Video Voyeurism Prevention Act of 2004 of US. The wordings of proposed Section 66E which makes this sort of cyber peeping a felony is as under:  66E Punishment for violation of privacy.   Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with  imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both Explanation. - For the purposes of this section–  (a) means to electronically send a visual image with the intent that it be viewed by a person or persons;  (b) with respect to an image, means to videotape, photograph, film or record by any means;  (c) private area means the naked or undergarment clad genitals, pubic area, buttocks or female breast;  (d) publishes means reproduction in the printed or electronic form and making it available for public;  (e) under circumstances violating privacy means circumstances in which a person can have a reasonable expectation that–  (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or  (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.  This provision will protect against voyeurs who destroy personal privacy and dignity by secretly videotaping or photographing unsuspecting individuals. This new provision, with its stringent punishment, will no longer allow these crimes to fall through the cracks of our legal system. Law enforcement will now have the ability to swiftly provide justice to the victims of Video Voyeurism and book those found guilty of these heinous acts. This is crucial provision to protect individuals from violations of the privacy they have every right to expect. Hopefully, it will not only to punish offenders but also would deter anyone contemplating these crimes.   HYPERLINK 
http://www.neerajaarora.com/
 Neeraj Aarora (Advocate)
Hi Tech Peeping Toms  A Man With Tiny Digicam Had Wrong Click
Hi Tech Peeping Toms  A Man With Tiny Digicam Had Wrong Click

More Related Content

More from Neeraj Aarora

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesNeeraj Aarora
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examinerNeeraj Aarora
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj Aarora
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj Aarora
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj Aarora
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj Aarora
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenarioNeeraj Aarora
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...Neeraj Aarora
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYNeeraj Aarora
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessNeeraj Aarora
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 

More from Neeraj Aarora (14)

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_studentsNeeraj aarora cyber_lawyer_internet_safety_strategies_for_students
Neeraj aarora cyber_lawyer_internet_safety_strategies_for_students
 
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patentsNeeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
Neeraj aarora cyber_lawyer_internet_crime_-_law_and_patents
 
Neeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic auditNeeraj aarora cyber_lawyer_forensic audit
Neeraj aarora cyber_lawyer_forensic audit
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
Neeraj aarora cyber_lawyer_article - uncitral arbitration rules, 2010
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Hi Tech Peeping Toms A Man With Tiny Digicam Had Wrong Click

  • 1. HYPERLINK http://www.neerajaarora.com/hi-tech-peeping-toms-a-man-with-tiny-digicam-had-%e2%80%98wrong-click%e2%80%99/ Hi-Tech Peeping Toms- A Man with Tiny Digicam had wrong click A new phenomenon of video voyeurism also known as cyber peeping has emerged in recent times where images of private area of an individual are captured without his knowledge and then transmitted widely without his consent thus violating privacy rights. Video Voyeurism is the act of secretly or discreetly photographing certain parts of the body mostly unclothed without the person’s consent. Video voyeurism typically refers to up-skirt or down-blouse images taken of women without their consent. We have seen the rise in the cases of video voyeurism, where the victims have been clicked without ever knowing that they have been clicked revealing their private parts. The phenomenal growth of the internet and its user, mostly of the younger age has given rise to this up-skirt and down-blouse photography which one can view easily at host of video voyeurism websites. The voyeurs who are psychopath to satisfy their lust see surreptitious video surveillance as a form of high-tech hunting and take pride in showcasing their talent in various video voyeurism Web sites which has mushroomed at the World Wide Web and mostly go free taking shelter under the current gap in the law. The Acts of video voyeurism are not only an invasion of a person’s privacy, but are also a serious threat to the liberties of a free society as we know and also against our high moral & cultural values or ethos. These criminal activities undermine the most basic levels of privacy to which every citizen is entitled. Realizing the ever growing menace of the Video Voyeurism, the USA, passed federal legislation known as the Video Voyeurism Prevention Act of 2004, which prohibits knowingly capturing an image of private area of an individual by video tape, photograph, film, or any means or broadcast without that individual consent and under circumstances in which the individual has a reasonable expectation of privacy. Thus the said law, make it a crime to secretly record or distribute images of people in places where they have a reasonable expectation of privacy, such as bathrooms, dressing rooms, locker rooms, hotel rooms and mall etc. The law defines a private area as the naked or undergarment clad genitals, pubic area, buttocks, or female breast of an individual. The law however makes an exception and does not apply to people engaged in lawful law enforcement or intelligence activities. The relevant section 1801 of ˜Video Voyeurism Prevention Act of 2004 states: 1801. Video voyeurism Whoever, in the special maritime and territorial jurisdiction of the United States, has the intent to capture an image of a private area of an individual without their consent, and knowingly does so under circumstances in which the individual has a reasonable expectation of privacy, shall be fined under this title or imprisoned not more than one year, or both. In this section (1) the term capture, with respect to an image, means to videotape, photograph, film, record by any means, or broadcast; (2) the term broadcast means to electronically transmit a visual image with the intent that it be viewed by a person or persons; (3) the term a private area of the individual means the naked or undergarment clad genitals, pubic area, buttocks, or female breast of that individual; (4) the term female breast means any portion of the female breast below the top of the areola; and (5) the term under circumstances in which that individual has a reasonable expectation of privacy means (A) circumstances in which a reasonable person would believe that he or she could disrobe in privacy, without being concerned that an image of a private area of the individual was being captured; or (B) circumstances in which a reasonable person would believe that a private area of the individual would not be visible to the public, regardless of whether that person is in a public or private place. (c) This section does not prohibit any lawful law enforcement, correctional, or intelligence activity. India followed the US Legislation in proposed amendment to IT Act, 2000 In India also, we have seen increasing incidents of video voyeurism due to advance technology that has made today’s hidden cameras tiny, sleek and adapted for WiFi connections to make transfer of the captured film or movie clip to the web easier and faster. Internet is a product of US Technology, so issues relating to Internet are heavily flavored by US Constitutional and Legal doctrines. The legislature was aware of this problem and there was no stringent law to specifically deal with the menace of video voyeurism which was rampant due to modern technology. The amendment proposed to the IT Act, inserted a new Section 66E which specifically addresses video voyeurism which is inspired by the Video Voyeurism Prevention Act of 2004 of US. The wordings of proposed Section 66E which makes this sort of cyber peeping a felony is as under: 66E Punishment for violation of privacy. Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both Explanation. - For the purposes of this section– (a) means to electronically send a visual image with the intent that it be viewed by a person or persons; (b) with respect to an image, means to videotape, photograph, film or record by any means; (c) private area means the naked or undergarment clad genitals, pubic area, buttocks or female breast; (d) publishes means reproduction in the printed or electronic form and making it available for public; (e) under circumstances violating privacy means circumstances in which a person can have a reasonable expectation that– (i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or (ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place. This provision will protect against voyeurs who destroy personal privacy and dignity by secretly videotaping or photographing unsuspecting individuals. This new provision, with its stringent punishment, will no longer allow these crimes to fall through the cracks of our legal system. Law enforcement will now have the ability to swiftly provide justice to the victims of Video Voyeurism and book those found guilty of these heinous acts. This is crucial provision to protect individuals from violations of the privacy they have every right to expect. Hopefully, it will not only to punish offenders but also would deter anyone contemplating these crimes. HYPERLINK http://www.neerajaarora.com/ Neeraj Aarora (Advocate)