{"id":1856,"date":"2025-11-26T09:03:32","date_gmt":"2025-11-26T09:03:32","guid":{"rendered":"https:\/\/ssrana.in\/posh-law\/?p=1856"},"modified":"2026-04-06T12:40:40","modified_gmt":"2026-04-06T12:40:40","slug":"when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment","status":"publish","type":"post","link":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/","title":{"rendered":"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment?"},"content":{"rendered":"<p class=\"em-name\">By Anuradha Gandhi, Isha Sharma and Rishabh Gupta<\/p>\n<p><strong>Introduction<\/strong><\/p>\n<p>It took nothing more than a single unchanged default password- Admin123- to unlock what has now become one of India\u2019s most unsettling episodes of digital exploitation. What initially appeared to be a case of negligence in cybersecurity at Payal Maternity Hospital in Rajkot, Gujarat soon spiralled into a disturbing national scandal, forcing the country to confront a critical question: <strong><em>when women\u2019s intimate moments are secretly filmed, sexualised and circulated online, can such acts be categorized as \u2018Sexual Harassment\u2019?<\/em><\/strong><\/p>\n<p>The Rajkot Hospital\u2019s CCTV cameras, left vulnerable due to their default administrative login, were effortlessly breached by hackers. What they accessed was deeply private: hours of footage of women undergoing gynaecological examinations. These illegally acquired recordings-capturing moments of extreme sensitivity and medical vulnerability- were widely circulated and sold on pornographic platforms for monetary gain, thereby, raising questions about digital security, institutional accountability and the legal and ethical rights of women in India.<\/p>\n<h2 class=\"short__heading2\">Inside the Cybercrime Network: From Rajkot to Global Porn Channels<\/h2>\n<p>This cybercrime came to light when teaser videos from the <em>Rajkot<\/em> facility surfaced on YouTube channels such as <em>\u201cMegha Mbbs\u201d <\/em>and<em> \u201ccp monda\u201d.<\/em> Viewers of these clips were then lured to Telegram groups, where the complete explicit footage was sold for amounts ranging between INR 700 and INR 4,000.<\/p>\n<p>As the probe deepened, they uncovered a deeply troubling truth: the Rajkot breach was only the tip of the iceberg. Approximately 80 CCTV dashboards across the country had been compromised, extending far beyond hospitals, including in Pune, Mumbai, Nashik, Surat, Ahmedabad, and\u00a0<a href=\"https:\/\/www.livemint.com\/news\/india\/shocking-delhi-residents-duped-of-rs-1-000-crore-by-cyber-fraudsters-this-year-amid-rising-scams-digital-arrest-11760708466619.html\">Delhi<\/a>, as reported. <a href=\"#_ftn1\">[1]<\/a><\/p>\n<p><em>Investigators stated that most of the hacked locations had retained the default password for the CCTV dashboard, which was admin123. The hackers used a brute force attack to gain access to the system, using combinations of words, numbers and symbols. The default password being retained made the job easy.<a href=\"#_ftn2\"><strong>[2]<\/strong><\/a><\/em><\/p>\n<h3 class=\"short__heading2 text-left\">Violation of Legal Rights and Safety<\/h3>\n<p>This incident has exposed the gaps in policy, compliance, and enforcement relevant not only in terms of gender justice but also in the protection of fundamental rights, technological accountability and medical ethics.<a href=\"#_ftn3\">[3]<\/a><\/p>\n<p>Breach of Fundamental Rights: The unauthorized recording, accessing and circulation of intimate footage constitutes a direct violation of the Right to Privacy, recognized as a fundamental right under Article 21 of the Indian Constitution<\/p>\n<p>Breach of the Information Technology Act, 2000: Several provisions of the IT Act were triggered:<\/p>\n<ul>\n<li>Section 43A- The failure of the hospital to change the default password is a textbook example of negligent data protection.<\/li>\n<li>Section 66E- Punishes intentional or knowingly violation of privacy by capturing, publishing or transmitting images of a person\u2019s private area without consent.<\/li>\n<li>Section 72-Penalises breach of confidentiality and privacy arising from unauthorized access or disclosure.<\/li>\n<\/ul>\n<p>The conduct also attracts Criminal Offences under the Bharatiya Nyaya Sanhita (BNS):<\/p>\n<ul>\n<li>Section 77 (Voyeurism)- For acts amounting to criminal intrusion, including non-consensual recording and distribution of women engaged in private acts<\/li>\n<li>Section 79-For outraging the modesty of a woman<\/li>\n<\/ul>\n<p>Another distressing aspect of the incident is the breach of <em>Medical Council of India (MCI) Code of Ethics Regulations: Mandates patient confidentiality and dignified treatment by healthcare providers.<\/em><\/p>\n<h3 class=\"short__heading2 text-left\">Sexual Harassment in the Digital Sphere: Beyond Physical Contact<\/h3>\n<p>The Rajkot CCTV breach is not only a case involving violation of privacy, failure of data protection and institutional negligence- it is also a powerful reminder that sexual harassment today is not just confined to physical proximity, touch or direct advances. It has firmly entered the digital sphere, where technology becomes a tool for sexual intrusion.<\/p>\n<p>Acts that involve capturing, viewing and circulating a woman\u2019s intimate body without consent shall constitute sexual harassment, even if no physical contact occurs.<\/p>\n<p>As the definition of \u00a0sexual harassment\u00a0 includes any or all of the following acts:<\/p>\n<ul>\n<li>Physical contact and advances involving unwelcome and explicit sexual overtures; or<\/li>\n<li>A demand or request for sexual favours.<\/li>\n<li>Showing pornography against the will of a woman; or<\/li>\n<li>Making sexually coloured remarks<\/li>\n<\/ul>\n<p>The concerned Rajkot incident exemplifies this expanded understanding<\/p>\n<ul>\n<li>Women\u2019s intimate bodies were viewed without consent<\/li>\n<li>Their private moments were turned into sexual content<\/li>\n<li>Their dignity was violated for monetary gain<\/li>\n<li>Their vulnerability was exploited and distributed globally<\/li>\n<\/ul>\n<p>This is what we may term as sexual harassment in its digital form: <strong><em>cyber-sexual harassment<\/em><\/strong><\/p>\n<p>The judicial precent that reinforces this understanding is the ruling in the case of <strong><em>Sudhir Kumar vs. the State of NCT of Delhi, 2025<\/em><\/strong> wherein the court clarified an essential principle that dissemination of intimate images, even if it was in a consensual relationship, it shall be construed a grave violation of dignity and privacy.<\/p>\n<h3 class=\"short__heading2 text-left\">Deepfakes and Data Privacy<\/h3>\n<p>With the growing deployment of CCTV networks, the rise of non-consensual imagery or deepfakes pornography can be traced to the increasing availability of visual and audio data that can easily serve as a source material for manipulation. Deepfake technology uses Artificial Intelligence (hereinafter referred to as \u201cAI\u201d) to create highly realistic and convincing fake videos, images and audio recording posing serious risks such as privacy breaches, disinformation and social engineering attacks<a href=\"#_ftn4\">[4]<\/a>. Such footage and deepfakes often contain sensitive personal data that can identify individuals (particularly women) including facial biometrics, voice recordings and real-time tracking of such individuals.<\/p>\n<p>The K.S. Puttaswamy judgment which brought right to privacy as a fundamental right under Article 21 of the Constitution also addressed the concept of Reasonable Expectation of Privacy in intimate spaces such as gynecology wards in a hospital vicinity. The court ruled that such expectation of privacy is not only confined to intimate spaces such as bedroom or washroom, but also includes public places as well, and such privacy is not lost merely because an individual is in a public place<a href=\"#_ftn5\">[5]<\/a>.<\/p>\n<p>The existing Information Technology Act, 2000 and the Bharatiya Nyay Sanhita, 2023 penalizes cybercrimes or computer-generated crimes which includes deepfakes. Furthermore, the Digital Personal Data Protection Act, 2023 which mandates <strong><em>Data Fiduciaries (hospitals in this case)<\/em><\/strong> to implement reasonable security safeguards to protection personal information imposes a penalty of upto 250 crores on failure to fulfill such compliance.<\/p>\n<p>To read more on how Deepfakes and AI generated images are regulated, please refer our article available at: <a href=\"https:\/\/ssrana.in\/articles\/ai-and-deepfakes-navigating-the-digital-revolution-and-its-dark-side\/\">https:\/\/ssrana.in\/articles\/ai-and-deepfakes-navigating-the-digital-revolution-and-its-dark-side\/<\/a><\/p>\n<h3 class=\"short__heading2 text-left\">Conclusion<\/h3>\n<p>In conclusion, the Gujarat hospital footage leak is not just a cybercrime but a grave violation of constitutional freedoms and gender justice. It calls for sweeping reforms in institutional accountability, stronger cybersecurity protocols, regular audits, and public awareness campaigns. For the usage of CCTV images, a warning sign showing the relevant information in a clearly readable manner must be displayed publicly at a place to the individuals, for example as a complete information sheet available at a central location such as at reception or information desk. Only through vigilant compliance and respect for patient dignity can trust in medical institutions be restored and future violations prevented.<\/p>\n<p>&nbsp;<\/p>\n<p id=\"_ftn1\" class=\"text-left\">[1] <a href=\"https:\/\/www.livemint.com\/news\/india\/how-admin123-password-led-to-rajkot-hospital-cctv-footage-getting-uploaded-on-porn-sites-11762286361206.html\">https:\/\/www.livemint.com\/news\/india\/how-admin123-password-led-to-rajkot-hospital-cctv-footage-getting-uploaded-on-porn-sites-11762286361206.html<\/a><\/p>\n<p id=\"_ftn2\" class=\"text-left\">[2] <a href=\"https:\/\/www.hindustantimes.com\/india-news\/how-rajkot-hospital-cctv-footage-ended-up-on-porn-sites-due-to-weak-password-101762267244308.html\">https:\/\/www.hindustantimes.com\/india-news\/how-rajkot-hospital-cctv-footage-ended-up-on-porn-sites-due-to-weak-password-101762267244308.html<\/a><\/p>\n<p id=\"_ftn3\" class=\"text-left\">[3] <a href=\"https:\/\/ssrana.in\/posh-law\/articles\/consensual-sex-whether-a-license-to-upload-videos-on-social-media\/\">https:\/\/ssrana.in\/posh-law\/articles\/consensual-sex-whether-a-license-to-upload-videos-on-social-media\/<\/a><\/p>\n<p id=\"_ftn4\" class=\"text-left\">[4] <a href=\"https:\/\/www.cert-in.org.in\/s2cMainServlet?pageid=PUBVLNOTES02&amp;VLCODE=CIAD-2024-0060\">https:\/\/www.cert-in.org.in\/s2cMainServlet?pageid=PUBVLNOTES02&amp;VLCODE=CIAD-2024-0060<\/a><\/p>\n<p id=\"_ftn5\" class=\"text-left\">[5] Chandrachud, J, at para 3(f), J. Bobde at para 22, K.S. Puttaswamy v. Union of India<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Anuradha Gandhi, Isha Sharma and Rishabh Gupta Introduction It took nothing more than a single unchanged default password- Admin123- to unlock what has now become one of India\u2019s most unsettling episodes of digital exploitation. What initially appeared to be a case of negligence in cybersecurity at Payal Maternity Hospital in Rajkot, Gujarat soon spiralled [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1861,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-1856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment? - POSH Law<\/title>\n<meta name=\"description\" content=\"Can cyber privacy violations be sexual harassment? Discover legal framework, workplace protections, and compliance requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"poshlaw\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/\"},\"author\":{\"name\":\"poshlaw\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#\\\/schema\\\/person\\\/0e866df8c3f6caa5207feb706319251d\"},\"headline\":\"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment?\",\"datePublished\":\"2025-11-26T09:03:32+00:00\",\"dateModified\":\"2026-04-06T12:40:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/\"},\"wordCount\":1193,\"publisher\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/\",\"url\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/\",\"name\":\"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment? - POSH Law\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp\",\"datePublished\":\"2025-11-26T09:03:32+00:00\",\"dateModified\":\"2026-04-06T12:40:40+00:00\",\"description\":\"Can cyber privacy violations be sexual harassment? Discover legal framework, workplace protections, and compliance requirements.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp\",\"contentUrl\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp\",\"width\":338,\"height\":150,\"caption\":\"When Privacy is Violated Can such Cyber Acts be called Sexual Harassment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/articles\\\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#website\",\"url\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/\",\"name\":\"POSH Law\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#organization\",\"name\":\"POSH Law\",\"url\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/SSRana.webp\",\"contentUrl\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/SSRana.webp\",\"width\":240,\"height\":66,\"caption\":\"POSH Law\"},\"image\":{\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/#\\\/schema\\\/person\\\/0e866df8c3f6caa5207feb706319251d\",\"name\":\"poshlaw\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29fb66c429e1b6a4aeec8d7918679f839d6f9b313cb94bc59a76dc8d3dc16f73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29fb66c429e1b6a4aeec8d7918679f839d6f9b313cb94bc59a76dc8d3dc16f73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29fb66c429e1b6a4aeec8d7918679f839d6f9b313cb94bc59a76dc8d3dc16f73?s=96&d=mm&r=g\",\"caption\":\"poshlaw\"},\"sameAs\":[\"https:\\\/\\\/ssrana.in\\\/posh-law\"],\"url\":\"https:\\\/\\\/ssrana.in\\\/posh-law\\\/author\\\/poshlaw\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment? - POSH Law","description":"Can cyber privacy violations be sexual harassment? Discover legal framework, workplace protections, and compliance requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/","twitter_misc":{"Written by":"poshlaw","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#article","isPartOf":{"@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/"},"author":{"name":"poshlaw","@id":"https:\/\/ssrana.in\/posh-law\/#\/schema\/person\/0e866df8c3f6caa5207feb706319251d"},"headline":"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment?","datePublished":"2025-11-26T09:03:32+00:00","dateModified":"2026-04-06T12:40:40+00:00","mainEntityOfPage":{"@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/"},"wordCount":1193,"publisher":{"@id":"https:\/\/ssrana.in\/posh-law\/#organization"},"image":{"@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#primaryimage"},"thumbnailUrl":"https:\/\/ssrana.in\/posh-law\/wp-content\/uploads\/2025\/11\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp","articleSection":["Articles"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/","url":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/","name":"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment? - POSH Law","isPartOf":{"@id":"https:\/\/ssrana.in\/posh-law\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#primaryimage"},"image":{"@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#primaryimage"},"thumbnailUrl":"https:\/\/ssrana.in\/posh-law\/wp-content\/uploads\/2025\/11\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp","datePublished":"2025-11-26T09:03:32+00:00","dateModified":"2026-04-06T12:40:40+00:00","description":"Can cyber privacy violations be sexual harassment? Discover legal framework, workplace protections, and compliance requirements.","breadcrumb":{"@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#primaryimage","url":"https:\/\/ssrana.in\/posh-law\/wp-content\/uploads\/2025\/11\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp","contentUrl":"https:\/\/ssrana.in\/posh-law\/wp-content\/uploads\/2025\/11\/When-Privacy-is-Violated-Can-such-Cyber-Acts-be-called-Sexual-Harassment.webp","width":338,"height":150,"caption":"When Privacy is Violated Can such Cyber Acts be called Sexual Harassment"},{"@type":"BreadcrumbList","@id":"https:\/\/ssrana.in\/posh-law\/articles\/when-privacy-is-violated-can-such-cyber-acts-be-called-sexual-harassment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ssrana.in\/posh-law\/"},{"@type":"ListItem","position":2,"name":"When Privacy is Violated: Can such Cyber Acts be called Sexual Harassment?"}]},{"@type":"WebSite","@id":"https:\/\/ssrana.in\/posh-law\/#website","url":"https:\/\/ssrana.in\/posh-law\/","name":"POSH Law","description":"","publisher":{"@id":"https:\/\/ssrana.in\/posh-law\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ssrana.in\/posh-law\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/ssrana.in\/posh-law\/#organization","name":"POSH Law","url":"https:\/\/ssrana.in\/posh-law\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/ssrana.in\/posh-law\/#\/schema\/logo\/image\/","url":"https:\/\/ssrana.in\/posh-law\/wp-content\/uploads\/2023\/04\/SSRana.webp","contentUrl":"https:\/\/ssrana.in\/posh-law\/wp-content\/uploads\/2023\/04\/SSRana.webp","width":240,"height":66,"caption":"POSH Law"},"image":{"@id":"https:\/\/ssrana.in\/posh-law\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ssrana.in\/posh-law\/#\/schema\/person\/0e866df8c3f6caa5207feb706319251d","name":"poshlaw","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/29fb66c429e1b6a4aeec8d7918679f839d6f9b313cb94bc59a76dc8d3dc16f73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29fb66c429e1b6a4aeec8d7918679f839d6f9b313cb94bc59a76dc8d3dc16f73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29fb66c429e1b6a4aeec8d7918679f839d6f9b313cb94bc59a76dc8d3dc16f73?s=96&d=mm&r=g","caption":"poshlaw"},"sameAs":["https:\/\/ssrana.in\/posh-law"],"url":"https:\/\/ssrana.in\/posh-law\/author\/poshlaw\/"}]}},"_links":{"self":[{"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/posts\/1856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/comments?post=1856"}],"version-history":[{"count":5,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/posts\/1856\/revisions"}],"predecessor-version":[{"id":1872,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/posts\/1856\/revisions\/1872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/media\/1861"}],"wp:attachment":[{"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/media?parent=1856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/categories?post=1856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ssrana.in\/posh-law\/wp-json\/wp\/v2\/tags?post=1856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}