{"id":366,"date":"2023-08-09T17:33:21","date_gmt":"2023-08-09T17:33:21","guid":{"rendered":"https:\/\/projects-dev.itforchange.net\/online-violence-gender-and-law-guide\/?page_id=366"},"modified":"2024-10-29T12:08:21","modified_gmt":"2024-10-29T06:38:21","slug":"2-10-impersonation","status":"publish","type":"page","link":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-10-impersonation\/","title":{"rendered":"2.10 Impersonation"},"content":{"rendered":"<div id=\"pl-366\"  class=\"panel-layout\" ><div id=\"pg-366-0\"  class=\"panel-grid panel-has-style\" ><div id=\"module-breadcrumbs\" class=\"panel-row-style panel-row-style-for-366-0\" ><div id=\"pgc-366-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-366-0-0-0\" class=\"so-panel widget widget_bcn_widget widget_breadcrumb_navxt panel-first-child panel-last-child\" data-index=\"0\"><div class=\"panel-widget-style panel-widget-style-for-366-0-0-0\"><div class=\"breadcrumbs\" vocab=\"https:\/\/schema.org\/\" typeof=\"BreadcrumbList\">Navigate:<span property=\"itemListElement\" typeof=\"ListItem\"><a property=\"item\" typeof=\"WebPage\" title=\"Go to Online Gender-based Violence Judicial Resource Guide.\" href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\" class=\"home\" aria-current=\"page\"><span property=\"name\">Online Gender-based Violence Judicial Resource Guide<\/span><\/a><meta property=\"position\" content=\"1\"><\/span><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pg-366-1\"  class=\"panel-grid panel-has-style\" ><div id=\"module-heading\" class=\"panel-row-style panel-row-style-for-366-1\" ><div id=\"pgc-366-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-366-1-0-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-6593f681471d-366 so-widget-fittext-wrapper\"\n\t\t\t data-fit-text-compressor=\"0.85\"\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h1 class=\"sow-headline\">\n\t\t\t\t\t\t<img class=\"alignnone size-thumbnail\" style=\"margin-right: 10px\" src=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-content\/uploads\/2023\/10\/14-150x150.png\" alt=\"\" width=\"60\" height=\"60\" \/> 2.10 Impersonation\t\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"decoration\">\n\t\t\t\t\t\t<div class=\"decoration-inside\"><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-366-2\"  class=\"panel-grid panel-has-style\" ><div id=\"module-content\" class=\"panel-row-style panel-row-style-for-366-2\" ><div id=\"pgc-366-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-366-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"2\" ><div id=\"m2-2101\" class=\"panel-widget-style panel-widget-style-for-366-2-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.10.1 What is impersonation?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Impersonation is a common form of gendered abuse that women face online, and often accompanies or facilitates other offenses such as cyberstalking, doxxing, intimidation and threats, and morphing.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"1\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-1\">1<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-1\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"1\">Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan.\u00a0<a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a> <\/span> Impersonation refers to the act of pretending to be someone else or falsifying the identity of a person \u201cwith the intention of harming, defrauding, intimidating or threatening anyone\u201d.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"2\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-2\">2<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-2\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"2\">Panwar, K., &amp; Sihag, V. K. (2020). Changing forms of Cyber Violence against Women and Girls.<i> The Indian Police Journal<\/i>, 111. p. 116. <a href=\"https:\/\/bprd.nic.in\/WriteReadData\/userfiles\/file\/202104200330035982091ipj1.pdf#page=117\">https:\/\/bprd.nic.in\/WriteReadData\/userfiles\/file\/202104200330035982091ipj1.pdf#page=117<\/a>. <\/span> The internet, by giving users the option to remain anonymous and create multiple identities, makes impersonation easy and its detection difficult.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"3\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-3\">3<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-3\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"3\">Ajmani, N. (2011). Rethinking the Rangel Standard in the Age of the Internet. <i>Cyberstalking and Free Speech<\/i>. <a href=\"https:\/\/scholarsbank.uoregon.edu\/xmlui\/bitstream\/handle\/1794\/11760\/Ajmani.pdf?sequence=1&amp;isAllowed=y\">https:\/\/scholarsbank.uoregon.edu\/xmlui\/bitstream\/handle\/1794\/11760\/Ajmani.pdf?sequence=1&amp;isAllowed=y<\/a> <\/span><\/p>\n<p>Women face harm from impersonation in two ways. One, the perpetrator may impersonate the identity of someone with whom the woman is close or is likely to establish contact. This is a common means adopted by cyberstalkers to get a woman to disclose personal details or share personal images, which can be used to commit further offenses such as doxxing, intimidation, and non-consensual intimate image distribution (NCIID).<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"4\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-4\">4<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-4\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"4\">Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/span> This is commonly referred to as catfishing.<\/p>\n<p>The second way in which women face harm from impersonation is when the perpetrator masquerades as the woman to her friends, family, other public connections, and on online sites, usually with an intention to damage her reputation or credibility.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"5\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-5\">5<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-5\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"5\">Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/span> By faking the identity of the woman, the perpetrator may send offensive messages and post lewd or inflammatory content online, which could, in turn, invite harsh responses, equally offensive and lewd comments, and threats from the recipients of such messages.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"6\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-6\">6<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-6\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"6\">Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/span> This can worsen the woman\u2019s relationship with her contacts, invite social ridicule, damage her reputation and credibility, and even lead to offline harm.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"7\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-7\">7<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-7\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"7\">Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/span> Some cases of online appropriation of a woman's identity also involve posting morphed pictures on fake social media accounts created in her name in order to tarnish her reputation in the eyes of her network, and to invite unwanted attention and harm from others.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"8\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-8\">8<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-8\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"8\">Sambashivam, N., et al. (2019). <i>\u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d: Gender and Digital Abuse in South Asia,<\/i> pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232<\/a>.<\/span> Such acts of impersonation can force women to limit their online presence, including by deactivating their social media accounts.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"9\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-9\">9<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-9\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"9\">Sambashivam, N., et al. (2019). <i>\u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d: Gender and Digital Abuse in South Asia,<\/i> pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232<\/a>.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-366-2-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"3\" ><div id=\"m2-2102\" class=\"panel-widget-style panel-widget-style-for-366-2-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.10.2 What is a gender-sensitive way to read a case of impersonation?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Impersonation is primarily an act of cheating and fraud. However, when women are targeted through impersonation, the gendered nature and impact of the fraud on women\u2019s rights and their online participation should be duly considered by the court.<\/p>\n<p>Further, when impersonation is accompanied by offenses such as stalking, NCIID, morphing, doxxing, etc., the harm to the privacy, bodily integrity, and reputation of the affected woman should be given primacy instead of framing the offense as one concerned with outraging modesty or publishing obscene or sexually explicit materials.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-366-2-0-2\" class=\"so-panel widget widget_sow-editor\" data-index=\"4\" ><div id=\"m2-2103\" class=\"panel-widget-style panel-widget-style-for-366-2-0-2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.10.3 Which laws are applicable?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Since impersonation is primarily an issue of cheating and identity theft, charges can be brought under Section 415 of the Indian Penal Code (IPC), which defines cheating, and Section 417, which prescribes the punishment for cheating. Further, Section 416 makes cheating by impersonation a specific offense. In certain cases, Section 66D of the Information Technology (IT) Act, 2000 (IT Act), which penalizes cheating by impersonation done using a computer device or resource, may also apply.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-366-2-0-3\" class=\"so-panel widget widget_sow-accordion\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-accordion so-widget-sow-accordion-default-08b99853d3df-366\"\n\t\t\t data-max-open-panels=\"0\" data-initial-scroll-panel=\"0\"\n\t\t><div>\n\t<div class=\"sow-accordion\">\n\t\t\t<div class=\"sow-accordion-panel\n\t\t\t\t\t\"\n\t\t\t\tdata-anchor-id=\"corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header-container\" role=\"heading\" aria-level=\"2\">\n\t\t\t\t\t<div class=\"sow-accordion-panel-header\" tabindex=\"0\" role=\"button\" id=\"accordion-label-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\" aria-controls=\"accordion-content-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\" aria-expanded=\"false\">\n\t\t\t\t\t\t<div class=\"sow-accordion-title sow-accordion-title-icon-left\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\tCorresponding Bharatiya Nyaya Sanhita, 2023 (BNS) Provision\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"sow-accordion-open-close-button\">\n\t\t\t\t\t\t\t<div class=\"sow-accordion-open-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#x2b;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"sow-accordion-close-button\">\n\t\t\t\t\t\t\t\t<span class=\"sow-icon-fontawesome sow-fas\" data-sow-icon=\"&#xf068;\"\n\t\t \n\t\taria-hidden=\"true\"><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<div\n\t\t\t\tclass=\"sow-accordion-panel-content\"\n\t\t\t\trole=\"region\"\n\t\t\t\taria-labelledby=\"accordion-label-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\"\n\t\t\t\tid=\"accordion-content-corresponding-bharatiya-nyaya-sanhita-2023-bns-provision\"\n\t\t\t\tstyle=\"display: none;\"\t\t\t>\n\t\t\t\t<div class=\"sow-accordion-panel-border\">\n\t\t\t\t\t<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Sections 318 and 319 of the BNS (Cheating): <\/b><span style=\"font-weight: 400;\">Under the IPC, Sections 415, 416, and 417 describe cheating and its punishment. However, under the BNS, the provisions that address cheating are Sections 318 and 319. The elements of the offense are the same under both laws. Section 318 defines cheating as the act of deceiving someone through fraud or dishonesty, leading the deceived person to deliver property, consent to retain the property, or act or omit in a way that causes harm or damage to body, mind, reputation, or property. Dishonest concealment of facts also constitutes deception under this provision. Illustrations clarify various scenarios where one induces others to deliver goods or money through false pretenses, such as misrepresenting identity, quality of goods, or intentions. Section 319 defines cheating by personation as the act of deceiving someone by pretending to the identity of oneself or another person.be another person, knowingly substituting one person for another, or misrepresenting\u00a0<\/span><\/li>\n<\/ol>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n<\/div>\n<\/div><\/div><div id=\"panel-366-2-0-4\" class=\"so-panel widget widget_sow-editor\" data-index=\"6\" ><div id=\"m2-2104\" class=\"panel-widget-style panel-widget-style-for-366-2-0-4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.10.4 How have courts dealt with cases of impersonation?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Most impersonation cases that have come up before courts in India so far have involved creating fake social media profiles in the name of the complainant women and uploading their nude or morphed pictures through such accounts. Even when courts have correctly recognized the infringement of privacy and loss of reputation that women suffer as a result of such acts, they have tended to treat these as cases of dissemination of obscene or sexually explicit materials under Sections 67 and 67A of IT Act, and not of cheating by impersonation and identity theft.<\/p>\n<h4>2.10.4.1. <em>Kalandi Charan Lenka v. State Of Odisha<\/em> (2017)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"10\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-10\">10<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-10\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"10\"><i>Kalandi Charan Lenka<\/i> <i>v. State Of Odisha<\/i>, BLAPL No.7596 of 2016, judgment dated 16 January 2017, Odisha High Court. <\/span><\/h4>\n<p>The accused in the case sent obscene and vulgar text messages to the victim, and also created a fake Facebook account in her name and uploaded her morphed images to the profile as public posts. The court correctly recognized that the acts of the accused, especially the creation of a fake Facebook account, were intended to intimidate the complainant, and that these acts had caused mental shock and suffering to the victim. However, while determining the guilt of the accused, the court deemed that the act of uploading morphed photos through a fake Facebook account in her name as an offense of transmission of sexually explicit or obscene images under Section 67 and 67A of the IT Act. As mentioned earlier, conviction under these Sections does not address the violation of privacy and bodily integrity of the victim, and the loss of reputation resulting from the act of impersonation coupled with morphing.<\/p>\n<p>In other cases, courts have tended to pass patronizing remarks such as \u201cno prudent woman would post her nude photographs in social media\u201d<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"11\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-11\">11<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-11\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"11\"><i>Mohammad Nasar<\/i> <i>v.<\/i> <i>The State Of Andhra Pradesh<\/i>, Criminal Petition No.3125 OF 2020, judgment dated 24 August 2020, Andhra Pradesh High Court. <\/span> while establishing the guilt of the accused for impersonating the complainant and posting her morphed images. Such remarks arise due to misidentification of the harm caused by impersonation, particularly, the harm caused to women against whom the offense is committed.<\/p>\n<h4>2.10.4.2 <em>Subhranshu Rout @ Gugul v. State Of Odisha<\/em> (2020)<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop heading-footnote \" data-mfn=\"12\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-12\">12<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-12\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"12\"><i>Subhranshu Rout<\/i> @ <i>Gugul v. State Of Odisha, <\/i>BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Odisha High Court. <\/span><\/h4>\n<p>This is an example of a case in which the court took note of the infringement of privacy resulting from the act of impersonation and uploading of the morphed images of the victim. Most importantly, the court desisted from considering the issue as one of dissemination of obscene or sexually explicit materials.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-366-2-0-5\" class=\"so-panel widget widget_sow-editor\" data-index=\"7\" ><div id=\"m2-2105\" class=\"panel-widget-style panel-widget-style-for-366-2-0-5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">2.10.5 How have other jurisdictions dealt with impersonation?<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>Different jurisdictions have started recognizing the menace of online impersonation, particularly against women and girls. Some countries deal with it using existing statutory provisions, especially criminal law provisions related to cheating, identity theft, fraud, intimidation, stalking, etc. For example, the US uses a slew of legislation such as the federal Identity Theft and Assumption Deterrence Act, 1998; the Communications Act, 1934; the federal Interstate Stalking Punishment and Prevention Act, 1996; and the Computer Fraud and Abuse Act, 1986, to deal with online impersonation. Similarly, in the UK online impersonation against women is dealt with under the Malicious Communication Act, 1998, and the Protection from Harassment Act, 1997, as a form of harassment.<\/p>\n<p>On the other hand, a few regions have enacted specific laws to deal with the offense. The state of Oklahoma in the US enacted the Catfishing Liability Act, 2016. This statute imposes liability on \u201cany person who knowingly uses another\u2019s name, voice, signature, photograph or likeness through social media to create a false identity without such person\u2019s consent [\u2026] for the purposes[s] of harming, intimidating, threatening or defrauding\u201d.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"13\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-13\">13<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-13\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"13\">Catfishing Liability Act of 2016, Okla. Stat. tit. 12 \u00a7 1450, B. (Oklahoma, United States).<\/span> This is a civil provision and allows the impersonated person to seek an injunction and monetary damages, in addition to a minimum award of USD 500.<sup class=\"modern-footnotes-footnote modern-footnotes-footnote--hover-on-desktop \" data-mfn=\"14\" data-mfn-post-scope=\"0000000000002dcb0000000000000000_366\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-0000000000002dcb0000000000000000_366-14\">14<\/a><\/sup><span id=\"mfn-content-0000000000002dcb0000000000000000_366-14\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"14\">Catfishing Liability Act of 2016, Okla. Stat. tit. 12 \u00a7 1450, B. (Oklahoma, United States).<\/span> In Australia, Section 474.25C, inserted in the Criminal Code Act, made it an offense to use telecommunication service to impersonate one\u2019s age and gender and commit any act to prepare or plan to cause harm to, engage in sexual activity with, or procure for sexual activity, persons under the age of 16.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-366-2-0-6\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"8\" ><div id=\"module-footnotes\" class=\"panel-widget-style panel-widget-style-for-366-2-0-6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t><h3 class=\"widget-title\">Footnotes<\/h3>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<ul class=\"modern-footnotes-list \"><li><span>1<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan.\u00a0<a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a> <\/div><\/li><li><span>2<\/span><div>Panwar, K., &amp; Sihag, V. K. (2020). Changing forms of Cyber Violence against Women and Girls.<i> The Indian Police Journal<\/i>, 111. p. 116. <a href=\"https:\/\/bprd.nic.in\/WriteReadData\/userfiles\/file\/202104200330035982091ipj1.pdf#page=117\">https:\/\/bprd.nic.in\/WriteReadData\/userfiles\/file\/202104200330035982091ipj1.pdf#page=117<\/a>. <\/div><\/li><li><span>3<\/span><div>Ajmani, N. (2011). Rethinking the Rangel Standard in the Age of the Internet. <i>Cyberstalking and Free Speech<\/i>. <a href=\"https:\/\/scholarsbank.uoregon.edu\/xmlui\/bitstream\/handle\/1794\/11760\/Ajmani.pdf?sequence=1&amp;isAllowed=y\">https:\/\/scholarsbank.uoregon.edu\/xmlui\/bitstream\/handle\/1794\/11760\/Ajmani.pdf?sequence=1&amp;isAllowed=y<\/a> <\/div><\/li><li><span>4<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>5<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>6<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>7<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>8<\/span><div>Sambashivam, N., et al. (2019). <i>\u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d: Gender and Digital Abuse in South Asia,<\/i> pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232<\/a>.<\/div><\/li><li><span>9<\/span><div>Sambashivam, N., et al. (2019). <i>\u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d: Gender and Digital Abuse in South Asia,<\/i> pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232<\/a>.<\/div><\/li><li><span>10<\/span><div><i>Kalandi Charan Lenka<\/i> <i>v. State Of Odisha<\/i>, BLAPL No.7596 of 2016, judgment dated 16 January 2017, Odisha High Court. <\/div><\/li><li><span>11<\/span><div><i>Mohammad Nasar<\/i> <i>v.<\/i> <i>The State Of Andhra Pradesh<\/i>, Criminal Petition No.3125 OF 2020, judgment dated 24 August 2020, Andhra Pradesh High Court. <\/div><\/li><li><span>12<\/span><div><i>Subhranshu Rout<\/i> @ <i>Gugul v. State Of Odisha, <\/i>BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Odisha High Court. <\/div><\/li><li><span>13<\/span><div>Catfishing Liability Act of 2016, Okla. Stat. tit. 12 \u00a7 1450, B. (Oklahoma, United States).<\/div><\/li><li><span>14<\/span><div>Catfishing Liability Act of 2016, Okla. Stat. tit. 12 \u00a7 1450, B. (Oklahoma, United States).<\/div><\/li><\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-366-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-366-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"9\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-366-2-1-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m2-2101\">2.10.1 What is impersonation?<\/a><\/li>\n<li><a href=\"#m2-2102\">2.10.2 What is a gender-sensitive way to read a case of impersonation?<\/a><\/li>\n<li><a href=\"#m2-2103\">2.10.3 Which laws are applicable?<\/a><\/li>\n<li><a href=\"#m2-2104\">2.10.4 How have courts dealt with cases of impersonation?<\/a><\/li>\n<li><a href=\"#m2-2105\">2.10.5 How have other jurisdictions dealt with impersonation?<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-366-2-1-1\" class=\"so-panel widget widget_so-multi-button panel-last-child\" data-index=\"10\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-so-multi-button so-widget-so-multi-button-base\"\n\t\t\t\n\t\t><div class=\"sp-btn-parent\" id=\"multi-17772121\">\n  <a class=\"sp-btn sp-floating-btn\" data-toggle='sow-modal' href=\"#module-page-nav-mobile\" data-popup=\"module-content\"><span class=\"fa fa-bars\"><\/span> Sections<\/a>\n<\/div>\n\n<style media=\"screen\">\n  #multi-17772121 a[href].sp-btn{\n    border: 1px solid #000000;\n    color: #ffffff;\n    background: #000000;\n  }\n  #multi-17772121 a[href].sp-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n\n  #multi-17772121 a[href].sp-floating-btn{\n    background: #000000;\n    color: #ffffff;\n  }\n\n  #multi-17772121 a[href].sp-floating-btn:hover{\n    border-color: #000000;\n    background: #ffffff;\n    color: #000000;\n  }\n<\/style>\n\n<!-- MODALS FROM THE INLINE POSTS -->\n    <div id=\"module-page-nav-mobile\" class=\"inline-modal\" data-behaviour=\"inline-modal\">\n  \t\t<div class=\"inline-overlay\"><\/div>\n  \t\t<button type=\"button\" class=\"close\">&times;<\/button>\n  \t\t<div class=\"inline-modal-dialog\" style=\"max-width:90%\" role=\"document\"><div id=\"pl-wmodule-page-nav-mobile\"  class=\"panel-layout\" ><div id=\"pg-wmodule-page-nav-mobile-0\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-wmodule-page-nav-mobile-0\" ><div id=\"pgc-wmodule-page-nav-mobile-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-wmodule-page-nav-mobile-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div id=\"module-page-nav\" class=\"panel-widget-style panel-widget-style-for-wmodule-page-nav-mobile-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>Sub-sections on this page:<\/strong><\/p>\n<ul>\n<li><a href=\"#m2-2101\">2.10.1 What is impersonation?<\/a><\/li>\n<li><a href=\"#m2-2102\">2.10.2 What is a gender-sensitive way to read a case of impersonation?<\/a><\/li>\n<li><a href=\"#m2-2103\">2.10.3 Which laws are applicable?<\/a><\/li>\n<li><a href=\"#m2-2104\">2.10.4 How have courts dealt with cases of impersonation?<\/a><\/li>\n<li><a href=\"#m2-2105\">2.10.5 How have other jurisdictions dealt with impersonation?<\/a><\/li>\n<li><a href=\"#module-footnotes\">Footnotes<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n  \t<\/div>\n    <!-- END OF MODALS -->\n<\/div><\/div><\/div><\/div><\/div><div id=\"pg-366-3\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-366-3\" ><div id=\"pgc-366-3-0\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-366-3-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"11\" ><div id=\"pl-w64e1e9ccb5fb0\"  class=\"panel-layout\" ><div id=\"pg-w64e1e9ccb5fb0-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1e9ccb5fb0-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1e9ccb5fb0-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1e9ccb5fb0-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS SECTION<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1e9ccb5fb0-0-0-1\" class=\"so-panel widget widget_sow-headline panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-2-typologies-of-online-gender-based-offenses-in-law\/2-9-online-intimidation-and-threats\/\" >\n\t\t\t\t\t\t\t\t2.9 Online Intimidation and Threats<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-366-3-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><div id=\"pg-366-4\"  class=\"panel-grid panel-has-style\" ><div class=\"panel-row-style panel-row-style-for-366-4\" ><div id=\"pgc-366-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-366-4-0-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"12\" ><div id=\"pl-w64eb9a8bda462\"  class=\"panel-layout\" ><div id=\"pg-w64eb9a8bda462-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64eb9a8bda462-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64eb9a8bda462-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64eb9a8bda462-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>PREVIOUS MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64eb9a8bda462-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64eb9a8bda462-0-0-1\" ><div id=\"pl-w64eb9a8bda474\"  class=\"panel-layout\" ><div id=\"pg-w64eb9a8bda474-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64eb9a8bda474-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64eb9a8bda474-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64eb9a8bda474-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-red\" style=\"padding: 10px 25px;\">1<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64eb9a8bda474-0-0-1\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"1\" ><div class=\"panel-widget-style panel-widget-style-for-w64eb9a8bda474-0-0-1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-red\" style=\"padding: 8px 18px;\">1<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64eb9a8bda474-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64eb9a8bda474-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/1-case-studies\/\" >\n\t\t\t\t\t\t\t\tCase Studies<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/1-case-studies\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div id=\"pgc-366-4-1\"  class=\"panel-grid-cell\" ><div id=\"panel-366-4-1-0\" class=\"so-panel widget widget_siteorigin-panels-builder panel-first-child panel-last-child\" data-index=\"13\" ><div id=\"pl-w64e1e9ccb6693\"  class=\"panel-layout\" ><div id=\"pg-w64e1e9ccb6693-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1e9ccb6693-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1e9ccb6693-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1e9ccb6693-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><strong>NEXT MODULE<\/strong><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"panel-w64e1e9ccb6693-0-0-1\" class=\"so-panel widget widget_siteorigin-panels-builder panel-last-child\" data-index=\"1\" ><div class=\"module-footer-nav panel-widget-style panel-widget-style-for-w64e1e9ccb6693-0-0-1\" ><div id=\"pl-w64e1e9ccb66a0\"  class=\"panel-layout\" ><div id=\"pg-w64e1e9ccb66a0-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-w64e1e9ccb66a0-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1e9ccb66a0-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-w64e1e9ccb66a0-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span class=\"module-title module-title-orange\">3<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><div id=\"pgc-w64e1e9ccb66a0-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-w64e1e9ccb66a0-0-1-0\" class=\"so-panel widget widget_sow-headline panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-headline so-widget-sow-headline-default-852507278c70\"\n\t\t\t\n\t\t><div class=\"sow-headline-container \">\n\t\t\t\t\t\t\t<h2 class=\"sow-headline\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/module-3-access-to-justice\/\" >\n\t\t\t\t\t\t\t\tAccess to Justice<\/a>\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><a href=\"\/online-violence-gender-and-law-guide\/module-3-access-to-justice\/\" class=\"so-premium-link-overlay\">&nbsp;<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><ul class=\"modern-footnotes-list modern-footnotes-list--show-only-for-print\"><li><span>1<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan.\u00a0<a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a> <\/div><\/li><li><span>2<\/span><div>Panwar, K., &amp; Sihag, V. K. (2020). Changing forms of Cyber Violence against Women and Girls.<i> The Indian Police Journal<\/i>, 111. p. 116. <a href=\"https:\/\/bprd.nic.in\/WriteReadData\/userfiles\/file\/202104200330035982091ipj1.pdf#page=117\">https:\/\/bprd.nic.in\/WriteReadData\/userfiles\/file\/202104200330035982091ipj1.pdf#page=117<\/a>. <\/div><\/li><li><span>3<\/span><div>Ajmani, N. (2011). Rethinking the Rangel Standard in the Age of the Internet. <i>Cyberstalking and Free Speech<\/i>. <a href=\"https:\/\/scholarsbank.uoregon.edu\/xmlui\/bitstream\/handle\/1794\/11760\/Ajmani.pdf?sequence=1&amp;isAllowed=y\">https:\/\/scholarsbank.uoregon.edu\/xmlui\/bitstream\/handle\/1794\/11760\/Ajmani.pdf?sequence=1&amp;isAllowed=y<\/a> <\/div><\/li><li><span>4<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>5<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>6<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>7<\/span><div>Kimble, M.R. (2016). <i>Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior.<\/i> University of Michigan. <a href=\"https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1\">https:\/\/deepblue.lib.umich.edu\/bitstream\/handle\/2027.42\/134723\/madeleik.pdf?sequence=1<\/a>.<\/div><\/li><li><span>8<\/span><div>Sambashivam, N., et al. (2019). <i>\u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d: Gender and Digital Abuse in South Asia,<\/i> pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232<\/a>.<\/div><\/li><li><span>9<\/span><div>Sambashivam, N., et al. (2019). <i>\u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d: Gender and Digital Abuse in South Asia,<\/i> pp. 7-8. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232\">https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3290605.3300232<\/a>.<\/div><\/li><li><span>10<\/span><div><i>Kalandi Charan Lenka<\/i> <i>v. State Of Odisha<\/i>, BLAPL No.7596 of 2016, judgment dated 16 January 2017, Odisha High Court. <\/div><\/li><li><span>11<\/span><div><i>Mohammad Nasar<\/i> <i>v.<\/i> <i>The State Of Andhra Pradesh<\/i>, Criminal Petition No.3125 OF 2020, judgment dated 24 August 2020, Andhra Pradesh High Court. <\/div><\/li><li><span>12<\/span><div><i>Subhranshu Rout<\/i> @ <i>Gugul v. State Of Odisha, <\/i>BLAPL No.4592 OF 2020, judgment dated 23 November 2020, Odisha High Court. <\/div><\/li><li><span>13<\/span><div>Catfishing Liability Act of 2016, Okla. Stat. tit. 12 \u00a7 1450, B. (Oklahoma, United States).<\/div><\/li><li><span>14<\/span><div>Catfishing Liability Act of 2016, Okla. Stat. tit. 12 \u00a7 1450, B. (Oklahoma, United States).<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Navigate:Online Gender-based Violence Judicial Resource Guide 2.10 Impersonation 2.10.1 What is impersonation? Impersonation is a common form of gendered abuse that women face online, and often accompanies or facilitates other offenses such as cyberstalking, doxxing, intimidation and threats, and morphing.1Kimble, M.R. (2016). Online Gendered Harassment and Violence Naming the Harm and Punishing the Behavior. University [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":248,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/366"}],"collection":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":11,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/366\/revisions"}],"predecessor-version":[{"id":2145,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/366\/revisions\/2145"}],"up":[{"embeddable":true,"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/pages\/248"}],"wp:attachment":[{"href":"https:\/\/projects.itforchange.net\/online-violence-gender-and-law-guide\/wp-json\/wp\/v2\/media?parent=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}