SlideShare a Scribd company logo
1 of 29
KERALA STATE COMMISSION FOR PROTECTION OF CHILD RIGHTS
Expert Consultation on Legislative and Executive Action to Improve
Security of Children in Cyber Space.
Karnika Seth
Cyberlaw Expert & Partner,
Seth Associates
© SethAssociates, 2014All Rights Reserved
Protecting Children
in cyberspace
•93% of teens (12-17) go online
•75% of teens (12-17) have cell phones
•1 in 3 teens (12-17) have experienced online
harassment.
•73% of teens (12-17) have profiles on social
networking sites.[
•97% of teens (12-17) play computer, web,
portable, or console games
•4% of cell-owning teens (12-17) say that they
have sent sexually suggestive nude/semi-nude
messages to others via text message.
•93% of teens (12-17) go online
•75% of teens (12-17) have cell phones
•1 in 3 teens (12-17) have experienced online
harassment.
•73% of teens (12-17) have profiles on social
networking sites.[
•97% of teens (12-17) play computer, web,
portable, or console games
•4% of cell-owning teens (12-17) say that they
have sent sexually suggestive nude/semi-nude
messages to others via text message.
Source: Lenhart A. Social
Media and Young Adults.
Pew Internet and
American Life Project,
2010.
Children using Internet-2013
Types of Cyber crimes
 Credit card frauds
 Cyber pornography
 Sale of illegal articles-narcotics, weapons, wildlife
 Online gambling
 Intellectual Property crimes- software piracy, copyright
infringement, trademarks violations, theft of computer
source code
 Email spoofing
 Forgery
 Defamation
 Cyber stalking (section 509 IPC)
 Phising
 Cyber terrorism Crime against persons
Crime against Government
Crime against property
Internet & Child Exploitation
 Internet addiction
• Cyber bullying
• Cyber stalking
• Child pornography
• Child abuse
• Identity theft cases
• Cheating & fraud
• Lured into criminal activities
• Theft of personal information
 Blackmail and harassment frauds
 Child Extortion
General concerns for children online
May inadvertently or intentionally access adult pornographic or
violent material
Links or emails with innocent subjects that actually contain
pornography
Links contain malware –keyloggers that steal personal information
Children being approached or observed in chat rooms
Children’s identities, location or vulnerability being sourced from
material available online
Social networking sites may introduce child pornography, cyber
harassment or stalking .
Internet is becoming an addiction if unsupervised
Exploitation of children on Internet –Gaps &
challenges
•TECHNICAL-Anonymity exists on
internet-criminals prefer this medium
•Nature of internet such , automatic ads
or popups
•Virus floats quickly
•Easy access-no geographic limitations-
quantity huge
•SOCIOLOGICAL_Difference in
cultures across globe-all types of content
available
•Gaps in definition of adulthood across
countries
•Increased generation gap
•Internet addiction
•Commercial trading ,
Peer-to-peer networks
LEGAL-Lack of awareness of do’s and
don’ts on internet
•Low conviction rate
Strategies to meet Challenges
• TECHNICAL-Blocking automatic popups which are inappropriate
• Using strong antivirus
• Frequent change of passwords
• Use of protection settings and software such as Netnanny,etc
• Role of govt bodies/ ISPs /NGOs in reporting child abuse /child
pornography
• Blocking of illegal websites by CERT
• SOCIAL-
• Encourage reporting of child abuse cases
• Allow internet use for limited hours and under supervision
• Act as friend to your child
• Checking webhistory files
• school workshops,role of school counsellor
Strategies to meet Challenges
• Involve NGOs on reporting child abuse
• Set up Rehabilitation centres for victims
LEGAL- create cyberawareness of rights and duties in
cyberspace
Setting up helpline for reporting abuse
Punish the offenders of law
Storage of logs-no time period prescribed by central govt
Sign a cybercrime convention for effective extradition of
criminals abroad
Police & Media to adopt a child centric approach
International instruments on child
protection
 Convention on the Rights of the Child (1989)
●● Optional Protocol to the Convention on the Rights of the Child on the sale of
children, child prostitution and child pornography (OPSC, 2000)
●● Protocol to Prevent, Suppress and Punish Trafficking against Persons,
Especially Women and Children, supplementing the United Nations
Convention against Transnational Organized Crime (‘Palermo Protocol’, 2000)
●● Council of Europe Convention on Cybercrime (2001)
●● Council of Europe Convention on the Protection of Children against Sexual
Exploitation and Sexual Abuse (2007)
In India, IT Act,2000 deals with safety of children in the online
environment.
Cybercrimes under Information Technology Act,2000
Hacking –
Section 66
Sending of
offensive false
messages(s.66
A)
Identity theft
(s. 66C)
Cheating by
personation
(s.66D)
Violation of
privacy (s.66E)
Cyber terrorism
(s.66F)
Publishing
sexually explicit
content(s. 67A)
Child
pornography
(s.67B)
Stolen computer
resource(s.66B)
Attempt to
commit an
offence (s.84C)
Abetment to
commit an
offence(s.84B)
Publishing
obscene material
(Section 67)
Types of child pornography offences
( section 67B)
 View
 View + collect child pornography
 View, collect + distribute+publish+transmit+causes to be published or
transmits child pornography
 View, collect and distribute child pornography +
download+exchange+advertises+promotes commit contact offences
 View, collect and distribute child pornography, commit contact offences +
produce child pornography
 Facilitate abusing children online
 Records own abuse or of others pertaining to sexually explicit act with
children-
 Punishable with imprisonment of 5 years and fine upto 10 lacs
 Blocking of illegal websites –Section 69A IT Act,2000
Cyber café Rules,2011
Maintenance of log register
Photo identity card requested
Minor without photo identity card to be accompanied by an
adult
History of websites accessed by a user kep by café for one
year
Computers in café equipped with commercially available
filtering software to avoid acess to child pornography or
obscene content
Board declaring computers not to be used for illegal activity
to be displayed
Regular inspections of cybercafes
Case studies
DPS MMS case (Bazee.com)
Adnan murder case-orkut case
Noida MMS scandal
Air force Bal Bharati School case
According to latest NCRB statistics in 2012 there were 589 cases
registered under IT Act & IPC dealing with transmitting obscene
information and 497 persons were arrested in India
http://ncrb.nic.in/
The Noida MMS Scandal
 In February 2009, an MBA student in
Noida a boy circulated video clip of his 23
-year-old-girlfriend doing striptease for
him to his classmates using the girl's e-mail
id.
 After the girl refused to marry him, the
boy who had access to the girl's mail id and
circulated that MMS clip to fellow
students.
 Police registered a case of criminal
intimidation following a complaint filed by
the girl's family
Air force Bal Bharati School
Air force Bal Bharati School case , Delhi; class(XII)
student created pornographic site as revenge against his
classmates (girls) and posted pornographic images of his
classmates and lady teachers on internet. He was then
suspended by school and arrested by Police under IPC
and IT Act; though Juvenile Court allowed his bail
thereafter.
Possible reliefs to a cybercrime
victim- strategy adoption
 A victim of cybercrime needs to immediately report the matter to his local
police station and to the nearest cybercrime cell
 Depending on the nature of crime there may be civil and criminal remedies.
 In civil remedies , injunction and restraint orders , blocking of websites, may
be sought, together with damages, delivery up of infringing matter and/or
account for profits.36 hr deadline for blocking or approach court.
 Call police helpline
 In criminal remedies, a cybercrime case will be registered by police if the
offence is cognisable and if the same is non cognisable, a complaint should be
filed with metropolitan magistrate
 For certain offences, both civil and criminal remedies may be available to the
victim
Before lodging a cybercrime case
Important parameters-
Gather ample evidence admissible in a court of law
Fulfill the criteria of the pecuniary ,territorial and subject matter
jurisdiction of a court.
Determine jurisdiction – case may be filed where the offence is
committed or where effect of the offence is felt ( S. 177 to 179,
Crpc)
Preparation for prosecution
 Collect all evidence available & saving snapshots of evidence
 Seek a cyberlaw expert’s immediate assistance for advice on preparing for
prosecution
 Prepare a background history of facts chronologically as per facts
 Pen down names and addresses of suspected accused.
 Form a draft of complaint and remedies a victim seeks
 Cyberlaw expert & police could assist in gathering further evidence e.g tracing
the IP in case of e-mails, search & seizure or arrest as appropriate to the
situation
 A cyber forensic study of the hardware/equipment/ network server related to
the cybercrime is generally essential
Precautions for online safety -Secure online
connections
Install and keep up-to-date anti-virus, anti-spyware, and
firewall
Microsoft Malicious Software Removal Tool http://www.microsoft.com/downloads/details.aspx?
FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en
CCleaner (Free) http://www.ccleaner.com/download/
Anti-Spyware – A-Squared (free) http://download5.emsisoft.com/a2FreeSetup.exe
AVG Free http://free.grisoft.com/
Use Commercial Web Filtering Software
Free - http://www.k9webprotection.com/
Net Nanny (2007 best) http://www.netnanny.com/
Check internet cache
@winspy (free) http://www.acesoft.net/winspy
Spector Pro to track everything done on a PC
http://www.spectorsoft.com/products/SpectorPro_Windows
Useful softwares
Monitoring Software
Spectorsoft.com or 1-888-598-2788
Safety-net.info or 1-800-513-1916
Software4Parents.com or 1-866-345-8371
PCmagazine.com (search “parental monitoring”)
Enabling protection through filters-
IE browser protection
Enabling protection through filters-
IE browser protection
4. Select filter settings for the categoriSelect filter settings for
the categories shown: Language, Nudity, Sex, Violence. The
further right you push the slider, the more content is
allowed.
5. Click on the Approved Sites tab. Here you can type in any
specific websites that you might want to be treated
specially. You can come back and change this list later,
perhaps after feedback from your family.
'Approved Sites' list
6. Navigate to the General tab, and click on Create Password.
This will set you up as Administrator, and prevent other
users from altering the Content Advisor settings.
Change the Rating Settings to block types of content
 es shown: Language, Nudity, Sex, Violence. The further right
you push the slider, the more content is allowed.
Change the Rating Settings to block types of content
Enabling protection through filters-
IE browser protection
The ten commandments of child protection
in cyberspace-
1. Rules from “real” life apply: courtesy, kindness, modesty,
dignity, respect for the law and for others, etc.
2. Don’t talk to strangers
3. Keep your private information private
4. Never agree to meet an online friend without your parents
5. There are no guarantees that what you say or post on the
Internet is private
The ten commandments of child protection
in cyberspace-
6. Information (including photos, videos, etc.) posted on the
Internet can last forever
7. Tell your parents if you encounter something uncomfortable
8. Don’t reply to unknown screen names on IM
9. Never open e-mail from strangers or click on any attachments
10. Find the “good” online – good friends, good Web sites, good
games – and enjoy
Do’s and dont’s- bestpractices on
social media
Express yourself but not use abusive language
Donot invade privacy of others
Verify friend/follower requests
Check downloads etc for viruses
Donot disclose other person or your own sensitive personal
information
Communicate with strangers cautiously
Use strong passwords and privacy protect features
Read terms of use and how your information is used by
service provider before you use a service
Thank you!
SETH ASSOCIATES
ADVOCATES AND LEGAL CONSULTANTS
New Delhi Law Office:
C-1/16, Daryaganj, New Delhi-110002, India
Tel:+91 (11) 65352272, +91 9868119137
Corporate Law Office:
B-10, Sector 40, NOIDA-201301, N.C.R ,India
Tel: +91 (120) 4352846, +91 9810155766
Fax: +91 (120) 4331304
E-mail: mail@sethassociates.com

More Related Content

What's hot

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethicsCyber crime, cyber law and cyber ethics
Cyber crime, cyber law and cyber ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 

Viewers also liked

Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sbSafeChildUAE1
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on educationCraig Cunningham
 
Sacred Breath Manual
Sacred Breath ManualSacred Breath Manual
Sacred Breath Manualguest5f2eb86
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  NehaC:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt NehaRidhi Mehta
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Women Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOWomen Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOGNRC Hospital
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 

Viewers also liked (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
E safety live
E safety liveE safety live
E safety live
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Filtering for in and of on education
Filtering for in and of on educationFiltering for in and of on education
Filtering for in and of on education
 
Sacred Breath Manual
Sacred Breath ManualSacred Breath Manual
Sacred Breath Manual
 
Case of baazee
Case of baazeeCase of baazee
Case of baazee
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
censorship bme-1
censorship bme-1censorship bme-1
censorship bme-1
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  NehaC:\Documents And Settings\U Ser Xp\Desktop\Imp  Neha\New Ppt  Neha
C:\Documents And Settings\U Ser Xp\Desktop\Imp Neha\New Ppt Neha
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Women Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCOWomen Safety by MBA Media Management , ASCO
Women Safety by MBA Media Management , ASCO
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Bihar State Report November-2016
Bihar State Report November-2016Bihar State Report November-2016
Bihar State Report November-2016
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 

Similar to Protecting children in cyberspace

CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2Anchalanshri Dixit
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRahuljain40418
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEECPAT Indonesia
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesRoshelleBonDacara
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERARoshelleBonDacara
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxchiragcdbc92
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatRaudhat-Rahma Shittu-Agbetola
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention RAUSHAN KUMAR
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 

Similar to Protecting children in cyberspace (20)

CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
C20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINEC20 - CHILD PROTECTION ONLINE
C20 - CHILD PROTECTION ONLINE
 
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activitiesLESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME and criminal activities
 
LESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERALESSON 2-CYBERCRIME, criminals Activities IT ERA
LESSON 2-CYBERCRIME, criminals Activities IT ERA
 
ahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptxahmadsofiang20stcfinal-220308055846 (1).pptx
ahmadsofiang20stcfinal-220308055846 (1).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Privacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhatPrivacy and protection of children in relation raudhat
Privacy and protection of children in relation raudhat
 
Cyber Crime & Prevention
Cyber Crime & Prevention Cyber Crime & Prevention
Cyber Crime & Prevention
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
File000098
File000098File000098
File000098
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Protecting children in cyberspace

  • 1. KERALA STATE COMMISSION FOR PROTECTION OF CHILD RIGHTS Expert Consultation on Legislative and Executive Action to Improve Security of Children in Cyber Space. Karnika Seth Cyberlaw Expert & Partner, Seth Associates © SethAssociates, 2014All Rights Reserved Protecting Children in cyberspace
  • 2. •93% of teens (12-17) go online •75% of teens (12-17) have cell phones •1 in 3 teens (12-17) have experienced online harassment. •73% of teens (12-17) have profiles on social networking sites.[ •97% of teens (12-17) play computer, web, portable, or console games •4% of cell-owning teens (12-17) say that they have sent sexually suggestive nude/semi-nude messages to others via text message. •93% of teens (12-17) go online •75% of teens (12-17) have cell phones •1 in 3 teens (12-17) have experienced online harassment. •73% of teens (12-17) have profiles on social networking sites.[ •97% of teens (12-17) play computer, web, portable, or console games •4% of cell-owning teens (12-17) say that they have sent sexually suggestive nude/semi-nude messages to others via text message. Source: Lenhart A. Social Media and Young Adults. Pew Internet and American Life Project, 2010. Children using Internet-2013
  • 3.
  • 4.
  • 5. Types of Cyber crimes  Credit card frauds  Cyber pornography  Sale of illegal articles-narcotics, weapons, wildlife  Online gambling  Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code  Email spoofing  Forgery  Defamation  Cyber stalking (section 509 IPC)  Phising  Cyber terrorism Crime against persons Crime against Government Crime against property
  • 6. Internet & Child Exploitation  Internet addiction • Cyber bullying • Cyber stalking • Child pornography • Child abuse • Identity theft cases • Cheating & fraud • Lured into criminal activities • Theft of personal information  Blackmail and harassment frauds  Child Extortion
  • 7. General concerns for children online May inadvertently or intentionally access adult pornographic or violent material Links or emails with innocent subjects that actually contain pornography Links contain malware –keyloggers that steal personal information Children being approached or observed in chat rooms Children’s identities, location or vulnerability being sourced from material available online Social networking sites may introduce child pornography, cyber harassment or stalking . Internet is becoming an addiction if unsupervised
  • 8. Exploitation of children on Internet –Gaps & challenges •TECHNICAL-Anonymity exists on internet-criminals prefer this medium •Nature of internet such , automatic ads or popups •Virus floats quickly •Easy access-no geographic limitations- quantity huge •SOCIOLOGICAL_Difference in cultures across globe-all types of content available •Gaps in definition of adulthood across countries •Increased generation gap •Internet addiction •Commercial trading , Peer-to-peer networks LEGAL-Lack of awareness of do’s and don’ts on internet •Low conviction rate
  • 9. Strategies to meet Challenges • TECHNICAL-Blocking automatic popups which are inappropriate • Using strong antivirus • Frequent change of passwords • Use of protection settings and software such as Netnanny,etc • Role of govt bodies/ ISPs /NGOs in reporting child abuse /child pornography • Blocking of illegal websites by CERT • SOCIAL- • Encourage reporting of child abuse cases • Allow internet use for limited hours and under supervision • Act as friend to your child • Checking webhistory files • school workshops,role of school counsellor
  • 10. Strategies to meet Challenges • Involve NGOs on reporting child abuse • Set up Rehabilitation centres for victims LEGAL- create cyberawareness of rights and duties in cyberspace Setting up helpline for reporting abuse Punish the offenders of law Storage of logs-no time period prescribed by central govt Sign a cybercrime convention for effective extradition of criminals abroad Police & Media to adopt a child centric approach
  • 11. International instruments on child protection  Convention on the Rights of the Child (1989) ●● Optional Protocol to the Convention on the Rights of the Child on the sale of children, child prostitution and child pornography (OPSC, 2000) ●● Protocol to Prevent, Suppress and Punish Trafficking against Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime (‘Palermo Protocol’, 2000) ●● Council of Europe Convention on Cybercrime (2001) ●● Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse (2007) In India, IT Act,2000 deals with safety of children in the online environment.
  • 12. Cybercrimes under Information Technology Act,2000 Hacking – Section 66 Sending of offensive false messages(s.66 A) Identity theft (s. 66C) Cheating by personation (s.66D) Violation of privacy (s.66E) Cyber terrorism (s.66F) Publishing sexually explicit content(s. 67A) Child pornography (s.67B) Stolen computer resource(s.66B) Attempt to commit an offence (s.84C) Abetment to commit an offence(s.84B) Publishing obscene material (Section 67)
  • 13. Types of child pornography offences ( section 67B)  View  View + collect child pornography  View, collect + distribute+publish+transmit+causes to be published or transmits child pornography  View, collect and distribute child pornography + download+exchange+advertises+promotes commit contact offences  View, collect and distribute child pornography, commit contact offences + produce child pornography  Facilitate abusing children online  Records own abuse or of others pertaining to sexually explicit act with children-  Punishable with imprisonment of 5 years and fine upto 10 lacs  Blocking of illegal websites –Section 69A IT Act,2000
  • 14. Cyber café Rules,2011 Maintenance of log register Photo identity card requested Minor without photo identity card to be accompanied by an adult History of websites accessed by a user kep by café for one year Computers in café equipped with commercially available filtering software to avoid acess to child pornography or obscene content Board declaring computers not to be used for illegal activity to be displayed Regular inspections of cybercafes
  • 15. Case studies DPS MMS case (Bazee.com) Adnan murder case-orkut case Noida MMS scandal Air force Bal Bharati School case According to latest NCRB statistics in 2012 there were 589 cases registered under IT Act & IPC dealing with transmitting obscene information and 497 persons were arrested in India http://ncrb.nic.in/
  • 16. The Noida MMS Scandal  In February 2009, an MBA student in Noida a boy circulated video clip of his 23 -year-old-girlfriend doing striptease for him to his classmates using the girl's e-mail id.  After the girl refused to marry him, the boy who had access to the girl's mail id and circulated that MMS clip to fellow students.  Police registered a case of criminal intimidation following a complaint filed by the girl's family
  • 17. Air force Bal Bharati School Air force Bal Bharati School case , Delhi; class(XII) student created pornographic site as revenge against his classmates (girls) and posted pornographic images of his classmates and lady teachers on internet. He was then suspended by school and arrested by Police under IPC and IT Act; though Juvenile Court allowed his bail thereafter.
  • 18. Possible reliefs to a cybercrime victim- strategy adoption  A victim of cybercrime needs to immediately report the matter to his local police station and to the nearest cybercrime cell  Depending on the nature of crime there may be civil and criminal remedies.  In civil remedies , injunction and restraint orders , blocking of websites, may be sought, together with damages, delivery up of infringing matter and/or account for profits.36 hr deadline for blocking or approach court.  Call police helpline  In criminal remedies, a cybercrime case will be registered by police if the offence is cognisable and if the same is non cognisable, a complaint should be filed with metropolitan magistrate  For certain offences, both civil and criminal remedies may be available to the victim
  • 19. Before lodging a cybercrime case Important parameters- Gather ample evidence admissible in a court of law Fulfill the criteria of the pecuniary ,territorial and subject matter jurisdiction of a court. Determine jurisdiction – case may be filed where the offence is committed or where effect of the offence is felt ( S. 177 to 179, Crpc)
  • 20. Preparation for prosecution  Collect all evidence available & saving snapshots of evidence  Seek a cyberlaw expert’s immediate assistance for advice on preparing for prosecution  Prepare a background history of facts chronologically as per facts  Pen down names and addresses of suspected accused.  Form a draft of complaint and remedies a victim seeks  Cyberlaw expert & police could assist in gathering further evidence e.g tracing the IP in case of e-mails, search & seizure or arrest as appropriate to the situation  A cyber forensic study of the hardware/equipment/ network server related to the cybercrime is generally essential
  • 21. Precautions for online safety -Secure online connections Install and keep up-to-date anti-virus, anti-spyware, and firewall Microsoft Malicious Software Removal Tool http://www.microsoft.com/downloads/details.aspx? FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en CCleaner (Free) http://www.ccleaner.com/download/ Anti-Spyware – A-Squared (free) http://download5.emsisoft.com/a2FreeSetup.exe AVG Free http://free.grisoft.com/ Use Commercial Web Filtering Software Free - http://www.k9webprotection.com/ Net Nanny (2007 best) http://www.netnanny.com/ Check internet cache @winspy (free) http://www.acesoft.net/winspy Spector Pro to track everything done on a PC http://www.spectorsoft.com/products/SpectorPro_Windows
  • 22. Useful softwares Monitoring Software Spectorsoft.com or 1-888-598-2788 Safety-net.info or 1-800-513-1916 Software4Parents.com or 1-866-345-8371 PCmagazine.com (search “parental monitoring”)
  • 23. Enabling protection through filters- IE browser protection
  • 24. Enabling protection through filters- IE browser protection 4. Select filter settings for the categoriSelect filter settings for the categories shown: Language, Nudity, Sex, Violence. The further right you push the slider, the more content is allowed. 5. Click on the Approved Sites tab. Here you can type in any specific websites that you might want to be treated specially. You can come back and change this list later, perhaps after feedback from your family. 'Approved Sites' list 6. Navigate to the General tab, and click on Create Password. This will set you up as Administrator, and prevent other users from altering the Content Advisor settings. Change the Rating Settings to block types of content  es shown: Language, Nudity, Sex, Violence. The further right you push the slider, the more content is allowed. Change the Rating Settings to block types of content
  • 25. Enabling protection through filters- IE browser protection
  • 26. The ten commandments of child protection in cyberspace- 1. Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for the law and for others, etc. 2. Don’t talk to strangers 3. Keep your private information private 4. Never agree to meet an online friend without your parents 5. There are no guarantees that what you say or post on the Internet is private
  • 27. The ten commandments of child protection in cyberspace- 6. Information (including photos, videos, etc.) posted on the Internet can last forever 7. Tell your parents if you encounter something uncomfortable 8. Don’t reply to unknown screen names on IM 9. Never open e-mail from strangers or click on any attachments 10. Find the “good” online – good friends, good Web sites, good games – and enjoy
  • 28. Do’s and dont’s- bestpractices on social media Express yourself but not use abusive language Donot invade privacy of others Verify friend/follower requests Check downloads etc for viruses Donot disclose other person or your own sensitive personal information Communicate with strangers cautiously Use strong passwords and privacy protect features Read terms of use and how your information is used by service provider before you use a service
  • 29. Thank you! SETH ASSOCIATES ADVOCATES AND LEGAL CONSULTANTS New Delhi Law Office: C-1/16, Daryaganj, New Delhi-110002, India Tel:+91 (11) 65352272, +91 9868119137 Corporate Law Office: B-10, Sector 40, NOIDA-201301, N.C.R ,India Tel: +91 (120) 4352846, +91 9810155766 Fax: +91 (120) 4331304 E-mail: mail@sethassociates.com