{"id":6413,"date":"2025-07-17T06:43:25","date_gmt":"2025-07-17T06:43:25","guid":{"rendered":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/?p=6413"},"modified":"2025-07-17T07:34:43","modified_gmt":"2025-07-17T07:34:43","slug":"your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment","status":"publish","type":"post","link":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/","title":{"rendered":"Your Face, Their Crime: A Legal Shield Against Deepfake and Photo Harassment"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Introduction_The_New_Face_of_Digital_Harm\"><\/span>Introduction: The New Face of Digital Harm<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Imagine scrolling through your phone and seeing a video that makes your heart stop. It\u2019s your face, but it\u2019s not your life. This digital violation is a direct infringement on the Fundamental Right to Privacy, recognized by the Supreme Court as an intrinsic part of the Right to Life under Article 21 in its landmark judgment in <em>Justice K.S. Puttaswamy (Retd.) v. Union of India<\/em>.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0c0c0c;color:#0c0c0c\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0c0c0c;color:#0c0c0c\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Introduction_The_New_Face_of_Digital_Harm\" >Introduction: The New Face of Digital Harm<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Defining_the_Digital_Weaponry\" >Defining the Digital Weaponry<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Image_Morphing\" >Image Morphing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Deepfakes_Non-Consensual_Synthetic_Media\" >Deepfakes (Non-Consensual Synthetic Media)<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Building_Your_Defence_Indias_Three-Tier_Legal_Shield\" >Building Your Defence: India&#8217;s Three-Tier Legal Shield<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Tier_1_The_Criminal_Law_Foundation_Bharatiya_Nyaya_Sanhita_2023\" >Tier 1: The Criminal Law Foundation (Bharatiya Nyaya Sanhita, 2023)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Tier_2_The_Tech_Law_Powerhouse_Information_Technology_Act_2000\" >Tier 2: The Tech Law Powerhouse (Information Technology Act, 2000)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Tier_3_The_Modern_Rights-Based_Approach_Digital_Personal_Data_Protection_Act_2023\" >Tier 3: The Modern Rights-Based Approach (Digital Personal Data Protection Act, 2023)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Seeking_Redressal_A_Procedural_Roadmap\" >Seeking Redressal: A Procedural Roadmap<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Looking_Ahead_Challenges_and_the_Future_of_Digital_Safety\" >Looking Ahead: Challenges and the Future of Digital Safety<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.legalserviceindia.com\/Legal-Articles\/your-face-their-crime-a-legal-shield-against-deepfake-and-photo-harassment\/#Conclusion_Reclaiming_Power_in_the_Digital_Age\" >Conclusion: Reclaiming Power in the Digital Age<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>This article will break down your legal shield, explain how to use it, and analyze how we can strengthen it for the future, grounded in established law and recent judicial action.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Defining_the_Digital_Weaponry\"><\/span>Defining the Digital Weaponry<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before analyzing the legal remedies, it is crucial to understand the tools of this new-age harassment. While Indian statutes do not yet provide explicit legal definitions for these terms, their functional understanding is clear. Our law, being technology-neutral, focuses on the criminal act and its impact rather than the specific technology used.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Image_Morphing\"><\/span>Image Morphing<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This is the digital process of altering a genuine photograph, typically by superimposing a person&#8217;s face onto another body, often in an obscene, compromising, or defamatory context. It is a direct form of falsification intended to cause harm.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Deepfakes_Non-Consensual_Synthetic_Media\"><\/span>Deepfakes (Non-Consensual Synthetic Media)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This is a far more sophisticated form of manipulation that uses Artificial Intelligence (AI), specifically deep learning models, to generate hyper-realistic but entirely fabricated videos or audio clips. The term &#8220;deepfake&#8221; itself is a portmanteau of &#8220;deep learning&#8221; and &#8220;fake.&#8221;<\/p>\n<p>This technology can convincingly replicate a person&#8217;s likeness, voice, and mannerisms, making it a potent tool for malicious impersonation, disinformation, and creating non-consensual explicit content. For legal and policy purposes, a more precise term is <strong>Non-Consensual Synthetic Media (NCSM)<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Building_Your_Defence_Indias_Three-Tier_Legal_Shield\"><\/span>Building Your Defence: India&#8217;s Three-Tier Legal Shield<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>India\u2019s defence against these digital attacks rests on a layered, three-tier framework.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tier_1_The_Criminal_Law_Foundation_Bharatiya_Nyaya_Sanhita_2023\"><\/span>Tier 1: The Criminal Law Foundation (Bharatiya Nyaya Sanhita, 2023)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The BNS provides the foundational punishment for the criminal act itself. Key provisions include:<\/p>\n<ul>\n<li><strong>Section 79<\/strong> (Voyeurism)<\/li>\n<li><strong>Section 351<\/strong> (Criminal Intimidation)<\/li>\n<li><strong>Section 356<\/strong> (Defamation): This aligns with the judicial principle that the right to reputation is a core component of personal dignity. Recognizing this, courts like the Delhi High Court have recently passed proactive orders to protect the &#8216;personality rights&#8217; of public figures against unauthorized use of their likeness, establishing a strong precedent.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Tier_2_The_Tech_Law_Powerhouse_Information_Technology_Act_2000\"><\/span>Tier 2: The Tech Law Powerhouse (Information Technology Act, 2000)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This is our specialized law for the digital world, recently bolstered by government action.<\/p>\n<ul>\n<li><strong>Sections 66E, 67, and 67A<\/strong> remain the primary tools for penalizing the publication of private, obscene, or sexually explicit content online.<\/li>\n<li><strong>Corporate Responsibility &amp; Government Action:<\/strong> The IT Rules, 2021, compel social media companies to act. This obligation was strongly reiterated in late 2023 and early 2024 when the Ministry of Electronics and Information Technology (MeitY) issued multiple advisories explicitly directing platforms to remove deepfakes, warning that failure to comply could jeopardize their &#8220;safe harbour&#8221; protection.<\/li>\n<\/ul>\n<p><strong>Analysis:<\/strong> The &#8220;safe harbour&#8221; concept, which protects platforms from liability for user-generated content, is not absolute. As clarified by the Supreme Court in <em>Shreya Singhal v. Union of India<\/em>, this protection is conditional upon performing due diligence, which includes taking down illegal content after receiving &#8216;actual knowledge&#8217;. The MeitY advisories serve as a clear notice, strengthening the government&#8217;s position to hold non-compliant platforms accountable.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Tier_3_The_Modern_Rights-Based_Approach_Digital_Personal_Data_Protection_Act_2023\"><\/span>Tier 3: The Modern Rights-Based Approach (Digital Personal Data Protection Act, 2023)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The DPDP Act is a game-changer, reframing the issue from just a crime to a violation of your fundamental rights.<\/p>\n<ul>\n<li><strong>Your Face, Your Data:<\/strong> The Act establishes that your image and voice are your &#8220;personal data.&#8221; Using this data without your clear consent is illegal.<\/li>\n<li><strong>A New Avenue for Justice:<\/strong> The Act empowers you to file a complaint with the Data Protection Board of India, which can impose significant financial penalties on violators.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Seeking_Redressal_A_Procedural_Roadmap\"><\/span>Seeking Redressal: A Procedural Roadmap<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Knowing the law is the first step; applying it is the second. For a victim, the path to justice involves the following crucial procedures:<\/p>\n<ol>\n<li><strong>Immediate Evidence Preservation:<\/strong> This is the most critical first step. Before taking any other action, document the harassment. Take clear screenshots of the offensive content, the profile of the perpetrator, and any related messages. Copy the specific URL or web link. This evidence is indispensable for any subsequent complaint.<\/li>\n<li><strong>Reporting to the Intermediary:<\/strong> Utilize the reporting mechanism of the social media platform (e.g., Instagram, Facebook, X) where the content is posted. This is often the quickest method to have the content removed and stop its immediate circulation.<\/li>\n<li><strong>Formal Lodging of Complaint:<\/strong> For official legal action, file a complaint on the National Cyber Crime Reporting Portal. The portal has a specific option to &#8220;Report Crime Related to Women\/Children,&#8221; which ensures anonymity and priority handling. This action creates an official record and triggers an investigation by the relevant law enforcement agency.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Looking_Ahead_Challenges_and_the_Future_of_Digital_Safety\"><\/span>Looking Ahead: Challenges and the Future of Digital Safety<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Despite this robust framework, challenges remain. Enforcement is difficult against anonymous perpetrators, and viral content spreads much faster than any court case. The road ahead requires a multi-pronged strategy.<\/p>\n<ul>\n<li><strong>Proactive Corporate Action:<\/strong> As directed by MeitY, tech companies must invest in AI-driven tools to proactively detect and block deepfake content, moving beyond a simply reactive stance.<\/li>\n<li><strong>Legislative Evolution:<\/strong> We must continue to assess whether new, specific legislation is needed to criminalize the malicious creation of deepfakes, not just their dissemination.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion_Reclaiming_Power_in_the_Digital_Age\"><\/span>Conclusion: Reclaiming Power in the Digital Age<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The rise of deepfakes is a direct challenge to the right to privacy affirmed in the <em>Puttaswamy<\/em> judgment. Our legal system, through a combination of penal law, stringent IT regulations reinforced by government action, and a new data protection regime, offers a powerful response.<\/p>\n<p>By understanding these tools, demanding accountability from platforms, and utilizing the official reporting channels, we can transform legal theory into real-world justice and safeguard our dignity in the digital age.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: The New Face of Digital Harm Imagine scrolling through your phone and seeing a video that makes your heart stop. It\u2019s your face, but it\u2019s not your life. This digital violation is a direct infringement on the Fundamental Right to Privacy, recognized by the Supreme Court as an intrinsic part of the Right to<\/p>\n","protected":false},"author":187,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"_joinchat":[],"footnotes":""},"categories":[66],"tags":[28],"class_list":{"0":"post-6413","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-law","7":"tag-top-news"},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/6413","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/users\/187"}],"replies":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/comments?post=6413"}],"version-history":[{"count":0,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/6413\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/media?parent=6413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/categories?post=6413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/tags?post=6413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}