{"id":347,"date":"2023-08-09T16:54:56","date_gmt":"2023-08-09T16:54:56","guid":{"rendered":"https:\/\/projects-dev.itforchange.net\/online-violence-gender-and-law-guide\/?page_id=347"},"modified":"2024-10-29T12:43:54","modified_gmt":"2024-10-29T07:13:54","slug":"2-8-doxxing","status":"publish","type":"page","link":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-8-doxxing\/","title":{"rendered":"2.8 Doxxing"},"content":{"rendered":"<div id=\"pl-347\"  class=\"panel-layout\" ><div id=\"pg-347-0\"  class=\"panel-grid panel-has-style\" ><div id=\"module-breadcrumbs\" class=\"panel-row-style panel-row-style-for-347-0\" ><div id=\"pgc-347-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-347-0-0-0\" class=\"so-panel widget widget_bcn_widget widget_breadcrumb_navxt panel-first-child panel-last-child\" data-index=\"0\"><div class=\"panel-widget-style panel-widget-style-for-347-0-0-0\"><div class=\"breadcrumbs\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">Navigate:<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to Online Gender-based Violence Judicial Resource Guide.\" href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\" class=\"home\" aria-current=\"page\"><span property=\"name\">Online Gender-based Violence Judicial Resource Guide<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-347-1\"  class=\"panel-grid panel-has-style\" ><div id=\"module-heading\" class=\"panel-row-style panel-row-style-for-347-1\" ><div id=\"pgc-347-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-347-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-6593f681471d-347 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\t<img class=\"alignnone size-thumbnail\" style=\"margin-right: 10px\" src=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-content\/uploads\/2023\/10\/12-150x150.png\" alt=\"\" width=\"60\" height=\"60\" \/> 2.8 Doxxing\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-347-2\"  class=\"panel-grid panel-has-style\" ><div id=\"module-content\" class=\"panel-row-style panel-row-style-for-347-2\" ><div id=\"pgc-347-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-347-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"2\" ><div id=\"m2-281\" class=\"panel-widget-style panel-widget-style-for-347-2-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.8.1 What is doxxing?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Doxxing refers to the act of publishing personal or identifying information or details about a person without consent, often with a call to others in the perpetrator\u2019s network to harass or threaten the person whose personal information is published. The information revealed could include the targeted person\u2019s name, address, phone numbers, email address, unique identifiers for government records, employment details, sexual preferences, personal photos, details of their close contacts like family, etc. As such, this information makes it possible to identify, locate, or contact the person. Doxxing constitutes a serious breach of the victim\u2019s privacy, and is usually committed with the objective of causing distress, panic, or alarm to the victim, by posing a threat to their safety as well as the safety of those around them, both in the online and the offline world. The personal information for committing doxxing is usually obtained by scouring public databases and social media profiles to gather information such as photos, location, and contact details. Such information may also be obtained directly from the victim speaking in confidence. Technologically equipped abusers use sophisticated means such as reverse phone lookup, running a search on a domain name, phishing, tracking an internet protocol (IP) address, etc., to obtain personal information about the targeted victim.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"1\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-1\">1<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-1\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"1\">Douglas, M. (2016). Doxxing: A Conceptual Analysis. <em>Ethics Inf Technol<\/em>, <em>18<\/em>, pp. 199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a> <\/span> Doxxing can also be an offshoot of voyeurism, when an image or video produced as part of a voyeuristic act is published online, thereby revealing the identity of the victim.<\/p>\n<p>Doxxing can take three major forms:<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"2\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-2\">2<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-2\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"2\">Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a><\/span><\/p>\n<ol>\n<li>Deanonymizing doxxing, where the identity of a previously anonymized individual is revealed.<\/li>\n<li>Targeting doxxing, where specific details of an individual that are usually private, obscure, or obfuscated, are targeted and revealed.<\/li>\n<li>Delegitimizing doxxing, where intimate personal details of a person are revealed to destroy their credibility.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"3\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-3\">3<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-3\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"3\">Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a><\/span><\/li>\n<\/ol>\n<p>While deanonymizing and delegitimizing doxxing can sometimes be used to expose wrongdoings and wrongdoers, thus serving public interest, all three forms of doxxing are unjustified if they humiliate, threaten, intimidate, or punish the subject of doxxing.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"4\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-4\">4<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-4\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"4\">Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf <\/a><\/span><\/p>\n<p>In India, the bulk of online bullying and harassment, including doxxing, is faced by women in public life, especially those who dare to transgress societal norms.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"5\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-5\">5<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-5\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"5\">Kasturi, S. (2022). <i>As Bulli Bai Creators Get Bail, The Risks of Normalising Violence Against Women. <\/i>The Wire. <a href=\"https:\/\/thewire.in\/women\/bulli-bai-app-creators-bail-women-violence-online\">https:\/\/thewire.in\/women\/bulli-bai-app-creators-bail-women-violence-online<\/a>.<\/span> A disturbing instance of doxxing in recent times is the creation of the open source applications called \u2018Sulli Deals\u2019 and \u2018Bulli Bai\u2019 which put images of several Muslim women, many of whom are vocal online, up for <i>auction<\/i>. Hosted on GitHub, the applications used photographs sourced from the women\u2019s social media handles without their consent.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"6\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-6\">6<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-6\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"6\">Salim, M. (2022).<i> \u2018Bulli Bai\u2019, 'Sulli Deals': On Being Put Up for \u2018Auction\u2019 as an Indian Muslim Woman.<\/i> The Wire. <a href=\"https:\/\/thewire.in\/communalism\/indian-muslim-woman-auction-bulli-bai\">https:\/\/thewire.in\/communalism\/indian-muslim-woman-auction-bulli-bai<\/a> <\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-347-2-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"3\" ><div id=\"m2-282\" class=\"panel-widget-style panel-widget-style-for-347-2-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.8.2 What is a gender-sensitive way to read a case of doxxing?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Regardless of the gender of the victim, doxxing breaches a person\u2019s privacy by taking control of their data without their consent. But, the \u201cpower dynamics of gendered hate online\u201d make women the more susceptible targets.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"7\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-7\">7<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-7\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"7\">WomanStats. (2021). <i>\u201cDoxxing\u201d And Online Threats: Why Women Are More Vulnerable to Internet Harassment. <\/i><a href=\"https:\/\/womanstats.wordpress.com\/2021\/03\/22\/doxxing-and-online-threats-why-women-are-more-vulnerable-to-internet-harassment\/\">https:\/\/womanstats.wordpress.com\/2021\/03\/22\/doxxing-and-online-threats-why-women-are-more-vulnerable-to-internet-harassment\/<\/a>.<\/span> Studies have shown that the gendered aspects \u201cshape the flow and suspected intent of doxxing and the ensuing harassment that victims experienced\u201d.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"8\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-8\">8<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-8\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"8\">Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/span> An act of doxxing against a woman, treats her data as a commodity without impunity, in a surveillance culture that already exploits women as producers and consumers of content for commercial purposes.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"9\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-9\">9<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-9\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"9\">Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/span><\/p>\n<p>Doxxing can limit the online participation of women, particularly those who are vocal on the internet and rely on it for their work and to express opinions. Revealing personal information that enables perpetrators to identify their victims in real life can expose women to myriad types of harassment such as online and offline stalking, death or rape threats,<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"10\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-10\">10<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-10\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"10\">Jens, K. (2015). <i>Looking for Evidence of Gender Inequality in Sexual Harassment on Twitter<\/i>. GenderITOrg. <a href=\"https:\/\/www.genderit.org\/resources\/looking-evidence-gender-inequality-sexual-harassment-twitter\">https:\/\/www.genderit.org\/resources\/looking-evidence-gender-inequality-sexual-harassment-twitter<\/a><\/span> cyberbullying, and real-world harms that include harassment of families or employment contacts, physical harm, sending offensive substances to their address, etc.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"11\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-11\">11<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-11\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"11\">Posetti, J., et al. (2021). <em>The Chilling: Global Trends in Online Violence against Women Journalists. UNESCO.<\/em> <a href=\"https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000377223\/PDF\/377223eng.pdf.multi\">https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000377223\/PDF\/377223eng.pdf.multi<\/a> <\/span><\/p>\n<p>Due to the greater susceptibility of women and other gender minorities to online violence, a gender-sensitive approach that goes beyond a simplistic privacy framework is necessary to reveal the full gendered impact of doxxing. Here, it may be useful to take note of Nissenbaum\u2019s theory of informational privacy as contextual integrity.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"12\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-12\">12<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-12\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"12\">Nissenbaum, H. (2004). Privacy as Contextual Integrity. <i>Washington Review<\/i>, 79(1). <a href=\"https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10\">https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10<\/a>.<\/span> As opposed to a traditional notion of privacy, with its strict dichotomy between the public and the private, and disclosure and secrecy, the contextual integrity approach recognizes that the particular social and political context determines what information about a person can be appropriately revealed. Such an approach takes into account how individuals use their discretion to share certain information about themselves in various contexts and relations. Thus, according to such an approach, even if a woman shares information about herself with a person or group online, she still has the right to control the flow of information pertaining to her. The contextual integrity approach is especially crucial in the digital space where the public and the private overlap.<\/p>\n<p>When adjudicating a case of doxxing, it is, therefore, necessary to examine whether the personal information shared by a woman in an online space she saw as \u201cexpected, intentional or desired\u201d<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"13\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-13\">13<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-13\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"13\">\u00a0Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/span> has been disseminated in other online spaces that are \u201cunexpected, unintentional and undesired\u201d by her.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"14\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-14\">14<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-14\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"14\">\u00a0Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-347-2-0-2\" class=\"so-panel widget widget_sow-editor\" data-index=\"4\" ><div id=\"m2-283\" class=\"panel-widget-style panel-widget-style-for-347-2-0-2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.8.3 Which laws are applicable?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Currently, India has no laws or statutory provisions that specifically penalize the act of doxxing. However, some acts that lead to doxxing are subject to criminal sanction. For instance, when information about a person is obtained through cyberstalking for the purpose of doxxing, the act of stalking may be dealt with under Section 354D of the Indian Penal Code (IPC). Similarly, doxxing a private image of a woman obtained through an act of voyeurism can be charged under Section 354C of the IPC and Section 66E of the Information Technology (IT) Act, 2000 (IT Act). Section 66 of the IT Act penalizes the act of hacking, but does not specifically criminalize hacking for the purpose of doxxing. Further, while Section 72 of the IT Act read along with Section 43 of the Act criminalizes the breach of confidentiality and privacy, both are framed as economic offenses and, therefore, not apt to deal with the gendered concerns raised by doxxing.<\/p>\n<p>Another useful provision is Rule 3(1)(b) of the Information Technology (Intermediary Liability and Digital Media Ethics Code) Rules, 2021 (IT Rules), that allows courts to direct internet intermediaries, such as social media platforms, search engines, etc., to remove specific content from their platform if such content invades another\u2019s privacy, including bodily privacy. This provision can help complainants ask for the removal of their personal information published by perpetrators, thereby limiting the harm from such publication.<\/p>\n<p>The legal lacunae in comprehensively addressing the issue of doxxing, particularly its differentiated impact on women and other gender minorities, is worrying. In such a situation, reports that the Ministry of Electronics and Information Technology is deliberating a new Digital India Act containing specific regulation to address the issue of doxxing are welcome.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"15\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-15\">15<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-15\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"15\">Barik, S. (2022). <i>New IT Act Looks to Rein In \u2018Deliberate\u2019 Misinformation. <\/i>Indian Express. <a href=\"https:\/\/indianexpress.com\/article\/technology\/tech-news-technology\/new-it-act-looks-to-rein-in-deliberate-misinformation-8027748\/\">https:\/\/indianexpress.com\/article\/technology\/tech-news-technology\/new-it-act-looks-to-rein-in-deliberate-misinformation-8027748\/<\/a> <\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-347-2-0-3\" class=\"so-panel widget widget_sow-accordion\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-accordion so-widget-sow-accordion-default-08b99853d3df-347\"\n\t\t\t data-max-open-panels=\"0\" data-initial-scroll-panel=\"0\"\n\t\t><div>\n\t<div class=\"sow-accordion\">\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\" aria-controls=\"accordion-content-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tCorresponding Bharatiya Nyaya Sanhita, 2023 (BNS) Provision\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\"\n\t\t\t\tid=\"accordion-content-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<ol>\n<li><span style=\"font-weight: 400;\"><strong>Section 78 of the Bharatiya Nyaya Sanhita, 2023 (Stalking):<\/strong> Under the IPC, the definition of stalking is given in Section 354D. However, in the BNS, it is an offense under Section 78. The elements of the offense are the same under both laws. Any man who repeatedly contacts a woman to foster personal interaction despite her clear disinterest, or monitors her use of the internet, email, or other electronic communication, commits the offense of stalking.<\/span><\/li>\n<\/ol>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div>\n<\/div><\/div><div id=\"panel-347-2-0-4\" class=\"so-panel widget widget_sow-editor\" data-index=\"6\" ><div id=\"m2-284\" class=\"panel-widget-style panel-widget-style-for-347-2-0-4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.8.4 How have courts dealt with the problem of doxxing?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4>2.8.4.1 <em>Subhranshu Rout @ Gugul v. State Of Odisha<\/em> (2020)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"16\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-16\">16<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-16\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"16\"><i>Subhranshu Rout @ Gugul v. State Of Odisha,<\/i> (2020) BLAPL No.4592 OF 2020, judgment dated 23 November 2020. Odisha High Court. <\/span><\/h4>\n<p>The lack of specific legal provisions limits the ability of the court to adopt a gender-sensitive approach to doxxing by addressing the privacy concern it raises. The court expressed this inability in this case. Here, the photos and videos of a rape victim were uploaded online by creating a fake Facebook account. The court noted that India\u2019s sentencing-oriented criminal justice system is not adequate to address the privacy infringement suffered by the victim, as it does not recognize the right to be forgotten, and does not contain provisions for getting photos erased from the server of the social media platforms permanently.<\/p>\n<h4>2.8.4.2 <em>X v. HTTPS : \/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0<\/em> (2021)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"17\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-17\">17<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-17\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"17\"><i>X v. <\/i><i>HTTPS:\/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0<\/i><i>, <\/i>CS(OS) 392\/2021, I.As.10543\/2021, 10544\/2021, 10545\/2021 &amp; 10546\/202, order dated 23 August 2021, High Court of Delhi. <\/span><\/h4>\n<p>A movie producer shot some video clips of an actress, offering her a lead role in exchange. Later, he uploaded these videos on his YouTube channel, unrelated to the movie, without her knowledge or consent. In this case also, the court correctly recognized the privacy issue involved, and upheld the petitioner\u2019s right to be forgotten, to be left alone, and to be free from unwanted intrusion into her privacy by strangers on account of the released videos. The court ordered the defendants to remove the video from the YouTube channel, and directed the search engines to remove the video from appearing in their search results pages and listing.<\/p>\n<h4>2.8.4.3 <em>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra @ Sneeha<\/em> (2020)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"18\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-18\">18<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-18\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"18\"> <i>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra<\/i> @ Sneeha, (2020) CS No. 20\/2020, judgment dated 13 February 2020, Delhi District Court.<\/span><\/h4>\n<p>In this case, the court awarded compensation to the petitioner for the acts of the defendant who posted provocative, derogative, and threatening comments against her on Facebook and WhatsApp groups, and circulated her phone numbers to strangers who then proceeded to troll the petitioner.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"19\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-19\">19<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-19\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"19\"><i>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra @ Sneeha, <\/i>(2020) CS No. 20\/2020, judgment dated 13 February\u00a0 2020, Delhi District Court.<\/span> This case shows how current criminal law provisions are wholly inadequate to deal with doxxing of personal information and breach of informational privacy resulting from it, forcing plaintiffs to resort to civil remedies.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-347-2-0-5\" class=\"so-panel widget widget_sow-editor\" data-index=\"7\" ><div id=\"m2-285\" class=\"panel-widget-style panel-widget-style-for-347-2-0-5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.8.5 How have other jurisdictions dealt with doxxing?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>The issue of doxxing has increasingly been gaining regulatory attention around the globe, and many countries are either proposing new statutory provisions or guidelines, or using existing provisions to deal with the offense. In 2016, the UK\u2019s Crown Prosecution Service issued guidelines to help prosecutors bring perpetrators of online harassment to justice.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"20\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-20\">20<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-20\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"20\">CPS. (2022). <i>Social Media and other Electronic Communications.<\/i> UK Government. <a href=\"https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media\">https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media<\/a> <\/span> A section of the Guidelines addresses violence against women and girls, and reminds prosecutors of the potential use of social media to exert power and control over women and girls by threatening to post their personal information on social media, in order to bring shame or to silence or coerce them.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"21\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-21\">21<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-21\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"21\">CPS. (2022). <i>Social Media and other Electronic Communications.<\/i> UK Government. <a href=\"https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media\">https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media<\/a> <\/span><\/p>\n<p>In the US, the House of Representatives is considering a bill for the Online Safety Modernization Act introduced by Congresswoman Katherine Clark to \u201ccombat the rise in online crimes that disproportionately affect women and girls\u201d.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"22\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-22\">22<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-22\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"22\">H.R.3067 - Online Safety Modernization Act of 2017. (United States).<\/span><\/p>\n<p>In South Australia, Section 19AA(1)(a)(ivb) of the Criminal Consolidation Act, 1935, considers doxxing as a stalking offense and punishes the perpetrator with three years in prison if the victim has been doxxed more than twice. The definition of stalking in this Section includes communicating about the victim with others or acting in a manner that is reasonably expected to arouse apprehension or fear in the victim.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"23\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-23\">23<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-23\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"23\">Criminal Consolidation Act, 1935, Section 19AA(1)(ivb) and (vi). (South Australia). <\/span> Further, Section 474.17 of the Commonwealth Criminal Code of Australia, which penalizes the use of a telecommunication service in a way that reasonable persons would regard as menacing, harassing, or offensive, is also used in cases of doxxing.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"24\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-24\">24<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-24\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"24\">Corbridge, A.<i> (n.d). Responding to Doxxing in Australia: Towards a Right to Informational Self-Determination.<\/i> University of South Australia. <a href=\"https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924\">https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924<\/a>.<\/span> However, both these statutory provisions are considered inadequate as a potential victim may be doxxed by multiple persons at the same time, and it is ambiguous when a reasonable person would deem the publication of personal information as menacing, harassing, or offensive.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"25\" data-mfn-post-scope=\"0000000000002ded0000000000000000_347\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002ded0000000000000000_347-25\">25<\/a><\/sup><span id=\"mfn-content-0000000000002ded0000000000000000_347-25\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"25\">Corbridge, A.<i> (n.d). Responding to Doxxing in Australia: Towards a Right to Informational Self-Determination.<\/i> University of South Australia. <a href=\"https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924\">https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924<\/a><i> ;<\/i> Anderson, B., &amp; Wood, M. A. (2021). <i>Doxxing: A Scoping Review and Typology. <\/i>The Emerald International Handbook of Technology-Facilitated Violence and Abuse. <a href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/978-1-83982-848-520211015\/full\/html\">https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/978-1-83982-848-520211015\/full\/html<\/a>.<\/span><\/p>\n<p>Singapore contains a gender-neutral provision to deal with doxxing. Section 3 of the Protection from Harassment Act, 2014, considers doxxing as a form of harassment, and penalizes the publication of any part of the identity of or information about a targeted individual, or a person related to the targeted individual, with the intent to cause harassment, alarm, or distress.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-347-2-0-6\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"8\" ><div id=\"module-footnotes\" class=\"panel-widget-style panel-widget-style-for-347-2-0-6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Footnotes<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul class=\"modern-footnotes-list \"><li><span>1<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <em>Ethics Inf Technol<\/em>, <em>18<\/em>, pp. 199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a> <\/div><\/li><li><span>2<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a><\/div><\/li><li><span>3<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a><\/div><\/li><li><span>4<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf <\/a><\/div><\/li><li><span>5<\/span><div>Kasturi, S. (2022). <i>As Bulli Bai Creators Get Bail, The Risks of Normalising Violence Against Women. <\/i>The Wire. <a href=\"https:\/\/thewire.in\/women\/bulli-bai-app-creators-bail-women-violence-online\">https:\/\/thewire.in\/women\/bulli-bai-app-creators-bail-women-violence-online<\/a>.<\/div><\/li><li><span>6<\/span><div>Salim, M. (2022).<i> \u2018Bulli Bai\u2019, 'Sulli Deals': On Being Put Up for \u2018Auction\u2019 as an Indian Muslim Woman.<\/i> The Wire. <a href=\"https:\/\/thewire.in\/communalism\/indian-muslim-woman-auction-bulli-bai\">https:\/\/thewire.in\/communalism\/indian-muslim-woman-auction-bulli-bai<\/a> <\/div><\/li><li><span>7<\/span><div>WomanStats. (2021). <i>\u201cDoxxing\u201d And Online Threats: Why Women Are More Vulnerable to Internet Harassment. <\/i><a href=\"https:\/\/womanstats.wordpress.com\/2021\/03\/22\/doxxing-and-online-threats-why-women-are-more-vulnerable-to-internet-harassment\/\">https:\/\/womanstats.wordpress.com\/2021\/03\/22\/doxxing-and-online-threats-why-women-are-more-vulnerable-to-internet-harassment\/<\/a>.<\/div><\/li><li><span>8<\/span><div>Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>9<\/span><div>Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>10<\/span><div>Jens, K. (2015). <i>Looking for Evidence of Gender Inequality in Sexual Harassment on Twitter<\/i>. GenderITOrg. <a href=\"https:\/\/www.genderit.org\/resources\/looking-evidence-gender-inequality-sexual-harassment-twitter\">https:\/\/www.genderit.org\/resources\/looking-evidence-gender-inequality-sexual-harassment-twitter<\/a><\/div><\/li><li><span>11<\/span><div>Posetti, J., et al. (2021). <em>The Chilling: Global Trends in Online Violence against Women Journalists. UNESCO.<\/em> <a href=\"https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000377223\/PDF\/377223eng.pdf.multi\">https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000377223\/PDF\/377223eng.pdf.multi<\/a> <\/div><\/li><li><span>12<\/span><div>Nissenbaum, H. (2004). Privacy as Contextual Integrity. <i>Washington Review<\/i>, 79(1). <a href=\"https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10\">https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10<\/a>.<\/div><\/li><li><span>13<\/span><div>\u00a0Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>14<\/span><div>\u00a0Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>15<\/span><div>Barik, S. (2022). <i>New IT Act Looks to Rein In \u2018Deliberate\u2019 Misinformation. <\/i>Indian Express. <a href=\"https:\/\/indianexpress.com\/article\/technology\/tech-news-technology\/new-it-act-looks-to-rein-in-deliberate-misinformation-8027748\/\">https:\/\/indianexpress.com\/article\/technology\/tech-news-technology\/new-it-act-looks-to-rein-in-deliberate-misinformation-8027748\/<\/a> <\/div><\/li><li><span>16<\/span><div><i>Subhranshu Rout @ Gugul v. State Of Odisha,<\/i> (2020) BLAPL No.4592 OF 2020, judgment dated 23 November 2020. Odisha High Court. <\/div><\/li><li><span>17<\/span><div><i>X v. <\/i><i>HTTPS:\/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0<\/i><i>, <\/i>CS(OS) 392\/2021, I.As.10543\/2021, 10544\/2021, 10545\/2021 &amp; 10546\/202, order dated 23 August 2021, High Court of Delhi. <\/div><\/li><li><span>18<\/span><div> <i>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra<\/i> @ Sneeha, (2020) CS No. 20\/2020, judgment dated 13 February 2020, Delhi District Court.<\/div><\/li><li><span>19<\/span><div><i>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra @ Sneeha, <\/i>(2020) CS No. 20\/2020, judgment dated 13 February\u00a0 2020, Delhi District Court.<\/div><\/li><li><span>20<\/span><div>CPS. (2022). <i>Social Media and other Electronic Communications.<\/i> UK Government. <a href=\"https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media\">https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media<\/a> <\/div><\/li><li><span>21<\/span><div>CPS. (2022). <i>Social Media and other Electronic Communications.<\/i> UK Government. <a href=\"https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media\">https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media<\/a> <\/div><\/li><li><span>22<\/span><div>H.R.3067 - Online Safety Modernization Act of 2017. (United States).<\/div><\/li><li><span>23<\/span><div>Criminal Consolidation Act, 1935, Section 19AA(1)(ivb) and (vi). (South Australia). <\/div><\/li><li><span>24<\/span><div>Corbridge, A.<i> (n.d). Responding to Doxxing in Australia: Towards a Right to Informational Self-Determination.<\/i> University of South Australia. <a href=\"https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924\">https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924<\/a>.<\/div><\/li><li><span>25<\/span><div>Corbridge, A.<i> (n.d). Responding to Doxxing in Australia: Towards a Right to Informational Self-Determination.<\/i> University of South Australia. <a href=\"https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924\">https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924<\/a><i> ;<\/i> Anderson, B., &amp; Wood, M. A. (2021). <i>Doxxing: A Scoping Review and Typology. <\/i>The Emerald International Handbook of Technology-Facilitated Violence and Abuse. <a href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/978-1-83982-848-520211015\/full\/html\">https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/978-1-83982-848-520211015\/full\/html<\/a>.<\/div><\/li><\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-347-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-347-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"9\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-347-2-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m2-281\">2.8.1 What is doxxing?<\/a><\/li>\n<li><a href=\"#m2-282\">2.8.2 What is a gender-sensitive way to read a case of doxxing?<\/a><\/li>\n<li><a href=\"#m2-283\">2.8.3 Which laws are applicable?<\/a><\/li>\n<li><a href=\"#m2-284\">2.8.4 How have courts dealt with the problem of doxxing?<\/a><\/li>\n<li><a href=\"#m2-285\">2.8.5 How have other jurisdictions dealt with doxxing?<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-347-2-1-1\" class=\"so-panel widget widget_so-multi-button panel-last-child\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-so-multi-button so-widget-so-multi-button-base\"\n\t\t\t\n\t\t><div class=\"sp-btn-parent\" id=\"multi-cfd0c6cb\">\n  <a class=\"sp-btn sp-floating-btn\" data-toggle='sow-modal' href=\"#module-page-nav-mobile\" data-popup=\"module-content\"><span class=\"fa fa-bars\"><\/span> Sections<\/a>\n<\/div>\n\n<style media=\"screen\">\n  #multi-cfd0c6cb a[href].sp-btn{\n    border: 1px solid #000000;\n    color: #ffffff;\n    background: #000000;\n  }\n  #multi-cfd0c6cb a[href].sp-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n\n  #multi-cfd0c6cb a[href].sp-floating-btn{\n    background: #000000;\n    color: #ffffff;\n  }\n\n  #multi-cfd0c6cb a[href].sp-floating-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n<\/style>\n\n<!-- MODALS FROM THE INLINE POSTS -->\n    <div id=\"module-page-nav-mobile\" class=\"inline-modal\" data-behaviour=\"inline-modal\">\n  \t\t<div class=\"inline-overlay\"><\/div>\n  \t\t<button type=\"button\" class=\"close\">&times;<\/button>\n  \t\t<div class=\"inline-modal-dialog\" style=\"max-width:90%\" role=\"document\"><div id=\"pl-wmodule-page-nav-mobile\"  class=\"panel-layout\" ><div id=\"pg-wmodule-page-nav-mobile-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-wmodule-page-nav-mobile-0\" ><div id=\"pgc-wmodule-page-nav-mobile-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-wmodule-page-nav-mobile-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-wmodule-page-nav-mobile-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m2-281\">2.8.1 What is doxxing?<\/a><\/li>\n<li><a href=\"#m2-282\">2.8.2 What is a gender-sensitive way to read a case of doxxing?<\/a><\/li>\n<li><a href=\"#m2-283\">2.8.3 Which laws are applicable?<\/a><\/li>\n<li><a href=\"#m2-284\">2.8.4 How have courts dealt with the problem of doxxing?<\/a><\/li>\n<li><a href=\"#m2-285\">2.8.5 How have other jurisdictions dealt with doxxing?<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n  \t<\/div>\n    <!-- END OF MODALS -->\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-347-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-347-3\" ><div id=\"pgc-347-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-347-3-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"11\" ><div id=\"pl-w64e208d60d591\"  class=\"panel-layout\" ><div id=\"pg-w64e208d60d591-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e208d60d591-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e208d60d591-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e208d60d591-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS SECTION<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e208d60d591-0-0-1\" class=\"so-panel widget widget_sow-headline panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-7-cyberstalking\/\" >\n\t\t\t\t\t\t\t\t2.7 Cyberstalking<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-347-3-1\"  class=\"panel-grid-cell\" ><div id=\"panel-347-3-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"12\" ><div id=\"pl-w64e208d60dcf2\"  class=\"panel-layout\" ><div id=\"pg-w64e208d60dcf2-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e208d60dcf2-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e208d60dcf2-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e208d60dcf2-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>NEXT SECTION<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e208d60dcf2-0-0-1\" class=\"so-panel widget widget_sow-headline panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-9-online-intimidation-and-threats\/\" >\n\t\t\t\t\t\t\t\t2.9 Online Intimidation and Threats <\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-347-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-347-4\" ><div id=\"pgc-347-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-347-4-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"13\" ><div id=\"pl-w64dfa44fbdf3f\"  class=\"panel-layout\" ><div id=\"pg-w64dfa44fbdf3f-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64dfa44fbdf3f-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64dfa44fbdf3f-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64dfa44fbdf3f-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64dfa44fbdf3f-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64dfa44fbdf3f-0-0-1\" ><div id=\"pl-w64d7d419bbcf4\"  class=\"panel-layout\" ><div id=\"pg-w64d7d419bbcf4-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64d7d419bbcf4-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64d7d419bbcf4-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64d7d419bbcf4-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"padding:10px 25px;\" class=\"module-title module-title-red\">1<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64d7d419bbcf4-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64d7d419bbcf4-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/1-case-studies\/\" >\n\t\t\t\t\t\t\t\tCase Studies<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/1-case-studies\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-347-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-347-4-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"14\" ><div id=\"pl-w64e204f9bdf92\"  class=\"panel-layout\" ><div id=\"pg-w64e204f9bdf92-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e204f9bdf92-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e204f9bdf92-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e204f9bdf92-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>NEXT MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e204f9bdf92-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64e204f9bdf92-0-0-1\" ><div id=\"pl-w64e1ebb859fda\"  class=\"panel-layout\" ><div id=\"pg-w64e1ebb859fda-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1ebb859fda-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859fda-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1ebb859fda-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-orange\">3<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64e1ebb859fda-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1ebb859fda-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-3-access-to-justice\/\" >\n\t\t\t\t\t\t\t\tAccess to Justice<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/module-3-access-to-justice\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><ul class=\"modern-footnotes-list modern-footnotes-list--show-only-for-print\"><li><span>1<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <em>Ethics Inf Technol<\/em>, <em>18<\/em>, pp. 199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a> <\/div><\/li><li><span>2<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a><\/div><\/li><li><span>3<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf<\/a><\/div><\/li><li><span>4<\/span><div>Douglas, M. (2016). Doxxing: A Conceptual Analysis. <i>Ethics Inf Technol,<\/i> 18:199\u2013210. <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf\">https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9406-0.pdf <\/a><\/div><\/li><li><span>5<\/span><div>Kasturi, S. (2022). <i>As Bulli Bai Creators Get Bail, The Risks of Normalising Violence Against Women. <\/i>The Wire. <a href=\"https:\/\/thewire.in\/women\/bulli-bai-app-creators-bail-women-violence-online\">https:\/\/thewire.in\/women\/bulli-bai-app-creators-bail-women-violence-online<\/a>.<\/div><\/li><li><span>6<\/span><div>Salim, M. (2022).<i> \u2018Bulli Bai\u2019, 'Sulli Deals': On Being Put Up for \u2018Auction\u2019 as an Indian Muslim Woman.<\/i> The Wire. <a href=\"https:\/\/thewire.in\/communalism\/indian-muslim-woman-auction-bulli-bai\">https:\/\/thewire.in\/communalism\/indian-muslim-woman-auction-bulli-bai<\/a> <\/div><\/li><li><span>7<\/span><div>WomanStats. (2021). <i>\u201cDoxxing\u201d And Online Threats: Why Women Are More Vulnerable to Internet Harassment. <\/i><a href=\"https:\/\/womanstats.wordpress.com\/2021\/03\/22\/doxxing-and-online-threats-why-women-are-more-vulnerable-to-internet-harassment\/\">https:\/\/womanstats.wordpress.com\/2021\/03\/22\/doxxing-and-online-threats-why-women-are-more-vulnerable-to-internet-harassment\/<\/a>.<\/div><\/li><li><span>8<\/span><div>Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>9<\/span><div>Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>10<\/span><div>Jens, K. (2015). <i>Looking for Evidence of Gender Inequality in Sexual Harassment on Twitter<\/i>. GenderITOrg. <a href=\"https:\/\/www.genderit.org\/resources\/looking-evidence-gender-inequality-sexual-harassment-twitter\">https:\/\/www.genderit.org\/resources\/looking-evidence-gender-inequality-sexual-harassment-twitter<\/a><\/div><\/li><li><span>11<\/span><div>Posetti, J., et al. (2021). <em>The Chilling: Global Trends in Online Violence against Women Journalists. UNESCO.<\/em> <a href=\"https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000377223\/PDF\/377223eng.pdf.multi\">https:\/\/unesdoc.unesco.org\/ark:\/48223\/pf0000377223\/PDF\/377223eng.pdf.multi<\/a> <\/div><\/li><li><span>12<\/span><div>Nissenbaum, H. (2004). Privacy as Contextual Integrity. <i>Washington Review<\/i>, 79(1). <a href=\"https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10\">https:\/\/digitalcommons.law.uw.edu\/wlr\/vol79\/iss1\/10<\/a>.<\/div><\/li><li><span>13<\/span><div>\u00a0Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>14<\/span><div>\u00a0Eckert, S., &amp; Metzger-Riftkin, J. (2020). <i>Doxxing, Privacy and Gendered Harassment. <\/i><a href=\"https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf\">https:\/\/www.nomos-elibrary.de\/10.5771\/1615-634X-2020-3-273.pdf<\/a>.<\/div><\/li><li><span>15<\/span><div>Barik, S. (2022). <i>New IT Act Looks to Rein In \u2018Deliberate\u2019 Misinformation. <\/i>Indian Express. <a href=\"https:\/\/indianexpress.com\/article\/technology\/tech-news-technology\/new-it-act-looks-to-rein-in-deliberate-misinformation-8027748\/\">https:\/\/indianexpress.com\/article\/technology\/tech-news-technology\/new-it-act-looks-to-rein-in-deliberate-misinformation-8027748\/<\/a> <\/div><\/li><li><span>16<\/span><div><i>Subhranshu Rout @ Gugul v. State Of Odisha,<\/i> (2020) BLAPL No.4592 OF 2020, judgment dated 23 November 2020. Odisha High Court. <\/div><\/li><li><span>17<\/span><div><i>X v. <\/i><i>HTTPS:\/\/WWW.YOUTUBE.COM\/WATCH?V=IQ6K5Z3ZYS0<\/i><i>, <\/i>CS(OS) 392\/2021, I.As.10543\/2021, 10544\/2021, 10545\/2021 &amp; 10546\/202, order dated 23 August 2021, High Court of Delhi. <\/div><\/li><li><span>18<\/span><div> <i>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra<\/i> @ Sneeha, (2020) CS No. 20\/2020, judgment dated 13 February 2020, Delhi District Court.<\/div><\/li><li><span>19<\/span><div><i>Ms. Nimisha Bhagat v. Sneha Mahajan Nee Dogra @ Sneeha, <\/i>(2020) CS No. 20\/2020, judgment dated 13 February\u00a0 2020, Delhi District Court.<\/div><\/li><li><span>20<\/span><div>CPS. (2022). <i>Social Media and other Electronic Communications.<\/i> UK Government. <a href=\"https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media\">https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media<\/a> <\/div><\/li><li><span>21<\/span><div>CPS. (2022). <i>Social Media and other Electronic Communications.<\/i> UK Government. <a href=\"https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media\">https:\/\/www.cps.gov.uk\/legal-guidance\/social-media-guidelines-prosecuting-cases-involving-communications-sent-social-media<\/a> <\/div><\/li><li><span>22<\/span><div>H.R.3067 - Online Safety Modernization Act of 2017. (United States).<\/div><\/li><li><span>23<\/span><div>Criminal Consolidation Act, 1935, Section 19AA(1)(ivb) and (vi). (South Australia). <\/div><\/li><li><span>24<\/span><div>Corbridge, A.<i> (n.d). Responding to Doxxing in Australia: Towards a Right to Informational Self-Determination.<\/i> University of South Australia. <a href=\"https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924\">https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924<\/a>.<\/div><\/li><li><span>25<\/span><div>Corbridge, A.<i> (n.d). Responding to Doxxing in Australia: Towards a Right to Informational Self-Determination.<\/i> University of South Australia. <a href=\"https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924\">https:\/\/ojs.unisa.edu.au\/index.php\/uslr\/article\/download\/1489\/924<\/a><i> ;<\/i> Anderson, B., &amp; Wood, M. A. (2021). <i>Doxxing: A Scoping Review and Typology. <\/i>The Emerald International Handbook of Technology-Facilitated Violence and Abuse. <a href=\"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/978-1-83982-848-520211015\/full\/html\">https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/978-1-83982-848-520211015\/full\/html<\/a>.<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Navigate:Online Gender-based Violence Judicial Resource Guide 2.8 Doxxing 2.8.1 What is doxxing? Doxxing refers to the act of publishing personal or identifying information or details about a person without consent, often with a call to others in the perpetrator\u2019s network to harass or threaten the person whose personal information is published. The information revealed could [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":248,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/347"}],"collection":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":11,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/347\/revisions"}],"predecessor-version":[{"id":2173,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/347\/revisions\/2173"}],"up":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/248"}],"wp:attachment":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/media?parent=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}