UAE citizen fined Dh300,000 for slander on social media

Agencies
December 18, 2018

Abu Dhabi: The Abu Dhabi Court of Appeal has upheld the decision to impose a fine of Dh300,000 against a social media influencer who was recently convicted of slander.

The Emirati man had posted a video on Instagram insulting an Emirati social media personality who goes by the name “Kashoona”.

The court also ordered for the video clip to be deleted, the defendant’s social media account be closed for two months, and the confiscation of his mobile phone which he used in posting the abusive online video.

The court also ordered the defendant to pay Dh21,000 to the plaintiff as temporary civil compensation for the damages suffered.

The incident took place during last summer’s celebrations when Saudi Arabia permitted women to drive.

After Saudi Arabia announced its decision allowing women to drive, Kashoona participated in celebrations as the first Emirati woman to drive a car in Saudi Arabia. She was among a large number of celebrities from several countries who attended.

On June 26, court documents showed that the defendant recorded a video hurling abuse at the female socialite and posted it on his Instagram account.

The Dh300,000 fine was imposed on the defendant in accordance with Article 20, Law No.5 of 2012 on Combatting Cybercrimes, which states that cybercrimes shall be punishable either by imprisonment no more than three years and/or a fine of not less than 250,000 and not exceeding Dh500,000.

The law further stipulates various penalties for a number of other cybercrimes, including insulting religions and their rituals, slandering public officials, forging electronic official documents, sending or re-publishing pornographic materials, reproducing credit or debit card data, and obtaining secret pin codes or passwords.

What is Article 20?

Article 20 of Law No.5, 2012 states:

“Without prejudice to the crime of slander determined by the Islamic Sharia, shall be punished by imprisonment and a fine not less than Dh250,000 and not in excess of Dh500,000 or either of these two penalties whoever insults or accuses another person of a matter of which he shall be subject to punishment or being held in contempt by others, by using a computer network or an information technology means.

“If a slander or insult is committed against a public official or servant in the course of or because of his work, this shall be considered an aggravating factor of the crime.”

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Mumbai, Mar 8: A day after the Enforcement Directorate registered a money laundering case against Yes Bank founder Rana Kapoor and raided his premises, he was taken to the agency's office in Mumbai on Saturday for further questioning.

Kapoor, who was grilled by central agency's officials on Friday night at his Samudra Mahal residence in Mumbai, was shifted to the ED office in the metropolis around 12.30 pm.

ED officials said Kapoor was questioned throughout the night, with some rest time.

A senior ED official connected with the probe told IANS: "Kapoor will be questioned about Yes Bank loans to Dewan Housing Finance Limited (DHFL)."

The official said that during searches a lot of incriminating documents were found and the agency wanted to grill him on his links with DHFL promoters and other companies.

Kapoor's alleged role in the disbursal of loan to a corporate entity and kickbacks reportedly received in his wife's bank account are also under probe.

The ED had filed the money laundering case against Kapoor and raided his residence, apart from issuing a look-out circular so that he does not flee the country.

The ED registered a money laundering case against Kapoor as a continuation of its probe against the DHFL wherein it was allegedly found that Rs 12,500 crore was diverted to 80 shell companies using one lakh fake borrowers. The transactions with these shell companies date back to 2015.

An ED official in New Delhi told IANS that the DHFL probe revealed that funds diverted by the DHFL originated from Yes Bank.

He said that the searches at Kapoor's residence on Friday night were meant to find out any irregularity in grant of loans to the DHFL by the Yes Bank.

The ED has accused Kapil and Dheeraj Wadhawan of DHFL of purchasing shares in five firms -- Faith Realtors, Marvel Township, Abe Realty, Poseidon Realty, and Random Realtors -- after which they were amalgamated with Sunblink.

The outstanding loans of these five firms, totalling around Rs 2,186 crore till July 2019, were allegedly appropriated onto the books of Sunblink to cover up the diversion of loans acquired from DHFL.

The ED's action comes after the RBI superseded Yes Bank Board for 30 days and appointed an administrator, putting a cap of Rs 50,000 on withdrawals by account holders for a month.

The RBI said that the bank's board was superseded "owing to serious deterioration in the financial position of the bank".

Former SBI CFO Prashant Kumar was appointed as administrator of Yes Bank, which has over 1,000 branches and 1,800-plus ATMs across the country.

On Thursday, Union Finance Minister Nirmala Sitharaman said that the bank was on watch since 2017 and developments relating to it were monitored on a day-to-day basis.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 16,2020

New Delhi, Jun 16: With an increase of 10,667 cases and 380 deaths in the past 24 hours, the COVID-19 count in India has reached 3,43,091 on Tuesday, according to the Union Health and Family Welfare Ministry.

It is noteworthy that today's spike in cases is lower than the 11,502 registered in the country yesterday and has also stayed below the 11 thousand mark it had been crossing for the past two days in a row.

However, there is an increase in the number of deaths due to the infection from yesterday, with 380 deaths being reported from across the country, the toll due to COVID-19 has now reached 9,900.

The COVID-19 count includes 1,53,178 active cases, while 1,80,013 patients have been cured and discharged or migrated so far.

Maharashtra with 1,10,744 cases continues to be the worst-affected state in the country with 50,567 active cases while 56,049 patients have been cured and discharged in the state so far. The toll due to COVID-19 has crossed the four thousand mark and reached 4,128 in the state.
It is followed by Tamil Nadu with 46,504 and the national capital with 42,829 confirmed cases.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.