2. Bullying is used to humiliate, threaten, oppress,
torment, and tyrannize someone. It can be
defined as a continuous misuse of power or
authority against a person or a group of people
that causes physical, emotional, and social harm
to that person or group. If this kind of attitude
and behavior happens online, it is called
cyberbullying.
3. With over 100 million
users of smart phones in
Pakistan, Pakistan has been
included in the list of the
fastest growing countries
that are using internet
which only open the doors
for the fact that cyber
bullying is increasing as
well, yet there isn’t any
legislation for cyber crimes
in Pakistan.
4. Harassment: Repeatedly sending offensive, rude, and insulting
messages
Denigration: Distributing information about another that is
derogatory and untrue through posting it on a Web page,
sending it to others through email or instant messaging, or
posting or sending digitally altered photos of someone
Flaming: Online "fighting" using electronic messages with
angry, vulgar language
Impersonation: Breaking into an email or social networking
account and using that person's online identity to send or
post vicious or embarrassing material to/about others.
Outing and Trickery: Sharing someone's secrets or
embarrassing information, or tricking someone into revealing
secrets or embarrassing information and forwarding it to
others
Cyber Stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating, or engaging in
other online activities that make a person afraid for his or
her safety (depending on the content of the message, it
may be illegal)
Common Forms of Cyber Bullying
5. In Pakistan it seems that women are the easiest targets to be
bullied online, because the National Response Center for Cyber Crimes
(NR3C) does not have any legislation for cyber crimes such as hacking
and online stalking, there were several incidents that faced women
regarding these issues.
6.
7. Whoever with malicious intent gains unauthorized access to
any information system or data shall be punished with
imprisonment for a term which may extend to six months or
with fine which may extend to one hundred thousand rupees
or with both
• Cyber terrorism:
(a) the use or threat is designed to
coerce, intimidate, overawe or create
a sense of fear, panic or insecurity in
the Government or the public or a
section of the public or community or
sect or create a sense of fear or
insecurity in society; or
• (b) the use or threat is made for
the purpose or motive of advancing a
religious, ethnic or sectarian
cause; shall be punished with
imprisonment of either description for
a term which may extend to fourteen
years or with fine which may extend
to fifty million rupees or with both.
8. You Can be Randomly Picked Up by LEAs
LEAs Can Come and Confiscate Your Laptop/Mobile or
anything They Want
Your Website Can Get Blocked, if Someone
Thinks its immoral
Spamming Can Cause You a Fine of Rs. 1 Million
Publishing a Meme on Facebook can Fine you With Rs. 1
Million
9. How to prevent cyberbullying:
Teenagers should take the effort to educate themselves on proper
“Internet etiquette.” This includes the proper use of emails, texts
and other forms of electronic messaging. Many negative posts or
messages sent online may simply have been sent accidentally or
misinterpreted, leaving either the sender, the receiver, or both
embarrassed, humiliated, hurt, or harassed.
1. Use Computer Courtesy:
Whether sending an email, chatting in a chat room, or speaking in a
forum, it is important to be courteous and respectful of others
onlineone should treat others the way he or she would like to be
treated. Likewise, just as you treat others with respect in the real
world, it is important that you apply these same basic rules online
as well.
10. 4. Keep Personal Information Private:
Posting private and personal information
in the wrong locations can have serious
consequences. Identity theft is a rapidly
growing concern and divulging too much
information could give predators and
those with bad intentions valuable
information about yourself. When you
post your personal information on sites
such as Facebook, Twitter, and other
social networking sites, it is best to
restrict your privacy settings so that
only your friends can view personal
information. If private information is
posted in a group setting, read the
guidelines prior to posting to ensure that
such information will not be disclosed to
others.
2. Think Before Posting:
. Remember that once entered into the
Internet, online messages, posts, pictures,
or videos, will remain there forever, and
can be viewed by a massive, unknown
online audience. With cyberbullying, one
cannot just turn off the computer and
expect everything to return back to
normal. Even if the victim disconnects
himself from the Internet or other
electronic devices, cyberbullying can weave
itself back into the victim’s school,
workplace, or home environment.
11. Password Safety
1. Never, ever give your password on Facebook, MySpace, Aim, network, email, or
any similar service or cell phone unlock code to a friend. Friendships sometimes don’t
last, and that password or PIN can be used against you.
2. Remember your secret answer. When you create an online account, and it asks
you to provide an accurate answer to a question you should know ‐ don’t treat it
lightly or as a joke. Make sure it’s something you will remember months and years
from now in case you have a problem at that time.
3. Do not use passwords based on personal information (your login name, birthdate,
address, phone number, middle name, pet’s name, etc.).
4. Use a mixture of upper and lowercase letters, numbers, and nonalphabetic
characters (symbols) if possible.
12. . Help New Internet Users:
Everyone was an Internet “newbie” at one
time. Many children and teen users that
gain access to social networking sites,
electronic devices, or the Internet for the
first time are unaware about how dangerous
these devices can be if abused or used
inappropriately. Although it is normal to be
excited about connecting with all of your
friends and classmates online, please be
mindful of the fact that there are others
on the Internet that abuse their privileges.
You’ve been told “don’t talk to strangers.”
Well, people you meet on the Internet are
strangers. Other than friends you know in
“real life,” people online are not classified as
friends.
Never agree to meet an online friend in
person. If someone asks to meet you, talk
to your parents about it.
Do not lie about your age so you can go
somewhere on the Internet that is for
adults only.
Do not spend excessive time on the
computer. You should partake in other
activities, exercise, and set aside time for
leisure.
Something you see on the Internet might
make you uncomfortable or confused. Tell
your teacher or parent right away.
13. Be Aware of What Your Kids are Doing Online
Talk with your kids about cyberbullying and
other online issues regularly.
Know the sites your kids visit and their
online activities. Ask where they’re going,
what they’re doing, and who they’re doing it
with.
Tell your kids that as a responsible parent
you may review their online communications
if you think there is reason for concern.
Installing parental control filtering software
or monitoring programs are one option for
monitoring your child’s online behavior, but
do not rely solely on these tools.
Have a sense of what they do online and in
texts. Learn about the sites they like. Try
out the devices they use.
Ask for their passwords, but tell them you’ll
only use them in case of emergency.
Ask to “friend” or “follow” your kids on
social media sites or ask another trusted
adult to do so.
Encourage your kids to tell you immediately
if they, or someone they know, is being
cyberbullied. Explain that you will not take
away their computers or cell phones if they
confide in you about a problem they are
having.
14. 8. Be An Active Bystander:
Bystanders play a key role in stopping and preventing cyberbullying. Cyberbullies depend on
bystanders to support them or do nothing to stop them. The real leaders are those who choose to
take an active role when they witness bullying and decide not go along with the crowd.
If you witness cyberbullying, do not join in, nor stand by idly.
Document if you see cyberbullying online, and when
Don’t encourage the behavior, it is easy to fall under the peer pressure, but stand up for yourself!
Don’t forward hurtful messages
Don’t laugh at inappropriate jokes
Tell an adult they trust
Do not support cyberbullies, stand up for what is right and report cyberbullying cases to reliable
sources – “report center”.
Educate yourself on effective preventative measures you can take
15. What to do if you are a cyberbullying victim:
. You CANNOT Just Turn Off the Computer:
Those who do not completely understand the
phenomenon often wonder, “What’s the big deal?
Why don’t kids just turn off their computers?”
However, those who make this statement do not
realize that the process is not so simple. There
are a number of reasons why “clicking the exit
button” or “turning off the computer” simply
aren’t viable options for those being cyberbullied.
First, why should a victim be required to
interrupt an online experience because of someone
else’s maliciousness? It is not appropriate to
blame the victim for another’s aggressive actions.
No one should have to turn off his or her
computer due to harassment received online, just
like no one should avoid going to school because
of school bullying.
Cyberbullying can continue regardless of whether
the target is online. For example, a bully could
set up a defamatory Web page or spread rumors
via social networking sites. Unfortunately,
mistreatment still continues and the bully
perpetuates his assaults and cruelty, even when
the victim is offline.
16. Ignore CyberBullies:
Do not reply to his or her posts,
texts, etc. Along these same lines,
teens that experience cyberbullying
online are encouraged to keep a log
of journal of all their experiences.
Note specific incidents with as much
detail as possible, including who was
involved, where and when it
happened, how they responded, who
witnessed the incident, and what
was done to prevent its
reoccurrence. If the cyberbullying is
supplemented with bullying offline,
be sure to record all of these
activities as well.
3. Protect Yourself:
Block the cyberbully on social
networking sites, emails, electronic
devices, and so on. The less contact
you have with the cyberbully, the less
damage he or she can do
Change your emails, screen names, or
other usernames that the cyberbully is
contacting you via. Take care in giving
them out to family and friends whom
you know you can trust, so that you
will not need to worry about receiving
additional antagonizing messages from
those who are cyberbullying you.
Keep your social networking profiles on
private: make sure not to add anyone
you do not know or do not trust to
your profile
17. . Educate Yourself About Cyberbullying
It is important, and in some cases required, that schools educates their
students and staff on a regular basis regarding the nature, and
consequences of, and prohibitions and penalties associated with, all forms
of cyberbullying, and bullying, so that constant and updated awareness of
the problem is promoted. Education should occur through the attendance
of training workshops and seminars, as well as formalized continuing
education initiatives for all members of the school community. Educate
yourself on cyberbullying prevention strategies!
Notas del editor
Cyber bullying can take many forms. However, there are six forms that are the most common.*
Unauthorized access to critical infrastructure information system or data: Whoever with malicious intent gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment upto three years or with fine which may extend to one million rupees or with both.
If you are wondering what this “Critical Infrastructure” is, then here’s how it is defined in the bill:
“critical infrastructure” includes the infrastructures so designated by any Government in Pakistan and such other assets, systems and networks, whether physical or virtual, so vital to the State or its organs including judicature that their incapacitation or destruction may have a debilitating effect on national security, economy, public health,safety or matters related thereto;
Section 5: Unauthorized access to critical infrastructure information system or data:
Whoever with malicious intent gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment upto three years or with fine which may extend to one million rupees or with both.
https://propakistani.pk/2015/04/17/see-what-cyber-crime-law-can-do-to-you-a-must-read-for-all-internet-users-in-pakistan
Expedited Preservation of data.
(1) If an investigating officer is satisfied that
(a) data stored in any information system or by means of an information system, is reasonably required for the purposes of a criminal investigation; and
(b) there is a risk or vulnerability that the data may be modified, lost, destroyed or rendered inaccessible, the investigating officer may, by written notice given to a person in control of the information system, require the person to ensure that the data specified in the notice be preserved and the integrity thereof is maintained for a period not exceeding ninety days as specified in the notice.
Here are reason that PTA can give to block a website if its content is:
Against Islam or its integrity,
Against security or defence of Pakistan
Against friendly relations with foreign states
Against a public order
If content is indecent or immoral
Or if it incites an offenc
(2) The period provided in sub-section (1) for preservation of data may be extended by the Magistrate if so deemed necessary upon receipt of an application from the investigating officer in this behalf.
Section 7: Criminal Interference with critical infrastructure information system or data:
Whoever with malicious intent and without authorization interferes with or damages, or causes to be inferred with or damaged, any critical information system or any part thereof, or critical infrastructure data or any part thereof, shall be punished with imprisonment which may extend to seven years or with fine which may extend to five million rupees or with both
1) No person whether a police officer, investigation officer or otherwise, other than an investigating officer of the special investigation agency shall investigate an offence under this Act:
Provided that the Federal Government or the Provincial Government may, as the case may be, constitute joint investigation team comprising of the officers of special investigation agency and any other law enforcement agency including Police for investigation of events involving commission of offences under this Act and any other law for the time being in force.
(2) No person other than a prosecutor designated as such by the special investigating agency shall prosecute any offence under this Act.
. In any circumstance, no matter how simple, Internet users can observe the Golden rule: It is important to note that what is posted online today may come back and haunt the writer tomorrow or later in the future. That silly or funny photograph posted on a social networking site may preclude job acquisition for that person years later. Many colleges and employers are now searching social networking sites prior to hiring
Never give out personal information about yourself, your family or your friends, no matter how well you think you know your cyberpals. This includes names, addresses, telephone numbers, school locations and names, and not even which city you live in. Be careful who you send pictures to, as well as monitor and ensure your password safety.
5. Change your password often. It takes time and is a bit of a chore, but do it anyway. It takes more time and is more of a chore to try to recover from a hacked account or from identity theft.
6. Never provide your password over email or in response to an email request.
7. Make your own acronym by creating a phrase that means something to you, and group together the first letter of each word. Use numbers and symbols when you can. Make sure the acronym you create has at least seven characters. For example:
• “Last week I fell down thirty stairs” (Lw1fd30$)• “It’s 3 AM, I must be lonely” (I3amimbL)• “My boyfriend got me a dog for Christmas” (mBFgm@d4C)• Use short words separated by characters (d0g%d00r, c@ndystr1p).
8. Do not place a written copy of your password on the side of your monitor, under your keyboard, under your mouse pad, etc. Figure out a secure place where you can store the passwords you write down – or, if possible – never write down any passwords; it is best to commit them to memory.
Do not do anything on the Internet that may cost money without your parent’s permission. Never give out credit card information.
If you are upset or angry about something, do not use the Internet to vent your feelings. Go to a friend, a relative, or teacher you are comfortable talking to instead.
Passwords must be kept secret from everyone but your parents.
Many teens who are cyberbullied online are often overwhelmed by the emotional pain due to either the continuity, or intensity of the harassment. Therefore, responding to the cyberbully’s attacks in a productive manner often seems extraordinarily difficult. The anticipatory anxiety often prevents a teenager from reporting the bully. Since the distress seems unbearable, the victim cannot muster up the strength to confide in a trusted adult. Of course, there is always a fear that a victim may be labeled a “tattletale” or a “snitch.” However, if the victim attempts to cope with the bullying without external assistance, the intensity and frequency of the bullying online may increases, which usually exacerbates the pre-existing situation. Victimized adolescents first must realize that they are not to blame for the way they have been treated. NO ONE deserves to be harassed in any environment, whether it is on the Internet or in the real world. Effective strategies can be implemented to help fend off cyberbullies.
1
An effective and simple response is to not respond, interact, or engage with cyberbullies. However, this is not as easy as it sounds. It’s natural to elicit a defensive response and attempt to deal some “well-deserved” payback on the cyberbully. Many cyberbullies simply crave attention; it does not matter what type of attention they receive, whether it be positive or negative, as long as they can provoke someone into paying them the attention they desire. It is similar to a 2-year-old child throwing a temper tantrum to get attention from a parent: once the child’s needs are catered to, he or she will continue to act in the same manner in the future.
. Do not leave the bully un-blocked just so that you can get another response later or to inflict some source of payback on the cyberbully. This is only inviting the cyberbully to continue, and you do not have to stoop down to their level! Block the individual from having communications with you as best as you can. It is imperative that cyberbullying victims take swift action if the cyberbullying incidents continue or escalate in gravity. Teenagers must learn to exercise due diligence in reducing their vulnerability to online aggression.