SUBMITTED TO

SUBMITTED TO:
DR. K.V.K. SANTHY
NALSAR UNIVERSITY OF LAW.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

HYDERABAD.

SUBMITTED BY:
JASMEEN KAUR VERMA
2017 -1LLM -18
NALSAR UNIVERSITY OF LAW.

HYDERABAD.

ACKNOWLEDGEMENT
I would like to express a special thank you to Assistant Professor Mrs. K.V.K. SANTHY who was always willing to assist me in the elaboration of this seminar paper. Her suggestions and comments were valuable for a more in depth analysis of this complex topic. I was only able to conduct a timely case study for research due to her well- structured timeline methodology for the research paper.

I would like to express my gratitude to my parents and my friends who always helped me during the academic year in managing my research. I felt inspired and motivated by their constructive suggestions.

TABLE OF CONTENTS:
OBJECTIVES……………………………………………………………………………………………………………………….

RESEARCH METHODOLOGY……………………………………………………………………………………………………..

INTRODUCTION………………………………………………………………………………………………………………………..

MEANING OF CYBERBULLYING……………………………………………………………………………….

CYBER BULLYING VERSUS TRADITIONAL BULLYING……………………………………………..

FORMS AND MEDIUMS USED TO CYBER BULLY……………………………………………………
-METHODS OF CYBER BULLYING……………………………………………………
-STATISTICS OF CYBER BULLYING IN INDIA…………………………………..

LITERATURE REVIEW……………………………………………………………………………………………..

INSTANCES OF CYBER BULLYING…………………………………………………………………………….

PREVENTION OF CYBER BULLYING…………………………………………………………………………..

LAWS THAT GOVERN CYBER BULLYING IN INDIA………………………………………………………
BLUE WHALE CHALLENGE………………………………………………………………………………………..

COMPARATIVE STUDY………………………………………………………………………………………….

CONCLUSION…………………………………………………………………………………………………………
BIBLIOGRAPHY…………………………………………………………………………………

Objectives-
The effects of cyber bullying are more damaging than the traditional bullying and have longer lasting effects. The effects can be social, emotional and academic maladjustment of the victim, which will be identified by the research.
1. To investigate the extent of cyber bullying in India and how it is not defined in any statute. And, how games such as the blue whale are affecting teenagers and pre teenagers emotionally.
2. To explore the vacuum that exists in the laws especially which do not protect minors and how the laws which exist are explicitly protecting women?
Research methodology-
The nature of this research is doctrinal and comparative. The comparison will be done with countries that have explicitly mentioned cyber bullying and have criminalised the same and have child protective laws. The countries that will be used as a comparative study are the Canada and the UK.
Research problem –
The problem of cyber bullying has been in the foray since the time internet has been an integral part of everyone’s daily lives. The problem of cyber bullying is a common problem for almost everyone. The most targeted are women and children. Though women in India are protected under various provisions of the Indian Penal Code and the IT Act, 2000, there are only UGC regulations with regard to ragging and bullying in higher educational institutions and nothing with regard to schools, making children between the ages 12-17 the most vulnerable. And with new games like the blue whale coming into the arena of internet entertainment, this is causing more trouble for teenagers and the authorities with new technology coming into the markets every day, troubles for authorities with regard to the kind of laws that need to be implemented.
Research questions-
1. Is there a need to define cyber bullying legally and exclusively?
2. Is there a need to introduce laws specifically to cyber bullying with respect to protecting minors?

INTRODUCTION
Cyber bullying-
The definition of cyber bullying in general terms is defined as:
“Wilful and repeated harm inflicted through the use of computers, cell phones and other electronic devices.”
Cyber bullying is when a child, preteen or even a teenager is mentally tortured, pressured, harassed by anyone else by employing cell phones, internet or the digital exposure. In cyber bullying the victim is almost always a child, preteen or teenager. If the victim is an adult, it is then cyber stalking or cyber harassment.
Who cyber bullies?
Can come from any economic, cultural, or religious background
Lack empathy
Are concerned with their own desires rather than those of others
Lack empathy
Are concerned with their own desires rather than those of others
Find it difficult to see things from someone else’s perspective
Are willing to use others to get what they want
Why do youth cyber bully-
When it comes to cyber bullying, they are often motivated by anger, revenge or frustration. Sometimes they do it for entertainment or because they are bored and have too much time on their hands and there are too many tech toys available to them. Many do it for laughs or to get a reaction.

Signs of being cyber bullied-
Emotional
Social/Behavioral
Academic
Emotional signs-
Withdrawal or shyness
Depression
Moody
Irritable
Anxiety
Aggressive behavior
Suicide ideation
Loss of self-esteem
Social and behavioural signs-
Suddenly stops using computer
Upset after using computer or cell phone
Changes in eating or sleeping habits (e.g., nightmares)
No longer wanting to participate in activities once enjoyed
Hurting self, attempting or threatening suicide
Academic-
Not wanting to go to school
Skipping school
Lost interest in school
Drop in grades
Similarities between Cyber bullying and Traditional Bullying
Although generally different, cyber bullying and the traditional bullying share three primary characteristics –
(a) The behaviour is aggressive.

(b) There is a power imbalance between the victim and the perpetrator; and
(c) The behaviour is repeated.
In terms of aggressive behaviour, traditional bullying incorporates three forms of aggression: physical, verbal, emotional and psychological. This final form is a fundamental similarity between traditional bullying and cyber bullying. Often, the power imbalance in schoolyard bullying will be between a dominant child who has the ability to assert his power, control, and fear over a child who has a more passive presence.
For instance, a recent trend in cyber bullying has shown that teachers are increasingly becoming the targets of cyber bullies. A survey conducted in England “of 630 secondary school, 9 teachers and support staff found that 15% had been bullied online. Students have set up ‘hate”‘ groups on social networking sites calling for specific teachers to be sacked and have even created fake profiles in their names containing defamatory information.” One specific incident involved students who created a Face book page in the name of a teacher, listing “underage sex with both boys and girls” as one of his interests. There were also groups set up that aggressively called for the firing of “perfectly competent, yet firm, teachers.”Repetition, the final similarity, may not be as obvious in cases of cyber bullying as it is in traditional bullying. However, similar to schoolyard bullying, which can occur daily, victims of cyber bullying may have repeated encounters with their tormentors because they are unable to escape nasty messages posted online due to the inherent permanence of cyberspace.
Differences-
Although cyber bullying achieves a similar objective to traditional bullying, including the assertion of power, it has its own distinct characteristics and methods.

Anonymity – One of the most powerful and fearful characteristics of cyber bullying is anonymity. A victim bullied in the playground knows the identity of his tormentor. However, when a bully acts online, even though the victim may have an idea of who the bully could be, without knowing the actual identity the victim may feel uneasy, distrustful, and wary or all of his relationships. Furthermore, anonymously delivered speech containing more serious language, such as threats, heighten the level of fear instilled in the victim because of her inability to gauge the seriousness of the threat.

A recent study carried out by the National Institutes of Health has shown that victims of cyber bullying can suffer from higher levels of depression than those subjected to traditional bullying because the online attacks are more likely to leave the victim feeling isolated, dehumanized or helpless.

Scope-Another significant difference between traditional bullying and cyber bullying is scope. In one sense, the victim and the cyber bully could be separated by thousands of miles, and yet the damage could potentially be the same as if they were face-to-face, especially if the identity of the perpetrator is unknown. Via the Internet, it now only takes a few key strokes or clicks of the mouse to instantly communicate with millions of users around the world. Unlike traditional methods of bullying that are limited to in-person interactions, people are now “no longer constrained by the volume of their voice.

Role of bystanders- A final major difference between traditional bullying and cyber bullying is the role of bystanders. Most bystanders of traditional bullying usually stand by and watch with a handful either encouraging the perpetrator or attempting to defend the victim. In terms of cyber bullying, an innocent-or not so innocent by stander could become a participant in the activity if the perpetrator uses the by stander’s online screen-name or email to send upsetting messages. Online bystanders may also participate in tormenting a victim because they are unable to gauge the recipient’s emotional response, or because they feel protected by the anonymity the Internet provides. These characteristics can quickly blur the lines between a bystander and a cyber bully. This highlights the need to punish those who encourage cyber bullying rather than waiting until bystanders become uncontrollably involved.

Forms and Mediums Used to Cyber bully
In order to write effective anti-cyber bullying legislation, lawmakers need to be aware of the technology and forms used to engaging in such activity. Cox Communication conducted a survey on 13-18 year olds and found that 15% of those teenagers had been cyber bullied online and 10% via their cell phones. Further, 7% of the teenagers admitted bullying another person online, and 5% admitted bullying another using their cell phones. The Internet and cell phones can be used in different ways to cyber bully, including the use of social networks such as MySpace, Face book.
1) Social Networking Websites-
Many of the cyber bullying stories that make national and global headlines involve adolescents bullied on a social networking website. The frequency of cyber bullying on social networks can be tied to the fact. That millions of people are active users of such networks, spending extraordinary amount of time on them.

The Federal Bureau of Investigation has defined social networking sites as “websites that encourage people to post profiles of themselves complete with pictures, interests, and even journals-so they can meet like-minded friends.” Such information posted on online networks provides others with a real time look at what people are doing, who their friends are, their likes and dislikes, their relationship status, how their day is going, etc. With the availability of such information, cyber bullies can easily reach a large audience that has close ties to the victims without having to expend much effort. Perpetrators can share embarrassing pictures, videos, and comments with hundreds of people with a click of a button, portraying the breadth of an audience cyber bullying can reach and the inability to contain the message once it is released.

2) SMS
Another common medium used to cyber bully is Simple Message Service, or SMS (text messaging). A survey by the Pew Research Centre’s Internet & American Life Project found that 75% of 12-17 year olds have mobile phones, and text messages are primarily used to communicate with peers. Texting is a functional and efficient way to keep connected with people through the exchange of short messages. The problem is that text messaging is not just used to let people know that you are connected to them. Many Internet based services now allow people to send anonymous text messages, providing cyber bullies with the opportunity to exploit victims by sending harassing, hurtful, or intimidated messages.
3) Instant Messaging and Email
Another Internet based medium used for cyber bullying is Instant Messaging. Instant Messaging “refers to real-time communication through the Internet with individuals on one’s contact list.” There are various ways perpetrators can cyber bully over IM services, including adopting fake screen names to anonymously send harmful messages to the target victim, or falsely assuming the victim’s identity to send such messages to others. Slightly easier to distribute than Instant Messages are emails, which are the most frequently used means of digital communication. Emails can be forwarded to hundreds of people by clicking a single button and the original sender may remain anonymous due to an inability to track the email back to its source. Furthermore, just like online SMS services, there are many proxy email services available to cyber bullies, enabling them to create fictitious email accounts from which to send harassing messages.
4) Photoshop
A medium of cyber bullying that can be incorporated into almost all other mediums mentioned above are certain types of software such as Photoshop. Cyber bullies may use such software to edit pictures that their victims posted on social network profiles in a way that would potentially embarrass them, and then use their own profiles, emails, or instant messaging services to circulate such photographs.
5). Other Mediums
Other common mediums used to cyber bully include chat rooms, dating websites, and blogs. These all have the common characteristic of posting or sending harmful messages similar to those in SMSs, IMs and E-mails.
Methods of Cyber bullying
In addition to knowing the mediums used for cyber bullying, lawmakers also need to be aware of the methods used.
Flaming- Flaming “is a heated, short-lived argument that occurs between two people.” It usually takes place in public online forums and settings, such as chat rooms and discussion groups, and involves the exchange of offensive, rude, and vulgar language, sometimes escalating to insults and threats.
2. Harassment -Often, cyber bullying and cyber harassment are almost indistinguishable from each other. Harassment is defined as “words, conduct, or action usually repeated or persistent that, being directed at a specific person, annoys, alarms, or causes substantial emotional distress in that person and serves no legitimate purpose.” In a cyber bullying context, this can be seen as the repetitious sending of offensive messages through both private channels, such as e-mails and instant messages, and public forums, such as chat rooms and discussion groups.

3) Denigration -Denigration is a means by which the perpetrator spreads comments about the victim that are harmful, untrue, or cruel. This information may be posted on websites and social network profiles, or it may be sent to others via email or instant messaging. The purpose is to send it to others in the hopes that it will interfere with the victim’s relationships or damage the victim’s reputation. Many of the cyber bullying cases that have made headline news have involved this method of cyber bullying.
4) Impersonation- Impersonation involves the perpetrator assuming the victim’s identity, and using it to send negative, cruel, or inappropriate messages to others. The perpetrator may be a person the victim considered a good friend whom he entrusted with his own password, only to find that his “friend” has used his access to the victim’s account to the detriment of the victim. Some recent cases in both England and America have involved a perpetrator impersonating a third party in order to form close ties with the victim, only to then use those ties to bully the victim.

Statistics of cyber bullying in India
According to the website cyberbullying.org – India ranks 3rd on Global Cyber Bullying list; after China and Singapore. The project was commissioned by Microsoft to understand the global pervasiveness of online bullying.
Around 7600 children between the ages 8-17 were surveyed:
22% of children reported mean or unfriendly behaviour.

29% were made fun of or teased.

25% were called mean names.
70% know of online bullying
Another survey conducted by IPSOS, India topped the list of 254 countries.
32% parents knew their children were cyber bullied.
18% in Canada and Saudi Arabia faced cyber bullying
15% in the United States.
India on a regular basis 13% intensity of cyber bullying cases.

Literature review
Mehta Ashna, Cyber bullying- An Indian Perspective
The author has defined Cyber bullying as a form of electronic communication which harms the reputation or privacy of an individual, or threatens, or harasses, leaving a long lasting impact.
The paper aims at introducing the concept stalking, effects and consequences, remedies available under Criminal Laws and Information Technology Act, and its prevention. The objective of the paper is to discuss international laws prevailing and provision of cyber bullying in other countries while highlighting the need for defining cyber bullying from Indian perspective, making specific regulations against it, and the experts needed in making for such law.

Instances of cyber bullying-
In India, a 24 year old male resident was arrested for cyber bullying a 13 year old girl by sending her obscene videos, he created a fake account on social media by posing as a girl and after the minor accepted his friend request he started sending her obscene videos. But the case could not be pursued because of lack of evidence and formal enactment on cyber bullying.

Ryan Halligan, 13 years old. In October 2003 he took his own life after months of being bullied online. He was teased, taunted, called “gay” online and off.
Prevention of cyber bullying-
For Parents
For Educators
For Law Enforcement Officers
For Community Partners
Parents- Learn what teens are doing online and keep track of their online behavior.

Use the Internet with your children.

Talk with youth about cyber bullying—the consequences and harmful effects.

Communicate online rules and responsibilities to youth.

Keep computers in a highly trafficked room where online activities are hard to hide.
Educators-
Request that youth sign an Internet safety pledge promising not to cyber bully.

Establish acceptable Internet use and anti-cyber bullying policies in school.

Talk to and educate students on the issue of cyber bullying. Let students know where they can turn for help.

Educate parents on the importance of creating Internet use rules at home.

Law enforcement officers-
Stay up-to-date on cyber bullying issues and laws.

Educate yourself on the latest technologies youth use.

Speak out to students, parents, and educators about the dangers of the Internet.

Talk with school officials about creating an anti-cyber bullying policy on school grounds
Laws that govern cyber bullying in India-
Section 507 of IPC
Section 499 of IPC
Section 354 A and 354 D of IPC
Section 66E of the IT Act, 2000
Section 507 of Indian penal code-507. Criminal intimidation by an anonymous communication. Whoever commits the offence of criminal intimidation by an anonymous communication, or having taken precaution to conceal the name or abode of the person from whom the threat comes, shall be punished with imprisonment of either description for a term which may extend to two years, in addition to the punishment provided for the offence by the last preceding section.

Section 499 of Indian penal code-499. Defamation.—Whoever, by words either spoken or intended to be read, or by signs or by visible representations, makes or publishes any imputation concerning any person intending to harm, or knowing or having reason to believe that such imputation will harm, the reputation of such person, is said, except in the cases hereinafter expected, to defame that person.
Section 354 A-SEXUAL HARRASMENT-A man committing any of the following acts—
physical contact and advances involving unwelcome and explicit sexual overtures; or
a demand or request for sexual favours; or
showing pornography against the will of a woman; or
Making sexually coloured remarks, shall be guilty of the offence of sexual harassment.

Any man who commits the offence specified in clause (i) or clause (ii) or clause (iii) of sub-section (1) shall be punished with rigorous imprisonment for a term which may extend to three years, or with fine, or with both.

Any man who commits the offence specified in clause (iv) of sub-section (1) shall be punished with imprisonment of either description for a term which may extend to one year, or with fine, or with both.

SECTION 354D- STALKING
(1) Any man who—
follows a woman and contacts, or attempts to contact such woman to foster personal interaction repeatedly despite a clear indication of disinterest by such woman; or
monitors the use by a woman of the internet, email or any other form of electronic communication,commits the offence of stalking;Provided that such conduct shall not amount to stalking if the man who pursued it proves that—
it was pursued for the purpose of preventing or detecting crime and the man accused of stalking had been entrusted with the responsibility of prevention and detection of crime by the State; or
it was pursued under any law or to comply with any condition or requirement imposed by any person under any law; or
In the particular circumstances such conduct was reasonable and justified.

(2) Whoever commits the offence of stalking shall be punished on first conviction with imprisonment of either description for a term which may extend to three years, and shall also be liable to fine; and be punished on a second or subsequent conviction, with imprisonment of either description for a term which may extend to five years, and shall also be liable to fine.

SECTION 66E OF INFORMATION TECHONOLOGY ACT 2000-. Punishment for violation of privacy.- Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both .
Blue whale challenge
Cases of blue whale in India
Blue Whale Challenge: India ranks no. 1 for highest Blue Whale related searches worldwide, says Google data
A Google Trends report of the last 12 months shows that India has seen the highest number of searches related to the Blue Whale Challenge in the world.
Blue Whale name comes from the fact that blue whales occasionally beach themselves intentionally and die.Inventor- the blue whale challenge was developed by a Russian psychology student, Philip budeikin. He was expelled from his university and said in a statement that he invented the game to clean the society of people who are of no value.

why the Why the name – Blue Whale name comes from the fact that blue whales occasionally beach themselves intentionally and die.

ORIGIN: The killer online game originated in Russia and has now spread to other parts of the world. It is not freely available and is not a downloadable game, app or software. It is shared among very secretive groups on social media networks. Many reports suggest that you don’t choose to play Blue Whale; the creators seek you out and send you an invitation to join.

HOW IS IT PLAYED? An online administrator gives the player challenges over a period of 50 days. After completion of every task, the player is expected to share photo as proof for approval. The first few challenges are easy but the subsequent ones turn sinister, challenging you to hurt yourself. They are meant to condition you to ultimately commit suicide. The tasks are ‘adaptable’ and are tweaked by the curator as per the geographical location of the player.

WHO IS THE JUDGE? The admins control the challenges. People have tried to use photo-shopped images as proofs, but the perception is that they cannot be fooled. One reporter from a European Radio station tried it and was caught out and they stopped communicating with him.HOW DO THEY FIND YOU? You cannot find the admin or download. The admins find you. They generally scour the internet and ferret out those who are depressed or have displayed other psychological traits that make them vulnerable, or ideal targets, to be contacted. These could be looking at target’s public profile, Instagram and other social posts, etc. The curator or admins also seek out people from death groups and suicide squads on VK.com aka Vkontakte, the largest online social media and network in Russia.

IS THE GAME KNOWN BY OTHER NAMES? Yes, there are several other names that are used. With the name Blue Whale getting blocked from across social media platforms, there are other names of the game that have originated. These names include ‘A Silent House’, ‘A Sea of Whales’, ‘Wake Me Up At 4.20 am’WHY CAN’T YOU STOP MIDWAY? Theory is that once they admit you as a player, you have to accept a cookie and that gives them access to your entire data online. And this data is the lever they have to blackmail anyone who wants to back out. Cases abound of the admins blackmailing and cyber bullying such individuals into completing all tasks. They threaten to hurt their family or reveal all his personal data online.

WHY CAN’T THE GAME BE BLOCKED? It is far from a game, there is not a single person or unit who is managing it. As the investors of the game have been put behind the bars, many wonder how it is spreading. It is simply because of the various mirrors games that have now been created and carried over by many curators who are spread far and wide. The authorities are trying everything to end this game.
It is so scattered and decentralised that banning it is not possible to tack the IP addresses of the curators has also not yielded desirable results so far.
Symptoms’ of being a victim of blue hale challenge
-recent tendency in the child
– Any changes in diet or sleep pattern of child – Any cuts or wounds on the body – Staying up at night around 4:20 amHOW IS IT PLAYED? An online administrator gives the player challenges over a period of 50 days. After completion of every task, the player is expected to share photo as proof for approval. The first few challenges are easy but the subsequent ones turn sinister, challenging you to hurt yourself. They are meant to condition you to ultimately commit suicide. The tasks are ‘adaptable’ and are tweaked by the curator as per the geographical location of the player.

Comparative study
Cyber bullying in UK-Under UK legislation there is not a specific law which makes cyber bullying illegal, although it can be considered a criminal offence under legislation such as the Protection from Harassment Act and the Criminal Justice and Public Order Act.

CYBER BULLYING IN CANADA-
Civil Law
Under Canadian civil law, there is protection against defamation. Defamation is harm caused to a person’s reputation because the cyber bullying spreads false information. The person harmed must be the obvious target and the false information needs to be presented to people other than the person targeted.

Defamation – Slander and Libel
Defamation comes in two forms, which are 1) Slander, and 2) Libel. Slanderous things are spoken, not recorded, and exist temporarily. An example of slander is, the cyber bully calls by telephone and then makes verbal insults and false accusations directed specifically at a certain person, while the bully’s phone is on speaker, so others in the room with the bully hear the conversation. Libellous things are more permanent like publication in a newspaper, magazine, book, or on a public website.

The recourse for these types of defamation attacks is to sue the cyber bully. Slander is difficult to prove and impossible to prove without credible witnesses who give testimony in court. Libel is possible to prove. The defence for a libel lawsuit is, if the statement is actually true, a genuine criticism, or reproduced innocently without knowing it, then it is not libel.

An example of libel is a post on Face book stating that a certain girl had sex with many guys, when she is actually still a virgin. A statement that is not libel would be a Face book posting about a girl saying she is fat, if the girl is medically overweight (obese). Although this statement is hurtful, it is not libel because it is actually true.

Criminal law-
Prosecution for cyber bullying under Canadian criminal law, not including the new changes mentioned above, is for one of two things, which are: 1) Harassment, and 2) Defamatory libel.

Harassment is a crime when a cyber bully makes another person fear for his or her safety or the safety of others. The punishment in Canada for a conviction of criminal harassment is a prison sentence up to ten years long.

Defamatory libel is charged against a person when an authority is attacked by a libellous action that seriously harms their reputation. In these rare cases, freedom of expression under the Canadian Charter of Rights and Freedoms Section 2, balances against the Section 7 right to life, liberty and security of the person. This balance determines whether a conviction for criminal defamatory libel is made. A conviction has a punishment of a prison sentence of up to five years.

It is clear that Canadians take cyber bullying very seriously. With the implementation of the new law, cyber bullies in Canada will find it much more difficult to make anonymous attacks. Police in Canada now have increased latitude in conducting an investigation into cyber bullying. Hopefully this should, over the next few years, help reduce the negative impacts of cyber bullying in Canada.

It is an offence under Canada’s Criminal Code to share intimate images of a person without the consent of the person in the image. This offence came into force on March 10, 2015. This law applies to everyone, not just people under 18.The purpose of this offence are to protect the privacy a person has in his or her nudity or sexual activity.

With digital technology rapidly changing, there has been an increase of cyber bullying in the form of distributing intimate or sexual images without the consent of the person in the photo or video.

This type of behaviour can occur in a variety of situations. Often it appears to be a form of revenge: a person has willingly shared an intimate image of themselves with a boyfriend or girlfriend, and when the relationship ends, the partner may distribute those photos in what is sometimes called ‘revenge porn’.

Whatever the motivation, the impact of this kind of cyber bullying can be devastating to a person’s self-esteem, reputation and mental health. In some cases, these acts may have played a part in teens taking their own lives.

Judges now have the authority to order the removal of intimate images from the Internet if the images were posted without the consent of the person or persons in the image.

Anyone convicted of distributing an intimate image (An “intimate image” is defined as an image that depicts a person engaged in explicit sexual activity or that depicts a sexual organ, anal region or breast) without consent could face serious legal consequences. For example:
They could be imprisoned for up to five years;
Their computer, cell phone or other device used to share the image could be seized; and
They could be ordered to reimburse the victim for costs incurred in removing the intimate image from the Internet or elsewhere.

Conclusion-Therefore there is an urgent need for a separate legislation In order to curb the growing menace of the offence of cyber bullying. As the other countries such as Canada and U.K having proper legislation are having less cases of cyber bullying in comparison to India where there is no such independent legislation on cyber bullying.