Cyber Stalking: Indian Legal Challenges
Cyber Stalking: Indian Legal Challenges
CYBER STALKING
ACKNOWLEDGEMENT
I take this opportunity to express my profound gratitude and deep regards to my guide Prof. Divya
Salim for her exemplary guidance, monitoring and constant encouragement throughout the course of
this thesis. The blessing, help and guidance given by her from time to time shall carry me a long way in
the journey of life on which I am about to embark. I would further like to thank her for giving me this
opportunity to do this project by instilling his faith in me.
Further I would like to extend my gratitude towards National Law Institute University which as an
institution gave me the platform to carry out my research on such an important.
I am also grateful to my parents for their constant guidance and support throughout the project. It would
have been impossible for me to complete this project without their love and affection.
Last but not the least; I would like to thank God for being with me throughout the course of the project
and keeping everything in its place.
TABLE OF CONTENTS
RESEARCH FRAMEWORK ............................................................................................................. 3
B. HYPOTHESIS ................................................................................................................................... 3
B. INTERNET STALKING........................................................................................................................ 8
1
VI. INDIAN LEGISLATION ........................................................................................................... 12
B. REGULATORY RELIEFS DO NOT COVER THE FULL CONCEPT OF CYBER STALKING .......................... 14
2
RESEARCH FRAMEWORK
A. STATEMENT OF PROBLEM
Lack of adequacy of the existing cyber laws in the country with respect to stalking.
B. HYPOTHESIS
The hypothesis is to draw up an impression that the existing cyber laws with respect to stalking and
harassment of women are insufficient to curb the rise of cyber stalkers in light of digitisation.
C. MODE OF RESEARCH
3
I. INTRODUCTION TO CYBER STALKING
The Internet has become a platform for people to connect globally in the course of business, education
and their social lives. The Internet has made it easy for people to communicate, meet a companion, or
compete with people on the other side of the world with a click of a mouse.
The growth of the information technology is accompanied by new and serious threats. When internet
was invented, inventors did not envisage for its bad behaviour. But the criminal mentality of human
psychology started its misuse by using internet as a tool of crime, which gave the birth to “Cyber-crime”
and world is facing a huge challenge from these cyber criminals. Cyber-crime is a major issue facing
society today. With the advent of technology, cyber-crime and victimization of women are on the high
and it poses as a major threat to the security of a person as a whole. Cyber-crime also known as computer
crime can be defined as “Criminal activity directly related to the illegal use of computer and a network,
for unauthorized access or theft of stored or on-line data that can be used for several criminal activities
against a victim.” 1
Cyber Stalking is one of the most widespread net crimes in the modern world. The word “stalking”
means "pursuing stealthily". Cyber stalking can be used interchangeably with online harassment and
online abuse. 2 It is the use of the Internet or other electronic means to stalk or harass a person. 3 Cyber
stalkers need not have to leave their home to find, or harass their targets, and has no fear of physical
violence since they believe that they cannot be physically touched in cyberspace. They use Internet, e-
mail, and other electronic communication devices to stalk persons. At the same time the unique
environment of the Internet creates “remoteness” on the part of the stalker, and provides a false sense
of security arising from the apparent anonymity that is present on the Internet.
In Cyber Stalking, stalker access the victim’s private information like name, family background,
telephone numbers and routines of the victim. 4 It is believed that Over 75% of the victims are female.
More than one million women and 370,000 men are stalked annually in the United States. An
astonishing one in twelve women and one in forty-five men will be stalked in their lifetimes From sexual
harassment to rape threats to gender-based hate speech, women face disproportionate levels of abuse
1
Saini, H & Rao, S “Cyber-Crimes and their Impacts: A Review” International Journal of Engineering Research and
Applications, 2. IJERA VOL. 2 (Mar-Apr 2012) at pp.202-209
2
Muthukumaran, B, “Cyber Crime Scenario In India” (2008) available on http://www.gcl.in/downloads/bm_cybercrime.pdf.
3
Kumar, M, “Cyber stalking : Online harassment or Online abuses” (2010) available on
http://www.cyberarmy.in/2010/12/cyber-stalking-online- harassment-or.html.
4
The Times of India, March 18 (2013) “Cyber stalkers leave residents in web of trouble” available on
http://articles.timesofindia.indiatimes.com/2013-03- 18/ludhiana/37813762_1_cyber-stalkers-cyber-cell-e-mail-account
4
online. In ‘”Don’t Let It Stand!”: An Exploratory Study of Women and Verbal Online Abuse on the
Internet in India’, research findings indicate that this is a growing issue for women across the world,
and that women develop a variety of strategies to deal with the verbal threats they face.
Even though India is one of the very few countries to enact IT Act 2000 to combat cyber-crimes, issues
regarding women still remain untouched in this Act. The said Act has termed certain offences as
hacking, publishing of obscene materials in the net, tampering the data as punishable offences. But the
grave threat to the security of women in general is not covered fully by this Act and hence, the Criminal
law amendment Ordinance, 2013 introduced Section 354D in order to remedy this lacuna.
5
II. DEFINITION OF CYBER STALKING
Academically, the concept of cyber stalking has been construed mainly as a behavioural misconduct
conveyed by digital communication technology. Cyber stalking is defined as “a group of behaviours in
which an individual, group of individuals or organization, uses information and communications
technology to harass one or more individuals. Such behaviours may include, but are not limited to, the
transmission of threats and false accusations, identity theft, data theft, damage to data or equipment,
computer monitoring, the solicitation of minors for sexual purposes and confrontation”. 5 According to
Brenner, “in a sense, cyber stalking and cyber harassment are lineal descendants of the obscene or
annoying telephone call offenses that were created roughly a century ago, to address harms resulting
from the misuse of a nineteenth century technology”. 6 Further, Elison and Akdenziz had construed the
term cyber stalking as “online harassment, which may include various digitally harassing behaviours,
including sending junk mails, computer viruses, impersonating the victim, etc.” 7
The concept of cyber stalking neither received any new academic understanding in India until 2010,
when Halder and Jaishankar provided a functional definition of cyber stalking which is as follows: “In
one word, when ‘following’ is added by mens rea to commit harm and it is successfully digitally carried
out, we can say cyber stalking has happened.” 8After the horrifying Delhi Gang rape, Justice Verma
Committee was set up in order to deal with the rising crimes against women. In light of such
recommendation, stalking was legally recognised as an offence in India through S.354D of the Indian
Penal Code which was inserted through the Criminal Law Amendment Act, 2013.
The criminal law amendment Ordinance, 2013 defined stalking in the following words: “Any man who
follows a woman or contacts or attempts to contact such woman to foster personal interaction
repeatedly despite a clear indication of disinterest by such woman or whoever monitors the use by a
woman of the internet, email or any other form of electronic communication or watches or spies a
person in a manner that results in fear of violence or serious alarm or distress, in the mind of such
woman or interferes with the mental peace of such woman, commits the offence of stalking.” 9
5
Bocij, P., Griffiths, M.D., McFarlane, L. (2002) “Cyber Stalking: A new Challenge for Criminal Law. The Criminal
Lawyer” at pp. 3-5.
6
Brenner, S. “Cyber Crime Metrics: Old Wine in New Bottles?”, VIRGINIA JOURNAL OF LAW AND TECHNOLOGY, (2004)
13, pp. 1-53.
7
Ellison, L., Akdeniz Y. “Cyber-stalking: the Regulation of Harassment on the Internet”, CRIMINAL LAW REVIEW, (1998)
at pp. 29-48
8
Halder, D., Jaishankar, K. “Cyber Victimization in India: A Baseline Survey Report”, (2010). Available at:
www.cybervictims.org/CCVCresearchreport2010.pdf.
9
Criminal Law (Amendment) Ordinance, 2013, Section 6.
6
III. TYPES OF STALKERS IN GENERAL
A. REJECTED STALKERS
This type of stalker is driven to pursue their victim in attempt to reverse what they perceive as a wrongful
set of circumstances causing a separation, prior divorce or termination of a relationship. These offenders
either feel misunderstood hoping to reverse the break up or feel angry and seeking revenge because their
attempts at reconciliation with the victim has failed in the past.
B. RESENTFUL STALKERS
Resentful stalkers are fully aware the victim is cognizant of the stalking, but continues to fulfil a
distorted vendetta he/she feels is warranted. Fear and anguish experienced by the victim are the
objectives of this type of stalker. For this type of profile, the stalker believes the victim both deserves
and requires being frightened because they have caused them and/or others agony and distress.
C. INTIMACY SEEKERS
This type of stalker does not have ill will towards their victim and simply wants to engage in a loving
relationship with them. Intimacy seekers view their victims as their soul mate destined to be together at
all costs. Intimacy seeker stalkers are often the segment of men or women who harass celebrities and
public figures. Blinded by their distorted perceptions of a destined love, they lose sight of the distress
and fear they are causing the person they stalk.
D. INCOMPETENT SUITORS
These people who fit this profile are stalkers deeply enamoured with their victim. Their interest for the
victim at times is focused on the endeavour of one day becoming a couple. They tend to lack social,
communication or courting skills and may feel entitled that their fantasy of a loving relationship is
inevitable. Feeling entitled and/or deserving of a relationship with the victim inspires the stalker to
gradually increase their frequency of contact. Although similar to the Intimacy Seeker stalker,
incompetent suitors are more gradual in their means and methods of contact.
E. PREDATORY STALKERS
Of the five types, the predatory stalker is by far the most dangerous and determined. This type of stalker
is motivated by a perverted sexual need. They engage in actively planning an attack and premeditation as
the predator how he will go about engaging in a sexual act(s) with his victim. They do not have feelings
of love for their victim nor motivated by a belief of predestination. Their fuel to dominate and victimize
resembles the sociopath experiencing little to no remorse for the welfare of their victim.
7
IV. MODES OF CYBER STALKING
Low cost of internet and ease of use motivate stalker to use information technology tool to stalk people.
Cyber stalker use three different ways for stalking their target. 10
A. EMAIL STALKING
Email or electronic mail is the most commonly and heavily used network based application. Due to the
increasing use emails it is now become a most common way to harassed, threaten or stalk any individual.
In this type of stalking, stalkers basically send spontaneous email in the form of nuisance, including
hatred, obscene or threatening. Email stalker repeatedly send mails to their target for an attempt to
initiate a relationship, fix a relationship or threaten and hurt a person.
B. INTERNET STALKING
While email stalking is equivalents to traditional stalking in some ways, it is not restricted to, this
format. Stalkers casn more widely use internet in order to abuse and jeopardize their victims. In this
type of cyber stalking, stalker are more concern about public element then private.
C. COMPUTER STALKING
Computer stalking is a more dangerous form of stalking as in this mode of cyber stalking, the stalker
control its victim’s computer by unauthorized access. A cyber stalker can communicate directly with
their target as soon as the target computer connects in any way to the Internet. The stalker can assume
control of the victim’s computer and the only defensive option for the victim is to disconnect and
renounce their current Internet “address”.
10
Ogilvie, E. “Cyberstalking: Trends And Issues In Crime And Criminal Justice”, (2000) at 166.
8
chat harassment or abuse of the victim (otherwise known as flaming) or he/she may leave improper
message on the message board or in chat rooms for or about the victim.
9
V. PECULIAR CHARACTERISTICS OF CYBER STALKING
Cyber stalking and physical stalking can be distinguished from each other. Various scholars and
academicians have helped in elaborating such differences, and thereby, regarding certain traits peculiar to
cyber stalking.
11
Gelman, L. (2009) Privacy, Free Speech, and “Blurry Edged” Social Networks. B.C.L. Review. Available at:
www.lawdigitalcommons.bc.edu/bclr/vol50/iss5/2.
12
What is the socialization process? Available at: www.soc.ucsb.edu/faculty/baldwin/classes/ soc142/scznDEF.html.
10
C. CHOICE OF THE VICTIMS FOR BEING ACCESSIBLE
It may also be noted that the social media, email/message/digital communication service providers and
search engines may be parts of a wider database which can share the information of the user if the user
wishes so 13; the user can further be followed by people interested in the same subject, colleagues,
students, friends of the students, etc. Such followers can get to see not only the professional profile of
the user, but also the Facebook link and user email id if the user wishes to include them in his/her profile.
Similarly, a Twitter account can be used to log into storyfy.com through which users can share their
experiences, trending news, etc; it can also use hash tag in the similar fashion as in Twitter, and it
provides further opportunity to share the ‘story’ through Facebook, Twitter, Google+ or LinkedIn. All
that the user needs to do is to confirm participation in the site through his /her email id. As such, the
social media and the cloud attached to it, carry on ‘commodification of personal information’ 14 and,
nonetheless, it can provide a wider platform to carry out pursuing activity for cyber stalking through
data mining and reality mining.
13
Armbarst, M., Fox, M., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A.,
Stoica, I., Zaharia, M., “Above the Clouds: A Berkeley View of Cloud Computing”, Technical Report No. UCB/EECS-2009-
28, (2009).
14
Tavani, H.T., Grodzinsky, S. Cyber Stalking, Personal Privacy, and Moral Responsibility. Ethics and Information
Technology, (2002), pp. 123-132.
15
Wykes, M. “Constructing Crime: Stalking, Celebrity, ‘Cyber‘and Media” in Y. Jewkes (Ed.) CRIME ONLINE.
CULLOMPTON, WILLAN PUBLISHING, (2007) at pp. 128-143.
11
VI. INDIAN LEGISLATION
Section 72 of the Indian Information Technology Act, 2008 which deals with breach of confidentiality
and privacy, section 72A of the said Act which prescribes punishment for disclosure of information for
breach of lawful contract read with section 441 and 509 of the Indian Penal Code (which deal with
offences related to Criminal trespass and acts intended to insult the modesty of a woman respectively),
were being used to prosecute offenders for cyber stalking before coming into force of the Criminal Law
Amendment Act, 2013.
The Indian IT Act 2000 which was amended in 2008 does not directly address stalking. But the problem
is dealt more as an "intrusion on to the privacy of individual" than as regular cyber offences which are
discussed in the IT Act 2008. Hence the most used provision for regulating cyber stalking in India is
section 72 of the Indian IT Act 2000, which runs as follows;
Section 72: Breach of confidentiality and privacy: “Save as otherwise provided in this Act or any other
law for the time being in force, any person who, in pursuant of any of the powers conferred under this
Act, rules or regulations made there under, has secured access to any electronic record, book, register,
correspondence, information, document or other material without the consent of the person concerned
discloses such electronic record, book, register, correspondence, information, document or other
material to any other person shall be punished with imprisonment for a term which may extend to two
years, or with fine which may extend to one lakh rupees, or with both.”
Some opined that erstwhile Section 66A of the IT Act, 2000 which prescribed punishment for sending
annoying, misleading, etc, can be used as an effective regulatory provision for cyber stalking. 16
However, after the December, 2012 Delhi gang rape incidence, the Indian government had taken several
initiatives to review the existing criminal laws. A special committee under Justice Verma was formed
for this purpose and basing upon the report of the committee, several new laws were introduced. In this
course, anti-stalking law was also introduced. The Criminal Law Amendment Ordinance, 2013 added
S.354D to the Indian Penal Code to define and punish the act of stalking. Indian penal code provided
remedies against defamatory act or an act outraging the modesty of the women. The amendment of the
Act in 2013 introduced other offences and also made cyber stalking as an offence.
16
PRS (Institute for Policy Research Studies, New Delhi, India). 2012. Justice Verma Report Summary.
http://www.prsindia.org/parliamenttrack/report-summaries/justice-verma-committee-reportsummary-2628/.
12
Section 354D provides punishment against stalking. If a man contacts a woman or attempts to even after
her expressed disinterest, or monitors her activities on the internet, shall be liable for punishment of
imprisonment up to three years and fine under first conviction. Under second or subsequent conviction,
he shall be punished with imprisonment up to five years and fine. 17
It may be noted that the above provision was made specifically as a ‘women centric law’ and the
wordings of this law have put much emphasis on the infringement of privacy by way of monitoring and
stalking, which creates fear from violence, serious alarm or distress. It therefore provides a three
dimensional explanation to stalking: (i) despite her disinterest, physically persuading a woman
repeatedly by conducting in such a way that may create fear in her, may interfere with her peace of
mind, (ii) monitoring her digital whereabouts, communications, etc. by digital conducts which create
serious threat, alarm or interfere with her mental peace, and (iii) spying or watching her to in order to
pose a harm to her.
S.354D of the Indian Penal Code sets these confusions at rest by criminalising cyber stalking as a
behavioural pattern. The main aim of this law is to prevent the perpetrator from taking up behaviours
which construct cyber stalking. While this is appreciated, it must be remembered that this law was
created in the shadow of physical stalking laws and therefore suffers from numerous drawbacks which
are further analysed.
Unfortunately, there is no record of any subsequent proceeding in the instant case and the research is
limited to this extent.
17
The Criminal Law (Amendment) Act, 2013, § 354D.
18
P. Shah, Cyber Stalking & the impact of its Legislative Provisions in India, http://www.legallyindia.in/cyber-stalking -
the-impact-of-its-legislaive-provisions-in-india.
13
VII. THE FALLBACKS OF THE INDIAN LEGISLATION
A. LIMITED SCOPE
It must be noted that S.354D of the Indian Penal Code protects women from men. Creators of this law
failed to take note of famous cases like that of Megan Meier, 19 where the perpetrator was a woman
victimising another young woman. A clear reading of the clause of the Section would show that the
language of the provision indicates that physical and online stalking can be a combined act, or separate
acts. The language in the first clause extends the scope of the law to a person who can be the perpetrator
and who is (i) known to the victim and who may be in relationship with the victim including personal
or professional relationship, and such person may have access to the private data or private internet
activities of the victim with the knowledge of the victim, or (ii) unknown to the victim, who may not be
in any prior relationship and who may try to access the privacy of the victim and also breach the privacy
and confidentiality of the victim. The language also broadly extends its scope to ‘aide stalkers’ and data
mining by the perpetrator when it includes monitoring the web-space, computer, etc. by the victim and
watching or spying the victim. But S.354D does not explicitly mention about interstate stalker as has
been mentioned in Ss.2261A of US Code 18. This makes the question of jurisdiction a critical issue.
STALKING
Further, it may be noted that clause (1) of Section 354D of the IPC highlights the motive of the act of
stalking, thus reflects the causing of the fear factor. But, unfortunately, this law provides regulatory relief
for only a part of the whole concept of cyber stalking, i.e. invasion of privacy, and not the full concept,
which includes invasion of privacy and also communicating the threat. This provision does not directly
indicate the patterns as how the victim can be ‘monitored’, ‘watched’ or ‘spied’ when she is being cyber
stalked. It neither includes any direct ‘third party’ liability when the aide stalker is involved. It needs to
be understood that in India, the concept of ‘conduct’ has not been critically examined by the courts in
the backdrop of cyber stalking cases. It is obvious that when the courts have to consider ‘conducts’ for
justifying the role of anti-cyber stalking law, the activities of the victim cannot be overlooked. The
courts in the US have interpreted the meaning of the term ‘conduct’ in relation to cyber stalking as a
19
U.S. v. Drew, 259 F.R.D. 449 (C.D. Cal. 2009).
14
holistic term involving the online behaviour of the perpetrator and the communication carried on by
him/her with a particular purpose which caused the victim to feel distressed, or afraid.20
In India, the court’s understanding of the victim’s rights and responsibilities towards using the ‘ignore’,
‘blocking’ options as has been provided by the service providers still needs to be nurtured when it comes
to cyber stalking cases. This is especially so when online activities of the victims may constitute positive
or negative online socialising, which can help the stalker. Further, S.354D of the IPC does neither
proscribe the mannerisms as how the stalker should not use such online conducts, communication and
real life information of the victim to fulfil his purpose; i.e., to create distress or fear for the victim.
In India this can become a particular problem especially when the victims can be women who are
involved in professions including governance of the country, including mainstream politics or
bureaucrats, who need to compulsorily reveal their data regarding assets. Such public data may also
include residential information and data regarding children. Further, many celebrity women, film, TV,
sports, news-media persona have their Twitter or Facebook accounts open for public viewing. The social
media can neither be held liable for data mining as such users may have consciously as well as
consensually opted for minimum privacy policy and thereby contributed more personal data. Such
profiles can very well aide in stalking activities including data mining.21
20
United States vs. Cassidy, 814 F. Supp 2D 574 (D. md. 2011)
21
Arya, D. (2013) Why are Indian Women Being Attacked on Social Media? Available at: http://www.bbc.co.uk/news/world-
asia-india-22378366.
15
considered as a penal offence when the accused person proves that in the particular circumstances, the
course of conduct was reasonable. Understandably, these provisions may safeguard activities to nab
incidences of cyber terrorism or cyber phishing cases, especially when seen in the lights of Section 69
of the Information Technology Act, which provides powers to issue directions for interception or
monitoring or decryption of any information through any computer resource, or 69A of the Information
Technology Act which provides power to issue directions for blocking for public access of any
information through any computer resource, or 69B of the Information Technology Act which speaks
about power to authorize to monitor and collect traffic data or information through any computer
resource for cyber security. Open clauses of provisions may prove extremely dangerous for protection of
freedom of speech and expression and also privacy of individuals, especially when Section 354D of the
IPC has been categorised as non-baliable offence with punishment for an imprisonment term amounting
from one to three years and with fines. This makes the law anti-therapeutic in its nature.
D. SENTENCING POLICY
Section 354D of the IPC suffers from another major drawback in its sentencing policy. This provision
has made cyber stalking essentially a criminal act and, as such, has prescribed criminal recourse for the
same. The provision has made the offence of stalking (including cyber stalking) a cognizable, but
bailable offence. As per this provision, it is punishable with imprisonment for a maximum period of
three years with fine in the case of first conviction. However, for the second conviction, the offence has
been made cognizable, non-bailable and punishable with imprisonment for a period of maximum five
years with fine. In both cases, the provision has empowered “any magistrate” to try the offence.
However, this provision as such, does not prescribe any civil remedy like the US or UK laws by ways of
restraining orders, including no- contact orders which may prevent the stalker from contacting the
victim. It is broadly assumed that once the accused is arrested and imprisoned, his devices would be
ceased by the police and he would not be allowed to use any means to communicate with the victim but
this is not necessarily true.
16
VIII. CONCLUSION
Indian laws are competent and well drafted to punish traditional offences on the physical space but the
same cannot be said of cyber space. One of the major reasons for this is the continuous growing and
evolving nature of cyber space, unlike physical space. Cyber socializing has opened the gateway to a
global village which forms its own culture, rules, ethics and ethos. Due to these reasons, what shape the
crimes might take place is still not fully foreseen; cyber stalking is one such crime. Due to risk or fear
of getting abused in the society, nearly half of the victims try to just hush up and ignore such stalking
as a bad dream. However, the issue of cyber stalking, being very sensitive, must be addressed
immediately as it leaves a deep scar on the victim’s psyche if left unaddressed.
Cyber stalking in the contemporary world is of utmost importance and it is a general trend of the masses
to ignore cyber stalking. Hence, there is a pivotal need for an awareness regarding this heinous-online-
abuse should be spread amongst the people. Likewise, existence of the legal remedies to curb it must
be brought to the knowledge of masses as it is the only silver lining in the dark clouds to dispel the
atrocious darkness of cyber stalking. It completely intrigues me and leaves me bewildered as to the
reason for there being almost no landmark judgement elucidating and expanding Section 354D in order
to curb the rising stalkers found these days.
17