send mail to support@abhimanu.com mentioning your email id and mobileno registered with us! if details not recieved
Resend Opt after 60 Sec.
By Loging in you agree to Terms of Services and Privacy Policy
Claim your free MCQ
Please specify
Sorry for the inconvenience but we’re performing some maintenance at the moment. Website can be slow during this phase..
Please verify your mobile number
Login not allowed, Please logout from existing browser
Please update your name
Subscribe to Notifications
Stay updated with the latest Current affairs and other important updates regarding video Lectures, Test Schedules, live sessions etc..
Your Free user account at abhipedia has been created.
Remember, success is a journey, not a destination. Stay motivated and keep moving forward!
Refer & Earn
Enquire Now
My Abhipedia Earning
Kindly Login to view your earning
Support
It is a collective responsibility of all stakeholders, including Indian government to protect the children in cyberspace. At a time when Indian government is adopting Digital India project, our society at large is required to take care of our children while they use Internet and information and communication technology (ICT). There is no second opinion that children dealing with cyberspace require special attention and safeguards. Indian government and various stakeholders are required to adopt and use both legal and technical measures to safeguard interests of children. On the legal side we must have strong cyber law to punish the offender. On the technical side we must have effective technology, including hardware and software, which can prevent potential abuse of children in cyberspace.
While dealing with cyberspace, children may be either perpetrator or victim of cyber crimes, cyber bullying, pornography, etc. They must be made suitably aware as well as protected from these cyber threats. After all, human rights protection in cyberspace also includes protection of children’s human rights.
Child pornography is an area that requires special attention of Indian government. As per the cyber law trends of India 2013, child pornography in India is becoming a big nuisance. An Advisory by Home Ministry of India on Preventing and Combating Cyber Crime against Children in India has also been issued. Recently Interpol helped India in tracking child porn surfers. We also need such Techno Legal Framework so that child pornography can be curbed to the maximum possible extent in India.
The following key action points have been worked out in collaboration with various Stake holders for effective prevention and combating of cyber crime against children.
I. The Law Enforcement Agencies i.e. Police, Prosecution and Judiciary etc. and the Public at large may be made aware and trained through special training programmes /seminars and workshops for the effective implementation of Information technology Act, 2000 read with Information Technology (Amendment) Act 2008 and Rules made there under, as these are effective laws to deal with Cyber-Crime, including crime against Children. The training should be with the specific purpose of handling crimes against children.
II. Special Juvenile Police Units constituted under sec. 63 of Juvenile Justice (Care and Protection of Children) Act, 2009 may be sensitized and trained to deal with children in conflict of law with respect to cyber-crimes as well.
III. Parents, teachers & children should be encouraged to play an active role by reporting suspicious behaviour and give information regarding websites hosting exploitative images, videos and efforts to recruit or groom children for sexual abuse. Special precautions will need to be taken to monitor and regulate the spreading awareness of cyber crime among children so that it does not have any negative effect. Use of electronic and print media may also be made appropriately.
IV. It is essential to monitor and regulate social networking sites and services because it has been seen that it hosts most of the obscene materials which induce children to sexually explicit act or other crimes. Parents, teachers and owners of the online computing facilities should be trained to implement “parental control software’ in such a manner that spoofing of age, gender and identity is mitigated. In their implementation, multifactoral authentication and other security techniques should be employed.
V. Training to protect and seize digital evidence in a secure manner should be provided to law enforcement agencies and also to examiners of digital evidence.
VI. Maintaining confidentiality of the child victim and providing him/her guidance and support to deal with the after effects of such crimes should be ensured.
VII. Obtaining help and support of NGO’s working in the field of online child protection.
VIII. Conducting special sensitization programme and skill development for those manning child help lines such as 1098 or Police Control Room etc. may be considered.
IX. On the State Police websites, social networking websites and web browsers it is suggested to have a children’s corner where Internet safety tips in simple language can be explained to them and helpline number or e-mail addresses provided for, in case of any problem.
X. Efforts can be made to develop some mechanism by which online checking of registers, records of each cybercafé can be done from a central location.
XI. Mobile Internet security must be promoted among parents and children.
XII. It is often seen that processing of digital evidence in Computer Forensic Laboratories takes a long time. States must consider as take him their own central as well as regional computer forensic laboratories. Mobile Cyber Forensic Vans would also be useful in seizing electronic evidence from the spot in a proper manner. Assistance of NASSCOM may also be taken to establish cyber labs & training. In addition to NASSCOM help of other agencies like NTRO, CERT-In etc. may also be taken for training.
XIII. In appropriate cases, police officers may carry out undercover cyber patrol operations to identify internet criminals, lure them by posing as minors and arrest them. The exercise should be done in accordance with Section 72 and Section 72 (A) of Information Technology Act, 2000.
XIV. Apart from legal provisions for search under Section 100 and 165 Cr. P. C., Section 80 of IT(Amendment) Act, empowering any police officer not below the rank of a Police Inspector for search, can also be used appropriately.
XV. “Cyber Crime Investigation Manual" published by Data Security Council of India is a useful book and may be referred to.
XVI. Whenever it is noticed that the investigation requires information or help from outside India, CBI Interpol Division may be approached and provision of Mutual Legal Assistance Treaties and Letter of Rogatories (LRs) may be used. Ministry of Home Affairs circular No.25016/14/2007-Legal Cell, dated 31-12-2007, may be referred to for guidelines in this regard. However, it should be kept in mind that LRs are often time consuming and by the time LRs are issued, the digital foot prints (evidence) is already lost. G8 24x7 Desk of CBI, which looks after network and international aspects of cyber crime, may be contacted.
XVII. Wherever any material which is covered under Section 67, Section 67 A and Section 67 (B) of Information Technology Act, 2000 and seen on the Web, which is covered under Section 69 (A) of the IT Act under ‘Public Order’ or ‘preventing incitement to commissioning of cognizable offence’ in such cases, police may consider invoking provisions of IT Procedure and Safeguards for Blocking of Information by Public Rules, 2009. Provisions of Section 67 (C) of IT Act should be used for preservation of evidence by intermediaries.
XVIII. Websites hosting online gaming or children centric contents must issue specific guidelines regarding internet safety. Those transmitting, publishing or 4 storing obscene material in contravention with the provisions of Section 67, Section 67 (A), Section 69, Section 69 (A) and Section 69 (B) of the IT Act, must be acted against.
XIX. In appropriate cases, police should request Social Networking sites to remove undesirable contents. Most frequently visited and popular sites should be audited for security concerns. Many of these are being used either for compromising of systems or for luring and incitement of children.
By: Abhipedia ProfileResourcesReport error
Access to prime resources
New Courses