{"id":249324,"date":"2021-06-08T15:00:07","date_gmt":"2021-06-08T09:30:07","guid":{"rendered":"https:\/\/www.scconline.com\/blog\/?p=249324"},"modified":"2021-06-12T14:06:31","modified_gmt":"2021-06-12T08:36:31","slug":"child-safety-and-encryption","status":"publish","type":"post","link":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/","title":{"rendered":"Child safety and encryption: Analysing the IT Rules of 2021"},"content":{"rendered":"<h3 style=\"text-align: justify;\"><span style=\"color: #008080;\"><strong>Child safety: Challenges in the online ecosystem<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">The increased popularity of digital spaces, especially among minors, has led to them being exposed to new forms of exploitation on troubling scales. These include &#8220;made to order&#8221; services that allow the perpetrator to apply filters relating to age, gender and race of the children while requesting Child Sexual Abuse Material (CSAM)<a href=\"#_ftn3\" name=\"_ftnref3\"><sup>[1]<\/sup><\/a>, services that allow the perpetrator to view child sexual abuse via live stream and, in some cases, even direct it. These are issues that need urgent attention, especially when a third of the users of the internet are children.<\/p>\n<p style=\"text-align: justify;\">There is unanimous agreement on the need to protect children in digital spaces and the need to mitigate the proliferation of CSAM online on a global scale. The most common solutions offered are focused on maximising security, while privacy takes a back seat. The narrative around the right to privacy primarily focuses on adults, while minors\u2019 right to privacy is taken for granted. This focus must shift taking into account the rights of children that, similar to human rights are &#8220;interdependent, non-hierarchical and indivisible&#8221;.<a href=\"#_ftn4\" name=\"_ftnref4\"><sup>[2]<\/sup><\/a><\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008080;\"><strong>Law of the land: Indian and the American regime<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">In an attempt to curb the increased dissemination of CSAM online, the Indian Government has introduced various provisions in the Information Technology (Intermediary and Digital Media Ethics Code) Rules, 2021 (Rules)<a href=\"#_ftn5\" name=\"_ftnref5\">[3]<\/a>. For instance, Rule 4(2) mandates that significant social media intermediaries must enable the identification of the first originator of information on a computer resource for a prescribed number of reasons, one of which is that of CSAM. They must also endeavour to engage in proactive monitoring of CSAM per Rule 4(4).<\/p>\n<p style=\"text-align: justify;\">The United States EARN IT Act of 2020 also lays down best practices in order to curb the dissemination of CSAM.<a href=\"#_ftn6\" name=\"_ftnref6\"><sup>[4]<\/sup><\/a> It mandates the creation of &#8220;backdoors&#8221; in encrypted technology so as to allow law enforcement agencies (LEAs) to access communications. In several publications, Rianna Pfefferkorn, a leading Stanford based cybersecurity expert, has highlighted the dangers such legislation poses on individual privacy.<a href=\"#_ftn7\" name=\"_ftnref7\"><sup>[5]<\/sup><\/a><\/p>\n<p style=\"text-align: justify;\">Whether it be the &#8220;originator traceability&#8221; envisaged in the IT Rules of 2021 or the &#8220;backdoors&#8221; mandated in the EARN IT Act of 2020, both are the antithesis of user privacy and free speech as they compromise the security provided by end-to-end encryption. There is a global push towards weakening end-to-end encryption be it via the EARN IT Act of 2020, the Draft Council Resolution by the Council of European Union,<a href=\"#_ftn8\" name=\"_ftnref8\"><sup>[6]<\/sup><\/a> \u00a0or the Five Eyes Communique<a href=\"#_ftn9\" name=\"_ftnref9\"><u><sup>[7]<\/sup><\/u><\/a>. However, there is little evidence to show that perpetrators have been caught or penalised specifically as a result of such decryption. On the contrary, Anand Venkatnarayanan explains how Governments are seeking extant surveillance by breaking end-to-end encryption behind the veneer of child safety, which is the definition of Pedophrastry.<a href=\"#_ftn10\" name=\"_ftnref10\"><sup>[8]<\/sup><\/a><\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008080;\"><strong>Flawed approach: Explained time and time again<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">It is important to note that perpetrators do everything they can to remain inconspicuous on these platforms. They may create their own encrypted platforms, or might begin using platforms that are already encrypted. Criminals and terrorists also tend to develop their own encrypted platforms or networks.<a href=\"#_ftn11\" name=\"_ftnref11\"><sup>[9]<\/sup><\/a> The technology will still be readily available on the internet, and the passing of such legislation will not be able to keep criminals from using it. If encryption is outlawed, only the outlaws will have encryption, while law-abiding citizens shall be rendered susceptible to attacks by hostile actors.<\/p>\n<p style=\"text-align: justify;\">The granting of exceptional access to law enforcement agencies is challenging from a technological perspective. The deliberate introduction of a vulnerability (in this case the grant of exceptional access to LEA\u2019s)\u00a0in the system also makes it vulnerable to unauthorised access by hostile third parties,<a href=\"#_ftn12\" name=\"_ftnref12\"><sup>[10]<\/sup><\/a> including enemy States. There is also the danger of an abuse of such power by the State.<a href=\"#_ftn13\" name=\"_ftnref13\"><sup>[11]<\/sup><\/a> The chilling effect on one\u2019s freedom of speech and expression and the dangers of surveillance has already been discussed by several. Limited use of technology like PhotoDNA on publicly available data or unencrypted data to tackle is one thing, but to conduct mass surveillance by scanning everything going on an encrypted chat is a clear violation of both free speech and user privacy.<\/p>\n<p style=\"text-align: justify;\">The Telecom Regulatory Authority of India has already stated that the security architecture of end-to-end encrypted platforms should not be meddled with for now as the same may render the users susceptible to cyber vulnerabilities.<a href=\"#_ftn14\" name=\"_ftnref14\"><sup>[12]<\/sup><\/a> The Supreme Court, in <em>K.S.<\/em> <em>Puttaswamy <\/em>v<em>. Union of India,<\/em><a href=\"#_ftn15\" name=\"_ftnref15\">[13]<\/a> judgment highlighted that any measure infringing upon one\u2019s right to privacy must be <em>sanctioned by law, necessary, must have a legitimate aim and the extent of the same must be proportionate in nature<\/em>. Dr Menaka Guruswamy<a href=\"#_ftn16\" name=\"_ftnref16\"><sup>[14]<\/sup><\/a>, Senior Advocate \u2013 Supreme Court of India and Mr Kazim Rizvi<a href=\"#_ftn17\" name=\"_ftnref17\"><sup>[15]<\/sup><\/a> <sup>\u2013 <\/sup>Founding Director of The Dialogue, have already discussed at length as to why the traceability mandate fails to meet the Puttaswamy test laid down by the Supreme Court.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008080;\"><strong>Way forward: Ensuring privacy and security of the child<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">CSAM must be tackled with all the strength of the State but not in the way that it harms the best interest of the child itself. A child\u2019s privacy is equally important. If by breaking encryption or enforcing traceability, the security architecture of the services used by the child is weakened rendering him susceptible to abuse then there is no point of this measure. The child is still rendered unsafe. Our methods must keep the interest of the child at the centre of the debate.<\/p>\n<p style=\"text-align: justify;\">The CyberPeace Foundation has recommended a few solutions that attempt to strike a balance between maintaining the child\u2019s right to privacy and the need to intervene in cases as critical as the dissemination of CSAM.<a href=\"#_ftn18\" name=\"_ftnref18\"><sup>[16]<\/sup><\/a> These include establishing a <em>standard operating procedure, a hash register, a mandatory &#8220;report CSAM button&#8221;<\/em><strong>, <\/strong>etc.<\/p>\n<p style=\"text-align: justify;\">Further, the Carnegie Endowment in its Working Paper on Encryption Policy stated that absolutist positions disallow policymakers from developing a nuanced approach to tackle this issue. The two positions rejected were \u2013 access to encrypted communication should never be granted and we should not look for solutions under the same; and LEA\u2019s cannot protect the public without access to all encrypted data.<a href=\"#_ftn19\" name=\"_ftnref19\"><sup>[17]<\/sup><\/a> Policies must be <em>subject to the principles of law, enforcement utility, limitation, transparency, evaluation and oversight, auditability, focus and specificity and equity. <\/em>This will ensure that there is greater granularity of debate and allow viable solutions to be developed.<\/p>\n<p style=\"text-align: justify;\">It is equally important to build the capacity of the law enforcement agencies. The American Invest in Child Safety Act is a brilliant initiative which created a mandatory funding of 5 billion dollars along with 100 FBI agents and 65 more positions in the National Center for Missing and Exploited Children to tackle online sexual abuse.<a href=\"#_ftn20\" name=\"_ftnref20\"><sup>[18]<\/sup><\/a> This along with efforts to create community level awareness about child sexual abuse is key to tackling CSAM.<\/p>\n<p style=\"text-align: justify;\">Moreover, we must take more cooperative steps like building the meta-data analysis capabilities of the LEAs with support from Big Tech and academia. If end-to-end encryption is outlawed or weakened, the criminals will, as they have in the past, simply shift to unregulated end-to-end encrypted platforms or create their own platforms. Thereafter the LEAs would not even have access to the meta-data which regulated platforms provide.<\/p>\n<p style=\"text-align: justify;\">The IT Rules of 2021 mandate originator traceability (tell me who the first sender is). This as the technical experts<a href=\"#_ftn21\" name=\"_ftnref21\"><sup>[19]<\/sup><\/a> and organisations<a href=\"#_ftn22\" name=\"_ftnref22\"><sup>[20]<\/sup><\/a> explain is incompatible with the very idea of end-to-end encryption. Accordingly, Rule 4(2) must not be implemented right away and a wider stakeholder consultation with technical experts must be conducted to better understand how such challenges must be tackled keeping the best interest of the child in mind.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><span style=\"color: #008000;\"><strong>\u00a0<\/strong><a style=\"color: #008000;\" href=\"#_ftnref1\" name=\"_ftn1\">\u2020<\/a> Programme Manager (Platform Regulation &amp; Encryption) at The Dialogue.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #008000;\"><a style=\"color: #008000;\" href=\"#_ftnref2\" name=\"_ftn2\">\u2020\u2020<\/a> Policy Research Associate\u00a0at The Dialogue.<\/span><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\"><sup>[1]<\/sup><\/a> United Nations, Office on Drugs and Crime (UNODC), \u201cStudy on the Effects of New Information Technologies on the Abuse and Exploitation of Children\u201d (2015). &lt;<a href=\"https:\/\/www.unodc.org\/documents\/Cybercrime\/Study_on_the_Effects.pdf\">https:\/\/www.unodc.org\/documents\/Cybercrime\/Study_on_the_Effects.pdf<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref4\" name=\"_ftn4\"><sup>[2]<\/sup><\/a> United Nations, UNICEF Office of Research &#8211; Innocenti, Florence, (2020), Encryption, Privacy and Children\u2019s Right to Protection from Harm, Innocenti Working Papers No. 2020-2014. &lt;<a href=\"https:\/\/www.unicefirc.org\/publications\/pdf\/Encryption_privacy_and_children%E2%80%99s_right_to_protection_from_harm.pdf\">https:\/\/www.unicef-irc.org\/publications\/pdf\/Encryption_privacy_and_children\u2019s_right_to_protection_from_harm.pdf<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref5\" name=\"_ftn5\">[3]<\/a> &lt;http:\/\/www.scconline.com\/DocumentLink\/8OCMsY3m&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref6\" name=\"_ftn6\"><sup>[4]<\/sup><\/a> Riana Pfefferkorn, The EARN IT Act is a Disaster Amid the COVID-19 Crisis, the Brookings Institution, (4-5-2020) &lt;<a href=\"https:\/\/www.brookings.edu\/techstream\/the-earn-it-act-is-a-disaster-amid-the-covid-19-crisis\/\">https:\/\/www.brookings.edu\/techstream\/the-earn-it-act-is-a-disaster-amid-the-covid-19-crisis\/<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref7\" name=\"_ftn7\"><sup>[5]<\/sup><\/a> Riana Pfefferkorn, Client-side Scanning and Winnie-the-Pooh Redux (Plus Some Thoughts on Zoom), the Centre for Internet and Society, (11-5-2020, 4.16 p.m.) &lt;<a href=\"http:\/\/cyberlaw.stanford.edu\/blog\/2020\/05\/client-side-scanning-and-winnie-pooh-redux-plus-some-thoughts-zoom\">http:\/\/cyberlaw.stanford.edu\/blog\/2020\/05\/client-side-scanning-and-winnie-pooh-redux-plus-some-thoughts-zoom<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref8\" name=\"_ftn8\"><sup>[6]<\/sup><\/a> Draft Council Resolution on Encryption by Council of EU, Security through Encryption and Security Despite Encryption &lt;<a href=\"https:\/\/files.orf.at\/vietnam2\/files\/fm4\/202045\/783284_fh_st12143-re01en20_783284.pdf\">https:\/\/files.orf.at\/vietnam2\/files\/fm4\/202045\/783284_fh_st12143-re01en20_783284.pdf<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref9\" name=\"_ftn9\"><sup>[7]<\/sup><\/a> The United States Department of Justice, Office of the Attorney General, Press Release No. 20-1,086, International Statement: End-to-End Encryption and Public Safety, (11-10-2020) &lt;<a href=\"https:\/\/www.justice.gov\/opa\/pr\/international-statement-end-end-encryption-and-public-safety\">https:\/\/www.justice.gov\/opa\/pr\/international-statement-end-end-encryption-and-public-safety<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref10\" name=\"_ftn10\"><sup>[8]<\/sup><\/a> Anand Venkatanarayanan, &#8220;The New Avatar of the Encryption Wars&#8221;, <em>Hindustan Times<\/em>, (4-2-2021 9.04 p.m. IST) &lt;<a href=\"https:\/\/www.hindustantimes.com\/opinion\/the-new-avatar-of-the-encryption-wars-101612444931535.html\">https:\/\/www.hindustantimes.com\/opinion\/the-new-avatar-of-the-encryption-wars-101612444931535.html<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref11\" name=\"_ftn11\"><sup>[9]<\/sup><\/a> Robert Graham, How Terrorists Use Encryption, CTC Sentinel, Vol. 9 Issue 6, CTCS 20 (June 2016) &lt;<a href=\"https:\/\/www.ctc.usma.edu\/how-terrorists-use-encryption\">https:\/\/www.ctc.usma.edu\/how-terrorists-use-encryption<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref12\" name=\"_ftn12\"><sup>[10]<\/sup><\/a>\u00a0 Josephine Wolff, What Exactly are the NSA Hackers Trying to Accomplish?, <em>Slate<\/em>, (17-8-2016, 4.10 p.m.) &lt;<a href=\"https:\/\/slate.com\/technology\/2016\/08\/what-exactly-are-the-shadow-brokers-trying-to-accomplish.html\">https:\/\/slate.com\/technology\/2016\/08\/what-exactly-are-the-shadow-brokers-trying-to-accomplish.html<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref13\" name=\"_ftn13\"><sup>[11]<\/sup><\/a> CBS News, Police Sometimes Misuse Confidential Work Databases for Personal Gain: AP, CBSN, (30-9-2016) &lt;<a href=\"https:\/\/www.cbsnews.com\/news\/police-sometimes-misuse-confidential-work-databases-for-personal-gain-ap\/\">https:\/\/www.cbsnews.com\/news\/police-sometimes-misuse-confidential-work-databases-for-personal-gain-ap\/<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref14\" name=\"_ftn14\"><sup>[12]<\/sup><\/a> Telecom Regulatory Authority of India, Recommendations on Regulatory Framework for Over-the-Top (OTT) Communication Services, (14-9-2020)<\/p>\n<p style=\"text-align: justify;\">&lt;<a href=\"https:\/\/www.trai.gov.in\/sites\/default\/files\/Recommendation_14092020_0.pdf\">https:\/\/www.trai.gov.in\/sites\/default\/files\/Recommendation_14092020_0.pdf<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref15\" name=\"_ftn15\">[13]<\/a> (2018) 1 SCC 809&lt; http:\/\/www.scconline.com\/DocumentLink\/nnXl4mu5&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref16\" name=\"_ftn16\"><sup>[14]<\/sup><\/a> Faye D\u2019Souza and Menaka Guruswamy, Are the New Digital Regulations Unconstitutional? (26-2-2021)<\/p>\n<p style=\"text-align: justify;\">\u00a0&lt;<a href=\"https:\/\/www.youtube.com\/watch?v=bGFj-1dkffY&amp;t=23s\">https:\/\/www.youtube.com\/watch?v=bGFj-1dkffY&amp;t=23s<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref17\" name=\"_ftn17\"><sup>[15]<\/sup><\/a> Kazim Rizvi and Shivam Singh, Does the Traceability Requirement Meet the Puttaswamy Test?, LiveLaw (15-3-2021) &lt;<a href=\"https:\/\/www.livelaw.in\/columns\/the-puttaswamy-test-right-to-privacy-article-21-171181\">https:\/\/www.livelaw.in\/columns\/the-puttaswamy-test-right-to-privacy-article-21-171181<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref18\" name=\"_ftn18\"><sup>[16]<\/sup><\/a> Cyber Peace Foundation, Technology Law and Policy Group, End (-to-End Encrypted) Child Sexual Abuse Material, (2020) ISBN: 978-93-5416-448-4, &lt;<a href=\"https:\/\/www.cyberpeace.org\/CyberPeace\/Repository\/End-to-end-Encrypted-CSAM-2.pdf\">https:\/\/www.cyberpeace.org\/CyberPeace\/Repository\/End-to-end-Encrypted-CSAM-2.pdf<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref19\" name=\"_ftn19\"><sup>[17]<\/sup><\/a> The Carnegie Endowment for International Peace, Encryption Working Group, Moving the Encryption Policy Conversation Forward, (10-9-2019) &lt;<a href=\"https:\/\/carnegieendowment.org\/2019\/09\/10\/moving-encryption-policy-conversation-forward-pub-79573#:~:text=Strong%20data%20encryption%20thwarts%20criminals,to%20move%20the%20debate%20forward\">h<\/a><a href=\"https:\/\/carnegieendowment.org\/2019\/09\/10\/moving-encryption-policy-conversation-forward-pub-79573#:~:text=Strong%20data%20encryption%20thwarts%20criminals,to%20move%20the%20debate%20forward\">ttps:\/\/carnegieendowment.org\/2019\/09\/10\/moving-encryption-policy-conversation-forward-pub-79573#:~:text=Strong%20data%20encryption%20thwarts%20criminals,to%20move%20the%20debate%20forward<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref20\" name=\"_ftn20\"><sup>[18]<\/sup><\/a> Adi Robertson, New Bill would Put $5 Billion toward Fighting Online Child Abuse, The Verge, (6-5-2020) &lt;<a href=\"https:\/\/www.theverge.com\/2020\/5\/6\/21249079\/online-abuse-invest-child-safety-act-fbi-investigations-bill-wyden-eshoo\">https:\/\/www.theverge.com\/2020\/5\/6\/21249079\/online-abuse-invest-child-safety-act-fbi-investigations-bill-wyden-eshoo<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref21\" name=\"_ftn21\"><sup>[19]<\/sup><\/a> The United States Department of Justice, Office of the Attorney General, Press Release No. 20-1,086, International Statement: End-to-End Encryption and Public Safety, (11-10-2020).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref22\" name=\"_ftn22\"><sup>[20]<\/sup><\/a> Internet Society, Experts\u2019 Workshop Series on Encryption in India, Traceability and Cybersecurity, (27-11-2020) &lt;<a href=\"https:\/\/www.internetsociety.org\/resources\/doc\/2020\/traceability-and-cybersecurity-experts-workshop-series-on-encryption-in-india\/\">https:\/\/www.internetsociety.org\/resources\/doc\/2020\/traceability-and-cybersecurity-experts-workshop-series-on-encryption-in-india\/<\/a>&gt;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Pranav Bhaskar Tiwari\u2020 and Eshani Vaidya\u2020\u2020<\/p>\n","protected":false},"author":67011,"featured_media":249436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[42503,1191],"tags":[46127,46130,46128,46129,29785,11171],"class_list":["post-249324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-legal-analysis","category-op-ed","tag-child-safety","tag-child-sexual-abuse-material","tag-encryption","tag-it-rules","tag-law","tag-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Child safety and encryption: Analysing the IT Rules of 2021 | SCC Times<\/title>\n<meta name=\"description\" content=\"Child safety and encryption\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Child safety and encryption: Analysing the IT Rules of 2021\" \/>\n<meta property=\"og:description\" content=\"Child safety and encryption\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"SCC Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scc.online\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-08T09:30:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-12T08:36:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1331\" \/>\n\t<meta property=\"og:image:height\" content=\"888\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/\",\"url\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/\",\"name\":\"Child safety and encryption: Analysing the IT Rules of 2021 | SCC Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg\",\"datePublished\":\"2021-06-08T09:30:07+00:00\",\"dateModified\":\"2021-06-12T08:36:31+00:00\",\"author\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe\"},\"description\":\"Child safety and encryption\",\"breadcrumb\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#primaryimage\",\"url\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg\",\"contentUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg\",\"width\":1331,\"height\":888},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.scconline.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Child safety and encryption: Analysing the IT Rules of 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#website\",\"url\":\"https:\/\/www.scconline.com\/blog\/\",\"name\":\"SCC Times\",\"description\":\"Bringing you the Best Analytical Legal News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.scconline.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/www.scconline.com\/blog\/post\/author\/editor_4\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Child safety and encryption: Analysing the IT Rules of 2021 | SCC Times","description":"Child safety and encryption","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Child safety and encryption: Analysing the IT Rules of 2021","og_description":"Child safety and encryption","og_url":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/","og_site_name":"SCC Times","article_publisher":"https:\/\/www.facebook.com\/scc.online\/","article_published_time":"2021-06-08T09:30:07+00:00","article_modified_time":"2021-06-12T08:36:31+00:00","og_image":[{"width":1331,"height":888,"url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/","url":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/","name":"Child safety and encryption: Analysing the IT Rules of 2021 | SCC Times","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg","datePublished":"2021-06-08T09:30:07+00:00","dateModified":"2021-06-12T08:36:31+00:00","author":{"@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe"},"description":"Child safety and encryption","breadcrumb":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#primaryimage","url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg","contentUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg","width":1331,"height":888},{"@type":"BreadcrumbList","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/08\/child-safety-and-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.scconline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Child safety and encryption: Analysing the IT Rules of 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.scconline.com\/blog\/#website","url":"https:\/\/www.scconline.com\/blog\/","name":"SCC Times","description":"Bringing you the Best Analytical Legal News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scconline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.scconline.com\/blog\/post\/author\/editor_4\/"}]}},"jetpack_featured_media_url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/Child-Safety-IT-Rules.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":224574,"url":"https:\/\/www.scconline.com\/blog\/post\/2020\/01\/27\/prevention-of-child-sexual-abuse-dissemination-of-child-pornography-rs-chalks-down-40-recommendations-to-be-brought-in-pocso-act-2012-it-act-2000\/","url_meta":{"origin":249324,"position":0},"title":"Prevention of Child Sexual Abuse &#038; Dissemination of Child Pornography| RS chalks down 40 recommendations to be brought in POCSO Act, 2012 &#038; IT Act, 2000","author":"Bhumika Indulia","date":"January 27, 2020","format":false,"excerpt":"Misuse of social media for accessing pornographic content and child abuse The Adhoc Committee of the Rajya Sabha instituted by Chairman Shri M. Venkaiah Naidu has made 40 far-reaching recommendations to prevent sexual abuse of children and to contain access to and transmission of child pornography content on the social\u2026","rel":"","context":"In &quot;Hot Off The Press&quot;","block_context":{"text":"Hot Off The Press","link":"https:\/\/www.scconline.com\/blog\/post\/category\/news\/hot_off_the_press\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/01\/child-sexual-abuse.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/01\/child-sexual-abuse.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/01\/child-sexual-abuse.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/01\/child-sexual-abuse.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/01\/child-sexual-abuse.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":217353,"url":"https:\/\/www.scconline.com\/blog\/post\/2019\/07\/25\/digital-exploitation-of-children\/","url_meta":{"origin":249324,"position":1},"title":"Digital Exploitation of Children","author":"Bhumika Indulia","date":"July 25, 2019","format":false,"excerpt":"Information given by the Minister of Women and Child Development, Smriti Zubin Irani -- \u201cPolice\u201d and \u201cPublic Order\u201d are State subjects as per the Constitution of India. States\/UTs are primarily responsible for prevention, detection, investigation and prosecution of crimes including crimes related to exploitation of children; through their law enforcement\u2026","rel":"","context":"In &quot;Hot Off The Press&quot;","block_context":{"text":"Hot Off The Press","link":"https:\/\/www.scconline.com\/blog\/post\/category\/news\/hot_off_the_press\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/Digital.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/Digital.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/Digital.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/Digital.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/Digital.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":130891,"url":"https:\/\/www.scconline.com\/blog\/post\/2017\/05\/15\/measures-announced-to-curb-the-menace-of-online-child-sexual-abuse-material\/","url_meta":{"origin":249324,"position":2},"title":"Measures announced to curb the menace of online Child Sexual Abuse Material","author":"Saba","date":"May 15, 2017","format":false,"excerpt":"The Ministry of Women and Child Development has been making several efforts to deal with the problem of online Child Sexual Abuse Material (CSAM). In a major step, a stakeholder Consultation was held last year on this issue wherein it was decided that the Ministry will establish a National Alliance\u2026","rel":"","context":"In &quot;Hot Off The Press&quot;","block_context":{"text":"Hot Off The Press","link":"https:\/\/www.scconline.com\/blog\/post\/category\/news\/hot_off_the_press\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":99741,"url":"https:\/\/www.scconline.com\/blog\/post\/2017\/01\/19\/govt-to-form-national-alliance-against-online-child-sexual-abuse-and-exploitation\/","url_meta":{"origin":249324,"position":3},"title":"Govt. to form National Alliance against Online Child Sexual Abuse and Exploitation","author":"Saba","date":"January 19, 2017","format":false,"excerpt":"The Ministry of Women & Child Development, Government of India is\u00a0\u00a0 to\u00a0 form\u00a0 a National Alliance against\u00a0\u00a0 Online Child Sexual Abuse and Exploitation with the aim of developing a comprehensive outreach system\u00a0 to engage parents, schools, communities, NGO partners and local governments (PRIs and ULBs) as well as police and\u2026","rel":"","context":"In &quot;Hot Off The Press&quot;","block_context":{"text":"Hot Off The Press","link":"https:\/\/www.scconline.com\/blog\/post\/category\/news\/hot_off_the_press\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2015\/12\/DSC_4762-e1474523869607.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":216706,"url":"https:\/\/www.scconline.com\/blog\/post\/2019\/07\/10\/cabinet-approves-amendment-in-protection-of-children-from-sexual-offences-act-2012\/","url_meta":{"origin":249324,"position":4},"title":"Cabinet approves amendment in Protection of Children from Sexual Offences Act, 2012","author":"Bhumika Indulia","date":"July 10, 2019","format":false,"excerpt":"Union Cabinet approves the amendment in the Protection of Children from Sexual Offences (POCSO) Act 2012, today i.e. 10-07-2019. In a historic decision to protect the children from Sexual offences, the Union Cabinet has approved the Amendments in the Protection of Children from Sexual\u00a0 Offences (POCSO) Act, 2012. It will\u2026","rel":"","context":"In &quot;Hot Off The Press&quot;","block_context":{"text":"Hot Off The Press","link":"https:\/\/www.scconline.com\/blog\/post\/category\/news\/hot_off_the_press\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/POCSO.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/POCSO.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/POCSO.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/POCSO.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2019\/07\/POCSO.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":249328,"url":"https:\/\/www.scconline.com\/blog\/post\/2021\/06\/10\/child-rights\/","url_meta":{"origin":249324,"position":5},"title":"Dataveillance and its implications on child rights","author":"Editor","date":"June 10, 2021","format":false,"excerpt":"by Divya Tiwari\u2020","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-8.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-8.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-8.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-8.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/06\/MicrosoftTeams-image-8.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/249324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/users\/67011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/comments?post=249324"}],"version-history":[{"count":0,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/249324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media\/249436"}],"wp:attachment":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media?parent=249324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/categories?post=249324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/tags?post=249324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}