0cyber Tort
0cyber Tort
0cyber Tort
• Malice,
• Premeditation,
• Repetition,
• Obsession,
• No legitimate purpose,
• Disregarded warnings to stop,
• Harassment and threats.
• False accusations. Many cyberstalkers try to damage the
reputation of their victim and turn other people against them.
They post false information about them on websites. They
may set up their own websites, blogs or user pages for this
purpose. They post allegations about the victim to
newsgroups, chat rooms, or other sites that allow public
contributions such as Wikipedia or Amazon.com
• Attempts to gather information about the victim.
Cyberstalkers may approach their victim's friends, family and
work colleagues to obtain personal information. They may
advertise for information on the Internet, or hire a private
detective.
• Monitoring their target's online activities and
attempting to trace their IP address in an effort to
gather more information about their victims.
• Encouraging others to harass the victim. Many
cyberstalkers try to involve third parties in the
harassment. They may claim the victim has harmed
the stalker or his/her family in some way, or may
post the victim's name and telephone number in
order to encourage others to join the pursuit.
• False victimization The cyberstalker will claim that the
victim is harassing him/her.
• Attacks on data and equipment. They may try to damage
the victim's computer by sending viruses.
• Ordering goods and services. They order items or
subscribe to magazines in the victim's name. These often
involve subscriptions to objectionable materials delivered
to the victim's workplace.
• Arranging to meet. Young people face a particularly high
risk of having cyberstalkers try to set up meetings
between them.
TYPES
• Stalking by strangers
• According to Joey Rushing, a District Attorney
of Franklin County, Alabama, there isn't a
single definition of a cyberstalker, and they can
be either strangers to the victim or have a
former/present relationship. "[Cyberstalkers]
come in all shapes, sizes, ages and
backgrounds. They patrol Web sites looking for
an opportunity to take advantage of people."
• Gender-based stalking
• Harassment and stalking because of gender online
is common, and can include rape threats and
other threats of violence, as well as the posting of
the victim's personal information. It is blamed for
limiting victims' activities online or driving them
offline entirely, thereby impeding their
participation in online life and undermining their
autonomy, dignity, identity, and opportunities.
• Of intimate partners
• Mass mailing
• Mass mailing consists of sending numerous duplicate mails
to the same email address. These types of mail bombs are
simple to design but their extreme simplicity means they
can be easily detected by spam filters. Email-bombing
using mass mailing is also commonly performed as a DDoS
attack by employing the use of "zombie"botnets;
hierarchical networks of computers compromised
by malware and under the attacker's control. Similar to
their use in spamming the attacker instructs the botnet to
send out millions or even billions of emails,
• but unlike normal botnet spamming, the emails are all
addressed to only one or a few addresses the attacker wishes
to flood. This form of email bombing is similar in purpose to
other DDoS flooding attacks. As the targets are frequently the
dedicated hosts handling website and email accounts of a
business, this type of attack can be just as devastating to both
services of the host.
• This type of attack is more difficult to defend against than a
simple mass-mailing bomb because of the multiple source
addresses and the possibility of each zombie computer
sending a different message or employing stealth techniques
to defeat spam filters.
• List linking
• List linking means signing a particular email address up to
several email list subscriptions. The victim then has to
unsubscribe from these unwanted services manually. In order
to prevent this type of bombing, most email subscription
services send a confirmation email to a person's inbox when
that email is used to register for a subscription. This method
of prevention is easily circumvented: if the perpetrator
registers a new email account and sets it to automatically
forward all mail to the victim, he or she can reply to the
confirmation emails, and the list linking can proceed.
• Zip bombing
• A ZIP bomb is a variant of mail-bombing. After most commercial
mail servers began checking mail with anti-virus software and
filtering certain malicious file types, EXE, RAR, Zip, 7-Zip, mail
server software was then configured to unpack archives and
check their contents as well. A new idea to combat this solution
was composing a "bomb" consisting of an enormous text file,
containing, for example, only the letter z repeating millions of
times. Such a file compresses into a relatively small archive, but
its unpacking (especially by early versions of mail servers)
would use a greater amount of processing, which could result in
a DoS (Denial of Service).
DATA BREACH
• A data breach is an incident in which
sensitive, protected or confidential data has
potentially been viewed, stolen or used by an
individual unauthorized to do so. Data
breaches may involve personal health
information (PHI), personally identifiable
information (PII), trade secrets or intellectual
property.
• The most common concept of a data breach
is an attacker hacking into a corporate
network to steal sensitive data. However, not
all data breaches are so dramatic. If an
unauthorized hospital employee views a
patient's health information on a computer
screen over the shoulder of an authorized
employee, that also constitutes a data
breach.
• A number of industry guidelines and government compliance
regulations mandate strict governance of sensitive or
personal data to avoid data breaches. Within a corporate
environment, for example, the Payment Card Industry Data
Security Standard (PCIDSS)dictates who may handle and use
sensitive PII such as credit card numbers, PINs and bank
account numbers in conjunction with names and addresses.
Within a healthcare environment, the Health Insurance
Portability and Accountability Act (HIPAA) regulates who may
see and use PHI such as name, date of birth, Social Security
number and health history information.
• If anyone who is not specifically authorized to
do so views such information, the corporation
or healthcare organization charged with
protecting that information is said to have
suffered a data breach. If a data breach results
in identity theft and/or a violation of
government or industry compliance mandates,
the offending organization may face fines or
other civil or criminal prosecution.
Scottrade announces data breach affecting 4.6M customers
• “the concept of obscenity would differ from co
untry to countrydepending on the standards of
morals of contemporary society”.And that
obscenity has a tendency to deprave and
corrupt thosewhose minds are open to such
immoral influences”
Miller test
• Facts –
• Avnish Bajaj – CEO of Baazee.com, a customer-to-customer website, which
facilitates the online sale of property. Baazee.com receives commission
from such sales and also generates revenue from advertisements carried on
its web pages.
• An obscene MMS clipping was listed for sale on Baazee.com on 27th
November, 2004 in the name of “DPS Girl having fun”. Some copies of the
clipping were sold through Baazee.com and the seller received the money
for the sale.
• Avnish Bajaj was arrested under section 67 of the Information Technology
Act, 2000 and his bail application was rejected by the trial court. He then
approached the Delhi High Court for bail.
Findings of the court
• It has not been established from the evidence that any publication took place by the
accused, directly or indirectly.
• The actual obscene recording/clip could not be viewed on the portal of Baazee.com.
• The sale consideration was not routed through the accused.
• Prima facie Baazee.com had endeavored to plug the loophole.
• The accused had actively participated in the investigations.
• The nature of the alleged offence is such that the evidence has already crystallized
and may even be tamper proof.
• Even though the accused is a foreign citizen, he is of Indian origin with family roots
in India.
• The evidence that has been collected indicates only that the obscene material may
have been unwittingly offered for sale on the website.
• The evidence that has been collected indicates that the heinous nature of the
alleged crime may be attributable to some other person.
Decision of the court
• The petitions have been clubbed into one petition.
The petitions seek tochallenge summoning orders
issued against the petitioner over certain paintings
which celebrate nudity. The Ld. ACMM, Delhi
issued summons to
the petitioner for various offences Under Section 2
92/294/298 of theIndian Penal Code ('IPC' for short
) against which the present revisionpetitions have
been filed.
Vaibhav Jain v. Vice Chancellor, Devi Ahilya Vishwa Vidyalaya &
OrsMadhya Pradesh HC, W.P 837 and 859/2001. Date of Judgment-3/1/2002.