File Copyright Online - File mutual Divorce in Delhi - Online Legal Advice - Lawyers in India

Cyber Stalking: Challenges In Regulating Cyberstalking At The Cyber Space

This modern world is mostly engaged in the information technology with internet and mobile phones. Information technology has become widened and has become the axis of today's global and technology development. The world of internet provides all the required information to every user. With the numerous advancement of internet, the crime using internet has also widened its roots in all directions. The cyber-crimes pose a great threat to individuals. Though there are various types of Cyber crimes, cyber stalking is theMagna Cartato all such cyber crimes. The word"stalking"means"pursuing stealthily". It is the use of the Internet or other electronic means to stalk or harass a person. The utilization of technology allows stalkers to harass their target from any part of the world. In this paper we try to explore the Cyber-crimes and the online insecurity and vulnerabilities against women in the way of cyber stalking. While Cyber Stalking affects both men and women women are disproportionately targets, especially of age group of 16-35. The paper attempts to discuss the modes of cybercrimes, categories of cyber stalkers, psychology of cyber stalkers, motives of cyber stalkers and the nature victims.

This 21stcentury fulfilled by the information technology and the usage of the modern technologies is increased. Information technology widened its usage throughout the world and it's become the axis of today's global and technology development. With the numerous usage of the internet, the crimes also increased. Today most of the crimes are the cyber crimes. The crimes are mostly happened against women. 90% cyber crime victims are the women.

Cyber stalking in one of the most important cyber crime. Stalking is mostly happened against the women. Cyber stalking is nothing but online harassment or threatening the victim for sexual purposes or misuse them. Why it is happened against the women? Why they are victimized? Whether they don't have any right or liberty? Then what about the constitutional rights?
In this paper we are discussing about the cyber stalking and how it is affect the victims life and what are the measures taken by the government to regulate the cyber stalking. We are discussed about the violations of women right in the cyber space. First part of the paper is discussing about the cyber stalking and why it is happened and how it is happening. The second part will leads the recent cases and some important cases of cyber stalking and it elaborately speaks about how women are victimized and how their rights are violated. The third part discuss about what are the measures taken by the government and legal recognition of cyber stalking and the suggestions also included.

What Is Cyber Stalking?
There is no universal accepted definition of cyber stalking. The word stalking means ‘pursue stealthily' which refers that "harass obviously".

Some scholars are defined what is cyber stalking:

Bocij, Griffiths and McFarlane (2002: 5)-cyber stalking as "a group of behaviour in which an individual, group of individuals or organization, uses information and communications technology to harass one or more individuals. Such behaviour may include, but are not limited to, the transmission of threats and false accusations, identity theft, data theft, damage to data or equipment, computer monitoring, the solicitation of minors for sexual purposes and confrontation". According to Baer, "Cyber stalking in particular is composed of words alone and therefore stands more distinctly as apart as a crime of accumulation" (Baer, 2010:154).Brennerdefines as "in a sense, cyber stalking and cyber harassment are lineal descendants of the obscene or annoying telephone call offenses that were created roughly a century ago, to address harms resulting from the misuse of a nineteenth century technology" (Brenner, 2004: 14).Ellisonand Akdeniz(1998) had construed the term cyber stalking as online harassment, which may include various digitally harassing behaviors, including sending junk mails, computer viruses, impersonating the victim, etc.

It may be noted that legally cyber stalking recognized as an offence in early 1990's. Stalking was criminalized by Michigan in 1993 through Michigan criminal code.[2]
Cyber stalking refers computer oriented harassment. The term interchangeably used as online harassment or online abuse. A perpetrator or cyber stalker does not give direct physical threat to the victim but giving online threat or giving verbal intimidation. It is a continuous function in the cyber space.

Cyber stalking vs. offline stalking
# Cyber stalking is online threat and there is no direct relationship between the victim and cyber stalker. offline stalking is direct physical threat to the victim and there is some relationship between the victim and the stalker.
# Cyber stalking is universal. If a Russian or a Canadian can stalk a Indian women or men. offline stalking is particular.
# No prior clear identidy about the cyber stalker. Clear identification about the offline stalker.
# Direct physical threat in offline stalking. Cyber stalking is posting a nude or semi nude photo in the internet and using obscene language and verbal intimidation.
# Enforcement of law is easier in offline stalking. Cyber stalking sometimes requires extradition.[3]

But now a day's cyber stalking crimes is more than offline stalking. Because finding of the perpetrator is not easier. America is the first country mostly affected by the stalkers. 2,00,000 people are real stalkers in America, roughly 1 in 1250 persons.[4]90% of the victims are women and 95% of stalkers are men. Mostly the teenagers are victimized.

Age group Percentage
20 or under 23.40
21-30 14.40
31-40 22.80
41-50 26.90
51-60 9.00
61-70 1.80
71-80 1.20
81-90 0.60

Kinds of Cyber Stalking:
There are three kinds of cyber stalking.
·E-mail stalking
·Internet stalking
·Computer stalking

E-mail stalking:
E-mail stalkingis one of the most common forms of stalking in the physical world involve telephoning, sending mail, and actual surveillance, cyber stalking which can take many forms .Unsolicited e-mail is one of the most common forms of harassment, including hate, obscene, or threatening mail. Other forms of harassment include sending the victim viruses or high volume of electronic junk mail. It is important to note here that sending viruses or telemarketing solicitations alone do not constitute stalking. However, if these communications are repetitively sent in a manner which is designed to intimidate (that is, similar to the manner in which stalkers in the physical world send subscriptions to pornographic magazines), then they may constitute concerning behaviors which can be categorized as stalking.

Internet Stalking:
Here in this case stalkers can comprehensively use the Internet in order to slander and endanger their victims. In such cases, the cyber stalking takes on a public, rather than a private dimension. What is particularly disturbing about this form of cyber stalking is that it appears to be the most likely to spill over into physical space. Generally, cyber stalking is accompanied by traditional stalking behaviors such as threatening phone calls, vandalism of property, threatening mail, and physical attacks. There are important differences between the situation of someone who is regularly within shooting range of her/his stalker and someone who is being stalked from two thousand miles away. While emotional distress is acknowledged in most criminal sanctions, it is not considered as serious as actual physical threat. Thus, the links between stalking, domestic violence, and feticide have been empirically demonstrated in real life, much cyber stalking remains at the level of inducing emotional distress, fear, and apprehension. However, this is not to say that causing apprehension and fear should not be Criminally sanctioned.

Computer Stalking:
The third mode of cyber stalking is computer stalking which exploits the Workings of the Internet and the Windows operating system in order to assume control over the Computer of the targeted victim. It is probably not widely recognized that an individual Windows based computer connected to the Internet can be identified and connected to another computer through to the Internet. This connection is not the link via a third party characterizing typical Internet interactions, rather it is a computer-to-computer connection allowing the Inter lopper to exercise control over the computer of the target. A cyber stalker mostly communicates directly with their target as soon as the target computer connects in any way to the Internet. The stalker can assume control of the victim's computer and the only defensive option for the victim is to disconnect and relinquish their current Internet address. The situation is like discovering that anytime you pick up the phone, a stalker is on-line and in control of your phone. The only way to avoid the stalker is to disconnect the phone completely, and then reconnect with an entirely new number. Only one specific example of this technique was used in stalking for instance, a woman received a message stating "I am going to get you", the interloper then opened the women's CD-Rom drive in order to prove he had control of her computer. More recent versions of this technology claim to enable real-time key stroke logging and view the computer desktop in real time. It is not difficult to hypothesize that such mechanisms would appear as highly desirable tools of control and surveillance for those engaging in cyber stalking.

Reasons Behind Cyber Stalking
1) Harassment:

The main intention of the stalker is to harass. The women sexually harassed by the stalker at many times. The stalker has or created a photo of the victim and he threaten the victim to have sex with him otherwise he will upload the photo or video. The stalker has some affection to victim, if she denied that then he will do against the victim. The thing is the stalker has intention that' if she not mine of himself, she will not mine of anyone. 'Then the stalker doing all those things.

In U.S.A the stalker neighbor of the victim, has semi nude photo of the victim aged 16 and the perpetrator threaten the victim to have sex with him otherwise he will posted it into the public media. This way he harassed her for 1 year, afterwards it was founded by her parents and they informed it to the police. The stalker gets that photo from the facebook and he morphed it as a semi nude photo of the victim.

2) Fascination
This is a one side love or online romance. The stalker has love of affection towards the victim and if she refuses to accept his proposal then he will become the stalker. The rejected could not accept the end of relationship with her. This kind of stalkers some time being a abnormal persons. Sometimes the victim may be killed by the accused. In Tamil nadu 2012, the college girl affected by the acid attack, done by her one side lover. This is not kind of stalking but sometimes this kind of persons turned into the stalkers[5].

3) Revenge
This is kind of revenge against the victim. If the victim was refused his proposal then he made revenge against the victim. In Germany the victim refused to accept the stalker's proposal. Then he upload her photo into the social media and written above that ‘if anybody want's to sex with me contact me' and he wrote her address and phone number. The victim does not have knowledge about this and many persons are contacted her and some knocked her door in the midnight and sexually harassed her.

4) Boasting Or Showoff
This is kind of showing his talent how he harass a girl. This is happened in the friends circle. The stalker challenged to his friends about he will easily make her cry and sometimes it turns into aggravated form. This is kind of show off his talent in front of his friends.

Behaviour Percentage
Sent you threatening or abusive e-mail messages 39.88
Made threats or abusive comments via Instant Messenging software, such as MSN 38.69
Made threats or abusive comments in chat rooms 47.62
Posted false information (e.g. rumours) about you to a bulletin board or chat room 24.40
Impersonated you in e-mail messages to your friends, family or work colleagues 8.93
Encouraged other users to harass, threaten or insult you e.g. other members of a chat room 23.81
Ordered goods or services in your name, possibly charging items to your credit cards 2.98
Attempted to damage your computer system by sending malicious programs to you, such as a computer virus 40.48
Attempted to monitor your actions by inserting Trojan horse software (e.g. key logging programs) on your computer system 26.79
Attempted to access confidential information stored on your computer, such as credit card numbers, e-mail messages, etc. 17.26
Any other behaviour you found distressing in any way 27.98

Types of Stalkers[6]
A. Simple Obsessional.
In this type the victim and the perpetrator has prior relationship. The main intention of the perpetrator is to coerce or to re-enter into the relationship. Most of the stalkers who belongs to this type. 47% of the stalkers are in this category.

B. Love Obsessional
In this type the perpetrator has great affection or love towards the victim and mostly they one side lovers. The perpetrator was never accept that he was denied by his lover. Mostly the perpetrator suffering from a mental disorder such as schizophrenia or bipolar disorder. 43% of perpetrator belongs to this category.

C. Erotomanic
In this kind the stalker possess the delusion that the victim's behavior is has love with him. Then he was falling with her and then it is become known to him the same then he become a stalker.

Methods of Cyber Stalking
# The stalker collecting all the information about the victim through watching her activity and following her online activities.
# The stalker has series of collection about the victim and he threaten the victim for his personal use.
# Then he posting it into the internet and invite them to have sexual treatment with the victim.
# People of all kind from nook and corner of the world start calling the victim and compel her and sexually harass the victim
# Subscribe the e-mail of the victim into the pornographic and sex sites.[7]

Cases And Position of Women In The Cyber Space:
I) Manish Kathuria Case

The first reported case of cyber-stalking in India and the reason for the 2008 amendment to the IT Act,[8]the Manish Kathuria case involved the stalking of a woman named Ritu Kohli. Kathuria followed Kohli on a chat website, abused her by using obscene language and then disseminated her telephone number to various people. Later, he began using Kohli‟s identity to chat on the website "www.mirc.com". As a result she started receiving almost forty obscene telephone calls at odd hours of the night over three consecutive days. This situation forced her to report the matter to the Delhi Police. As soon as the complaint was made, Delhi Police traced the IP addresses and arrested Kathuria under Section 509 of the Indian Penal Code. The IT Act was not invoked in the case, since it had not come into force at the time when the complaint was filed. While there is no record of any subsequent proceeding, this case made Indian legislators wake up to the need for a legislation to address cyber-stalking. Even then, it was only in 2008 that Section 66-A was introduced. As a result, now cases are being reported under this section as opposed to Section 509 of the Indian Penal Code, as was the case where a Delhi University student was arrested for stalking a woman from Goa by creating fake profiles on social networking websites, uploading pictures on them and declared her to be his wife. It is hoped that the decision in this would favour the victim.

ii) Karan Girotra V. State
The only reported case till date to reach the judiciary on cyber-stalking is also merely an application to grant anticipatory bail. this case dealt with a woman, Shivani Saxena, whose marriage could not be consummated; as a result she filed for divorce by mutual consent. In the midst, she came across Karan Girotra while chatting on the internet, who told her he loved her and wanted to marry her. On the pretext of introducing her to his family, Girotra invited Saxena over to his house, drugged her and assaulted her sexually. He continued to assure her that he would marry her and began sending her obscene pictures from the night she was assaulted. He also threatened to circulate the pictures if she did not marry him. As a result, an engagement ceremony was performed between the two after which he continued to assault her and eventually called off her engagement to her. As a result, Saxena filed a complaint under Section 66-A of the IT Act.

Though the Court rejected the plea of anticipatory bail on the ground that nude and obscene pictures of Saxena were circulated by Girotra, an act which requires serious custodial interrogation, nonetheless it made some scathing remarks. According to the Court Saxena had failed to disclose her previous marriage to Girotra merely because she agreed to perform the engagement ceremony, even though such mention was made when Girotra had first professed his love to Saxena. The Court also took noted that there was a delay in lodging the FIR by Saxena. What is more shocking is that the Court held that Saxena had consented to the sexual intercourse and had decided to file the complaint only when Girotra refused to marry her.

This case highlights the attitude of the Indian judiciary towards cases involving cyber-stalking. It is appalling that factors as redundant as a delay in filing the FIR have a huge bearing on the outcome of the case. It is for this reason that more stringent legislations are the need of the hour.

iii) Vinu Priya Case
This is very recent case. In this case the victim was a 21 years old, who finished her B,sc chemistry. On June 23, when the first photograph appeared, she informed her parents who lodged a complaint with the Cyber Crime Cell. The police, either lacking the investigative skills to trace the origin of the morphed photograph or simply displaying lack of interest, told Vinupriya's father that it will nab the culprit in two weeks. Two weeks? Seriously? Do those cops in Tamil Nadu's Cyber Crime Cell understand the trauma Vinupriya and her family would have gone through? That is not all. One of the officers in the Cyber Crime Cell allegedly asked for a mobile phone if the father wanted the investigation to be done. Vinupriya's father says he bought a cell phone worth Rs 2,000 for the cop and bemoans that despite taking a bribe, the officer did not deliver justice. On June 26, another obscene photograph was posted on Facebook, leaving Vinupriya traumatized. The investigating officer had already assumed that she must have sent those pictures to someone and now they were being posted, perhaps by a jilted lover. The line of questioning to Vinupriya was on those lines. When she was alone at home on June 27, she killed herself[9].

The second photograph that had appeared on June 26, disappeared within hours of news of Vinupriya's death becoming public. Proof, that the pervert was lurking somewhere close by or was part of Vinupriya's friend circle.

iv) President Pranab mukharjee's daughter stalking case
Sharmistha Mukherjee, daughter of President Pranab Mukherjee, was allegedly harassed by a man, who posted sexually explicit messages on her Facebook page.[10]She lodged a complaint with the Cyber Crime unit of Delhi Police. Police said the "lewd" messages were sent to the complainant through Facebook Messenger. The profile of the sender mentions him as a resident of Nauhati in Hooghly, West Bengal. Mukherjee shared screenshots of the messages sent to her and said she decided to speak up against online harassment as ignoring it would only encourage him further. She also tagged the man who has now deleted his profile from Facebook.

"This pervert Partha Mandal is sending me dirty sexual messages. My 1st reaction was to ignore and block him. But then I thought the silence would encourage him to find other victims. Just blocking and reporting is not enough. I strongly feel such ppl shd be publicly exposed and humiliated. I'm posting screenshots of his profile and messages he sent me. I'm also tagging him. Please share this post and tag this rat as a message that these pervert acts will not be taken lightly," she wrote.[11]

v) Cassidy stalking case
Cassidy was a miss teen U.S.A, was stalked over a year. She was stalked by Jared james Abrahams, who he was higher secondary friend of Cassidy. He input a malware into the cassidy's laptop through he collected lot of information about Cassidy and he upload a semi nude photo of Cassidy in the social media and then it was informed into the FBI and they found the culprit.

Other Cases
·Amanda Todd was a bright and bubbly13-year-old from Canada. During an Internet chat session, a stranger asked her to bare her breasts. In a fleeting moment, she complied. Amanda had no idea he'd recorded it. The stranger contacted her again, and threatened to release the file unless she posed nude forhim.She refused, and the photograph was released to her peers. After being subjected to relentless bullying as a result, Amanda committed suicide.

·A 12-year-old Washington girl was sentenced on Wednesday to probation and community service for a cyberstalking incident in which she and another 11-year-old girl doctored a classmate's Facebook account with explicit photos and solicitations for sex.

But the mother of the victim, also 12, said she has "mixed feelings" about the sentencing of the girls who hacked her daughter's Facebook page, and she isn't satisfied with the judge's ruling.

·The case dealt with the posting of sexually explicit material by Abraham Jacob Alkhabaz, a student of the University of Michigan under the pseudonym "Jake Baker". Baker posted stories on an internet newsgroup titled "alt. sex. stories" describing the torture, rape and murder of a woman who had the same name as one of Baker‟s classmates at the University of Michigan. In addition, e-mails were exchanged between Baker and a man named Arthur Gonda from Ontario, Canada, who was a reader of his story. Over forty e-mails were exchanged between the two men discussing their desire to abduct and physically injure women of their area. As a result, a complaint was filed against Baker under the Interstate Communications Act.[12]

Constitutional Validity
With the brief analyzing of these cases the thing is being a women is very dangerous in this society. Why it is so happened against the women mostly. why the women are victimized at every time? The world has to answer for these questions! Even the males also using the internet, online and etc.. But they are not victimized as like females. This is happened against all kind of females such as poor, rich, familiar, children and etcetera. Where there is no right for the female or where there is no protection for female. Whether the modesty of women is safeguarded by the law and order?

The provisions are saying to protect the women and safeguard her modesty but in reality there is no protection for women and violation of her modesty is easily happened at all. All kind of females are affected then what is the use of constitutional provisions such as right to life, equality clauses, freedom of speech and expression. The rights are given but the enforcement of these rights are not happened.

In Vinupriya case the girl was stalked by unknown person, who was a one side lover, even though there is no protection for women, if the rights are protected the suicide of Vinupriya was not happened. She proved she is innocent through her death, when she is committed suicide there after only the police department took a immediate action because this case was familiar. Even though the complaint was given 2 weeks before her death. But there is no action taken by the police department. If they founded the culprit there is no suicide of Vinupriya. Even her parents also does not believed her.

The injustices happened in all the forms against women. Constitution of india,1950 declares' both the men and women are same' whether there is equality prevails in all the situation. Both men and women has right to access internet. The right is enforced but what about the protection? If they are came into social media they are stalked. Then what is the fulfillment of these rights? There is no protection for women at all.

If women are protected means the nirbhaya case[13]was not happened. Even many cases happened before nirbhaya case but the Indian government recently inserted a provision in Indian penal code,1860[14]about stalking is an offence .if serious crimes are happened then only the laws are created. Every law has some murders of women behind that.

Right To Privacy Vs. Freedom of Speech And Expression
Every person has both the rights. If the stalker were arrested, whether is freedom of speech and expression was violated? If he doing like this then how can women exercise her right to privacy? Article 19(2) gave some restrictions to the exercise of freedom of speech and expression. It gives that he exercises his freedom not to violative of any other rights of others.

Right to privacy was very important right for the individual. Any person can personally do some acts not to violate anyone. A women has right to access internet and if any person has right to expose her body without her consent. But this happened usually.In cassidy's casethe defendant arguing that this is his freedom, he can watch anybody and make a sense of it. No one cannot pick up his right. The judge not accepted his argument because this is very silly defence what means of right to privacy, whether his freedom is to expose another's body or any other personal things.

Right to privacy is very important for women. She has a right to life, right to life includes right to dignity. No one cannot violate her modesty i.e., right to dignity.[15]

The provisions alone saying every person has rights. But the enforcement of these rights in not accessible. The documents and provisions are saying, people are writing page and page about women rights but whether exercising of their rights is happening. Whether the enforcement of these rights are happening or not, but the violation of these rights are happening usually. Even after the period till now the position of the women was very critical. The forms of crime are changing but the protection of the women is unchanged.

Legal Recognition And Challenges In Regulating Cyber Stalking:-
Legal Recognition:

# California is the first country adopted the stalking law as a result of murder of actress Rebecca schaeffer by Robert bardo in 1989.
# The stalking law was enforced in 1990
# New York enacted penal laws, it says that stalking is an offence.
# Australia adopted stalking statute in 1993.

Position In U.S.A:
U.S.A is mostly affected country by cyber stalking. U.S.A adopted various laws at the center and state level.
# The first Act is Interstate communication Act.[16]
# Another federal legislation is telephone harassment statute[17]
# Interstate Stalking Punishment and Prevention Act.[18]
# Michigan was the first state to include online communications in its stalking laws in 1993.
# And many other states were adopted the stalking statute.

Position In U.K:
The UK does not have a specific legislation to deal with cyber-stalking. There are three legislations that seek to criminalize such behaviour. The first of these legislations is the Telecommunications Act, 1984. Under this Act, it is an offence to send a message that is "grossly offensive or of an indecent, obscene or menacing character" or a message with the purpose of "causing annoyance, inconvenience or needless anxiety" and knows that the message is false, by means of a telecommunications system.[19]

The second legislation on the point is the Protection from Harassment Act, 1997, which makes the offence of criminal harassment and the offence involving fear of violence subject to civil and criminal measures.[20]
The third legislation on the point is the Malicious Communications Act, 1988. By the Criminal Justice and Police Act, 2001, this legislation was amended to include electronic communications as well.[21]

Position in India:
India also lacks a specific legislation on cyber-stalking. The general legislation on the point is the Indian Penal Code which makes the use of "words, sounds or gestures or exhibition of an object" with the intent to insult the modesty of a woman or even the intrusion of a woman's privacy an offence punishable with imprisonment for one year or with a fine.[22]

This deficiency was sought to be rectified by the enactment of the Information Technology Act, 2000. The IT Act was enacted with the purpose of recognizing electronic commerce in furtherance of the United Nations Model Law on Electronic Commerce. Therefore, the first problem with the Act lies in the Preamble itself where the statute adopts a more commercial outlook and does not even attempt to recognize in the Preamble, the intention of the statute to regulate non-commercial criminal behaviour perpetrated through an electronic mode.

Nonetheless, the provisions of the IT Act do attempt to penalize acts of cyber-stalking. Prior to the 2008 amendment, the first section that dealt with the issue is Section 67 which makes the publication of any material that is "lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons" punishable with imprisonment up to five years and fine up to one lakh rupees which may increase to ten years and fine of two lakh rupees if the offender is convicted for the second time. The second provision on cyber-stalking is Section 72, which penalizes the disclosure of information obtained from "electronic record, book, register, correspondence, information, document or other material" without the consent of the concerned person with imprisonment up to two years and a fine up to one lakh rupees. The generality of these provisions cannot be over-emphasized and it is quite evident that a number of issues such as the use of innocent third-persons of the sending of innocent e-mails which may nonetheless amount to harassment remain unaddressed by these provisions

In 2013 the Indian penal code was amended on the impact of nirbhaya rape case. Sections 354A, 354B, 354C, 354D was inserted on the recommendation of justice j.s varma committee.
Section 354D deals with stalking of a women. This Is very limited because there is no provision for stalking of a men. And there is no law for if stalker is foreigner. The Indian penal cade,1860 is extra-territorial but there is no effective extradition laws.

The enforcement of these laws are still a question mark. Many cases was filled under information technology act before this amendment.

Challenges:
# There is no effective law of cyber stalking.
# We don't have a separate stalking law like U.S.A
# Section 354D is limited, because there is no specific provisions for if a male stalked.
# The extradition law of India is too weak. There is no effective extradition.
# The stalkers are using modern technologies but the cyber crime technology is weaker then the stalkers.
# There is no immediate action from the police department, if it is happened the suicide of Vinupriya is not happened.
# If The poor girls are filling a case against the stalkers, the action of the police is question mark because of bribery.
# If the stalker is political party's son or a billionaire there is no immediate action from the police.
# The enforcement of stalking law is still too weak.
# The information technology Act,2000 has no specific provision for cyber stalking.
# The loop holes of the law accuted the stalker easily.
# There is no fear of punishment from the stalker's side.

Suggestions
·The government has to take a prior step to the effective enforcement of the stalking law.
·Separate stalking law must be enacted.
·People have to protect themselves first.
·Women have not to do disclose her personal to anyone.
·Giving fake name, address, phone number is remedial measures to avoid these inconveniences.
·Respect with one another is very important, because if you respect a woman u will never do a crime against the women.
·The state should enforce law and order effectively.

Conclusion
With a detailed analysis of these topic we have conclude that the men have the responsibility to protect the people, the change is within them only. They will give the full respect to the women. Then only the percentage of crime against women will reduce. As per the Tamil song lyrics' the thief have to change himself, then only the level of theft will reduce' the enforcement law was not give a full remedy. As like that the stalkers should have to change themselves.

Gandhiji said that" when the women walk freely at midnight without any fear then only it consider as freedom"but still it is not happened. So there is no complete freedom in the society for the women. Now a day's some persons are saying women are empowered, they are doing all the work as like men. But this is not true, because they are doing all the work but there is no safety for the women at all. So there is no empowerment. There is no freedom, liberty and etc.

When the women is freely walk in the society, freely doing all the works without any fear or any other disturbances then only it is amount to freedom.

Co-Authored by: B.Aravinth Raj & T.Kalaiyarasi

References:
1.An introduction to cyber crime and cyber law by R.k. chaubey, second edition, kamala law house, Kolkata.
2.Commentary on Information technology Act,2000 by Apar gupta, second edition, lexis nexis.
3.Criminal law (incorporation of 2012 amendment) by P.S.A pillai, 12 th edition, lexis nexis.
4.www.heinonline.ac.in
5.www.westlaw.in
6.www.jstore.com
7.www.cyberbranchusa.in
8.Article on cyber crimes by Missouri law house.
9.The Hindu news paper, Tamil edition
10.Times of India news paper.

End-Notes
[1]III Year B.A.B.L.(Hons), School of Excellence in Law, The TN Dr. Ambedkar Law University.
[2]Michigancriminal code 1993 section 28.643(8)
[3]p. Bocij, cyber stalking: harassment in the internet age and how to protect your family 7 (2004
[4]California universitystatisticsabout stalking.
[5]Challenges in regulating cyber stalking(2013) by nirmal.k.vijayan
[6]Studies conducted by the Los angels police department's threat management unit.
[7] Cyber crime and cyber law by r.k. chaubay
[8]P.shah‘cyber stalking and legal enforcement of the laws in india' 2012
[9]The hindu news paper, tamil edition, dated on 01-07-2016
[10]Times of india
[11]She wrote on her twitter page.
[12]United states vs. jakes baker
[13]Delhi rape case,2012
[14]Criminal law amendment act,2013
[15]Article 21 of the constitution of india,1950
[16] 18 U.S.C s. 875 (c)
[17] 47 U.S.C S. 223
[18] 81 U.S.C s. 2261(A)
[19]Telecommunications Act, 1984, S.43
[20]Protection from Harassment Act, 1997, SS2(2),4(4).
[21]Malicious Communications Act, 1988, S.1; Criminal Justice and Police Act, 2001, S.43.
[22]Indian Penal Code, 1860, s.509.

Law Article in India

You May Like

Lawyers in India - Search By City

Copyright Filing
Online Copyright Registration


LawArticles

How To File For Mutual Divorce In Delhi

Titile

How To File For Mutual Divorce In Delhi Mutual Consent Divorce is the Simplest Way to Obtain a D...

Increased Age For Girls Marriage

Titile

It is hoped that the Prohibition of Child Marriage (Amendment) Bill, 2021, which intends to inc...

Facade of Social Media

Titile

One may very easily get absorbed in the lives of others as one scrolls through a Facebook news ...

Section 482 CrPc - Quashing Of FIR: Guid...

Titile

The Inherent power under Section 482 in The Code Of Criminal Procedure, 1973 (37th Chapter of t...

The Uniform Civil Code (UCC) in India: A...

Titile

The Uniform Civil Code (UCC) is a concept that proposes the unification of personal laws across...

Role Of Artificial Intelligence In Legal...

Titile

Artificial intelligence (AI) is revolutionizing various sectors of the economy, and the legal i...

Lawyers Registration
Lawyers Membership - Get Clients Online


File caveat In Supreme Court Instantly