Sandeep Mittal, I.P.S.,*
The Indian Journal of Criminology & Criminalistics, Volume 35 (2) July – Dec. 2015
Social media is undoubtedly a revolution in the business arena blessing the organizations with the power to connect to their consumers directly. However, as the saying goes nothing comes without a cost; there is cost involved here as well. This article examines the risks and issues related to social media at the time when the world is emerging as a single market. Social networking and online communications are no more just a fashion but an essential feature of organizations in every industry. Unfortunately, inappropriate use of this media has resulted in increasing risks to organizational reputation threatening the very survival in the long-run and necessitating the management of these reputational risks.
This article attempts to explore the various risks associated with social media. The main aim of this study is to particularly focus on reputational risks and evaluate it’s intensity from the perspectives of public relations and security staff of an organization. The article is structured to firstly explain the concept of social media followed by identification of various social media risks and the analysis of reputational risk from perspectives of public relations and organizational security staff. The article then based on the analysis provides various recommendations in order to help the contemporary organizations to overcome such risks and thus, enhance their effectiveness and efficiency to gain competitive advantage in the long-run.
Keywords: Reputational Risk, Online Social Media, OSM Security, OSM Risk, Organizational Reputation, Cyber Security, Information Assurance, Cyber Defence, Online Communication.
With changing times, the concept of socializing has been transforming. Globalization and digitalization to a large extent are responsible for the same. With internet, it is possible to stay connected with people located in various regions of the world. One such medium of socializing is the social media. In todays time, online social media services have been one of the most vibrant tools adopted not only by individuals but also corporate and government organizations (Picazo-Vela et al., 2012). Corporates in fact have been abiding social media extensively as it is one of the cheapest ways of communicating with the masses. The importance of social media can be understood from the fact that at present there are more than 100 million blogs that are highly operational and connect people from across the world (Kietzmann et al., 2010). Further there has been a surge in social media members for websites like Facebook or Twitter with over 800 million active users in Facebook in 2012 and 300 million users of Twitter (Picazo-Vela et al., 2012). In spite of being a very powerful mode of communication it is subjected to a large number of risks.
Organizations do not operate in vacuum, thus, management of reputation is crucial for them, as it affects their markets as well as the overall environment. Organizational reputation not only impacts its existing relations but also affects the future courses of action (McDonnell and King, 2013). In this article, an attempt is made to understand the various reputational risks associated with social media that affects an organization’s working and also suggests some ways to overcome them.
Concept of Social Media
The foundations of social media have been laid by the emergence of Web 2.0 (Kaplan and Haenlein, 2010). It is with the help of this technological development that social media is accessed at such a wide scale and is available in devices like cell phones and tablets, other than personal computers and laptops. Social media is gaining importance in the corporate world as decision makers and consultants are exploring its various aspects to exploit its potential optimally (Kaplan and Haenlein, 2010). Social media is an online communication system through which information is generated, commenced, distributed and utilized by a set of consumers who aim to aware themselves regarding various aspects related to a product, service, brand, problems and persona (Mangold and Faulds, 2009). It is also known as consumer-generated media. In simple terms, it can be explained as a platform to create and sustain relationships through an Internet based interactive platform.
Social media is categorized under collaborative projects, blogs, content communities, social networking sites, virtual game worlds, and virtual social worlds (Kaplan and Haenlein, 2010). The examples of various communication systems under social media are provided in the Table 1 for ready reference.
Organizations have realized the importance of social media and have been using it along with other integrated marketing communication tools to converse with target audience effectively and efficiently (Michaelidou et al, 2011). This is mainly because the modern day consumers are shifting from traditional promotional sources to such modernized sources. Social media has a very strong hold and is influencing consumer behavior to a large extent. Out of all the above few examples, Twitter has emerged as one of the most powerful social media tools. In the present day scenario, approximately 145 million users communicate by transferring around 90 million ‘tweets’ per day, of 140 characters or less (Kietzmann et al, 2010). Another example is of Youtube in which videos can go viral in few seconds and can attract more than 9.5 million views for a single video (Kietzmann et al, 2010).
Table 1: Example of Social Media Types
|Social Media Type||Example|
|Social networking websites||MySpace, Facebook, Faceparty, Twitter|
|Innovative sharing websites||Video Sharing (Youtube), Music Sharing (Jamendo.com), Photo Sharing (Flickr), Content Sharing (Piczo.com), General intellectual property sharing (Creative Commons),|
|User-sponsored blogs||The Unofficial AppleWeblog, Cnet.com|
|Company-sponsored websites/blogs||Apple.com, P&G’s Vocalpoint|
|Company-sponsored cause/help sites||Dove’s Campaign for Real Beauty, click2quit.com|
|Invitation-only social networks||ASmallWorld.net|
|Business networking sites|
|Virtual worlds||Second Life|
|Commerce communities||eBay, Amazon.com, Craig’s List, iStockphoto, Threadless.com|
|Podcasts||For Immediate Release: The Hobson and Holtz Report|
|News delivery sites||Current TV|
|Educational materials sharing||MIT OpenCourseWare, MERLOT|
|Open Source Software communities||Mozilla’s spreadfirefox.com, Linux.org|
|Social bookmarking sites which permit browsers to suggest online news stories, music, videos||Digg, del.icio.us, Newsvine, Mixx it, Reddit|
Source: Mangold and Faulds, 2009.
Risks Associated with Social Media
Before discussing the various risks associated with social media, it is essential to understand the various risks faced by an organization while using the internet. This can be depicted with the help of a diagram provided as Figure 1.
Source: Lichtenstein and Swatman, 1997
In Figure 1, other internet participants imply other members from the internet society. These risks are very general and are experienced by organizations even in cases where they are not connected to the internet like the risks associated with corrupted software (Lichtenstein and Swatman, 1997).
The horizon of risks have expanded to a larger extent by things becoming more critical and complicated with extensive popularity and usage of social media (Armstrong, 2012). Organizations are challenged with new and unique risks which need to be catered proactively. These risks threaten the effectiveness of this mode and thus organizations fail to reap its benefits completely. It is due to such risks that many organizations have either limited their approach towards usage of social media or do not resort to such measures. Such risks range from data outflow and legal complications to risks associated with reputation (Everett, 2010).
These risks can be categorized under two heads namely; those related to user and security related issues (Chi, 2011). User related risks are inadequate certification controls, phishing, information seepage, and information truthfulness (Chi, 2011). The security related risks are Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), injection defects, deficient anti-automation (Chi, 2011).
Out of all the risks related to social media, an organization is mainly threatened with risks related to information confidentiality, organizational reputation and legal conformities (Thompson, 2013). Issues related to information confidentiality emerge mainly because information is shared digitally using social media. Thus, there are chances of such information getting hacked or shared unintentionally. This may raise risks related to privacy thus affecting information integrity.
Legal issues while using social media are bound to take place mainly because this media is used for global approach and is therefore affected by international rules and regulations. It is challenging for an organization to understand varied legal obligations of differing countries and then determine a universally accepted legal protocol. Risks related to organizational reputation are discussed in detail in the next section.
Reputation of an individual or organization is related to one’s reliability and uprightness. Thus, managing and securing the reputation becomes highly critical. With organizations resorting to social media extensively, they are bound to experience such reputational risks thus affecting their goodwill negatively. Reputational risks arise from the fact that organizations share all-embracing information with customers and browsers (Woodruff, 2014). This information in many circumstances is misused which damages organizational reputation. The various depressing effects from reputational damage are negative impact on goodwill in the real world, restricting development of social contacts and contracts, detrimental impact on attracting potential customers (Woodruff, 2014). In one of the research studies, 74 per cent employees accept the ease of causing reputational damage to organizations through social media (Davison et al., 2011). It is due to this reason that organizations to a large extent scrutinize the use of social networking sites by their employees.
Public relations depict organization’s relations with its various stakeholders. Organizations use the social media platform to interact with their stakeholders and thus develop a strong and positive public image. In fact the social media, organizations and stakeholders together interact within the dynamic business world (Aula, 2010). These interactions are shaped by organizational public relations objectives and the extent of social media usage for developing organizational reputation. But developing and sustaining a positive public relation is not easy as they are hampered to a large extent when subjected to reputational risks. Organization’s personal identity is at stake as it can be plagiarized and used without authentication (Weir et al, 2011).
Reputational risks are related to organizational credibility and results from security risks like identity theft and profiling risks. These risks challenge organizational reputation by questioning its compliance with societal rules and regulations (McDonnell and King, 2013). Organizations to a large extent fail to integrate social media with organizational and stakeholders objectives resulting into ineffective reputation management.
Social media has made organizations global, due to which even minor incidents get highlighted internationally. Local issues get international fame resulting in a negative reputation for the organization globally. Further with social media being active, organizations cannot escape from the clutches of negative publicity (Kotler, 2011). One example of failure of reputation management that resulted in earning negative fame across the world is Nestle. In 2010, Greenpeace uploaded a video on YouTube against KitKat by Nestle (Berthon et al, 2012). The video went viral and resulted in negative publicity for the organization. Though the advertisement was made mainly for consumers in Malaysia and Indonesia for conserving rainforests but it was acknowledged by the world at large.
Another risk that is faced by the organizations is the creation of a public image through standardized marketing programs. Differing stakeholders from different countries use different social media platforms which make it essential for organizations to clearly analyze and understand their usage requirements and patterns. This is where most of the organizations fail and thus are unable to use social media appropriately.
Below is a graph that depicts usage of differing social media platforms in different countries as per statistics in 2011 (Berthon et al, 2012).
Source: Berthon et al, 2012
Organizational Security Staff
Organizational employees are indispensable for the success. But these employees can also be a threat to the organization. It is mainly possible as employees have access to organization’s confidential and important information which they can leak to outsiders. With social media’s growing popularity, the line between personal and professional conversations on web has become blurred. Further inspite of keeping this information under security they can evade such systems through illegal measures. Further research has proved that only in USA approximately 83per cent staffs use organizational resources to contact their social media (Zyl, 2009). Other than using these resources for personal messages exchange over social media, 30 per cent employees in USA and 42 per cent employees in UK also exchanged information related to their work and organization (Zyl, 2009). This depicts the intensity of problem of security risks related to social media. Thus, the organizational security staff has to be on its toes to ensure that such information is highly secured and not utilized inappropriately.
In 2002, an employee of an international financial services organization in the USA infiltrated the organizational digital security systems and used ‘Logic Bomb’ virus to delete approximately 10 billion files from 1300 organization’s servers. This resulted in a financial loss of around $3 million and it also had to suffer due to negative publicity. This depicts failure of organizational society staff to combat risks. Such issues have become very common in the social networking world. Employees have the freedom to generate nasty and unsecured comments or links that harms organizational reputation, finances and creates security related risks (Randazzo, 2005).
With the help of social media, social engineering attacks are possible due to easy admission to hefty information by hackers, spammers and virus creators. They can easily misuse the same by creating fake profiles, stealing identity and collect details with regards to job titles, phone numbers, e-mail addresses. Further they can also corrupt systems using malwares that ultimately are a threat to organizational data. Data infiltration and loss ultimately impact organizational reputation negatively as these leaked data are used for unauthentic and illegal activities.
Organizations who are either unaware of these risks or are unable to defend themselves can face dire consequences at times. Organizations are aware of the gains that they would derive from using social media networking and thus take such risks readily. These risks cannot be avoided completely,organizations need to work out measures through which they can manage these risks and mitigate their negative influences.
In order to overcome issues related to privacy that ultimately results in hampering one’s reputation, the organizations should take proactive measures before using social media. During the sign-up phase or creation of social networking profiles, specific concerns related to privacy and confidentiality should be resolved and proper regulations designed (Fogel and Nehmad, 2009). These rules and regulations should be very clearly communicated to organizational employees so that they have complete information regarding social media dos and don’ts. Further the organization should not only design strict punishments but also execute them against those who break such rules (Hutchings, 2012).
One of the ways to overcome reputational risks related to social media is by appointing an efficient social media manager. These managers are specialists and would be responsible for determining the social media related protocol based on organizational top secret information, contemporary issues and prospective plans (Bottles and Sherlock, 2011). The social media manager should have a responsibility towards the organization and various stakeholders and thus intermingle with them sincerely and empathetically (Brammer and Pavelin, 2006). The manager should also have a vigilant eye and an analytical attitude to identify various fact, figures and events that can impact organizational reputation and thus take corrective actions. As security staff play crucial role in determining organizational security standards, the organizations should be very specific in recruiting and selecting them. Besides, there should be a greater emphasis in the organization development of culture, values, and ethics within an organization.
Organizations should also understand that management of reputational risks requires collaborative and innovative approach. The organization needs to develop a social media involvement protocol by consulting and taking advice from differing sources like legal experts, marketing experts, international business experts, media experts and other stakeholders (Montalvo, 2011). The organization should also be innovative in selecting and distributing the content through social media so that it can responsibly deal with issues.
Organizations today prefer to use social media in comparison to traditional media (Hutchings, 2012). It is mainly due to the various benefits associated with the same but they cannot also overlook various associated risks. It takes ages for an organization to develop a positive reputation and thus careful measures needs to be taken to maintain and sustain it. Organizations are unable to exercise control on social media completely but they can take restrictive measures to ensure that reputational risks are minimized and their ill effects are combated.
The article identified that the major reputational risks related to social media for organizations arise due to data outflow, identity theft, profiling risks, inappropriate choice of public relation strategy, inability to control external environmental factors, inappropriate information management and security policy and failure to have efficient and effective security staff. In order to overcome such issues, organizations need to appoint social media managers and hire employees skilled in social media management. Further, it should be a collaborative and creative approach and design social media protocol to mitigate such risks.
To conclude, it can be stated that the organizations need to be proactive and have a vigilant eye on environmental factors to secure themselves and benefit from online social media.
Note: The views expressed in this paper are of the author and do not necessarily reflect the views of the organization where he worked in the past or is working presently, the author convey his thanks to Chevening TCS Cyber Policy Scholarship of UK Foreign and Commonwealth Office, who sponsored part of this study.
A. Kaplan, and M. Haenlein, “Users of the world, unite! The challenges and opportunities of Social Media. “Business horizons, vol: 53, iss: 1, 2010, pp. 59-68. http://openmediart.com/ log/pics/sdarticle.pdf. [Accessed on 07/08/2014]
A. Woodruff, Necessary, unpleasant, and disempowering: reputation management in the internet age. ACM, In Proceedings of the 32nd annual ACM conference on Human factors in computing systems,2014, pp. 149-58. http://delivery.acm.org/10.1145/2560000/2557126/p149- woodruff.pdf?ip=220.127.116.11&id=2557126&acc= OA&key=4D4702B0C3E38B35% 2E4D4702B 0C3E38B 35 %2E4D4702B 0C3E38B 35 % 2E362513C443C43C7A&CFID= 381960244&CFTOKEN=18798755&__acm__=1404667886_023e822660bflb 4433893921552068cc [ Accessed on 06/07/2014 ]
A. Zyl, “The impact of Social Networking 2.0 on organisations. “Electronic Library, vol. 27, iss: 6, 2009, pp. 906-18. https://kenniscafe.com/documents/2314/impact_of social_networking.pdf. [Accessed on 07/08/2014]
C. Everett, “Social media: opportunity or risk?” Computer Fraud & Security, vol: 2010, iss: 6,2010, pp. 8-10. http://ac.els-cdn.com/S136137231070066X/1-s2.0-S136137231070066X-main.pdf?_tid=0d2ff5f6-0528-11e4-92dd00000aab0f26&acdnat=1404663210_ d16c69fe23c071cc363e2a967ce68e4e. [Accessed on 06/07/2014].
C. Hutchings, “Commercial Use of Facebook and Twitter: Risks and Rewards.” Computer Fraud & Security, vol: 2010, iss: 6,2012, pp. 19-20. http://ac.els-cdn.com/S1361372312700659/l-s2.0¬S 1361372312700659-main.pdf?_tid=ed89f016-0528- 11 e4-8935 -00000aab0f27 &acdnat= 14046635870ebcbda0807a69b549a7dfa0a62430c1. [Accessed on 06/07/2014]
G. Weir, F. Toolan, and D. Smeed, “The threats of social networking: Old wine in new bottles?”. Information Security Technical Report, vol: 1, 6, 2011, pp. 38-43. http://ac.els-cdn.com/ S1363412711000598/1-s2.0-51363412711000598-main.pdf?_tid=fe220808-052a-l1e4-80b4- 00000aacb361&acdnat=1404664473_4ac2c6946ec5ac14beeaf9f567432b0d. [Accessed on 06/07/ 2014]
H. Davison, C. Maraist and M. Bing, “Friend or Foe? The Promise and Pitfalls of Using Social Networking Sites for HR Decisions”. Journal of Business Psychology, vol: 26, 2011 pp. 153-9. https://e-hrinnovations.com/Davison%20et%20a1 JBP_2011_Social%20Networking %20and%2OHR.pdf [Accessed on 06/07/2014].
I. Ahmed, Fascinating #SocialMedia Stats 2015: Facebook, Twitter, Pinterest, Google+, 2015. http://www.digitalinformationworld.com/2015/02/fascinating-social-networking-stats-2015.html (Accessed: 24/05/2016)
J. Fogel and E Nehmad, “Internet social network communities: Risk taking, trust, and privacy concerns.” Computers in Human Behavior, vol: 25, 2009,pp, 153-160. http://ac.els-cdn.com/ S0747563208001519/1-s2.0-50747563208001519-main.pdf?_tid=36c1e884-052d-l1e4-bd79- 00000aacb35d&acdnat=1404665427_ecb8f0d08d037b033d3e8c901bf2d27f. [Accessed on 06/ 07/2014].
J. Kietzmann, K. Hermkens, I. McCarthy and B. Silvestre, “Social media? Get serious! Understanding the functional building blocks of social media.” Business horizons, vol: 54, iss: 3, 2011,pp. 241-51. http://busandadmin.uwinnipeg.ca/silvestrepdfs/PDF06.pdf. [ Accessed on 07/08/2014 ]
K. Bottles, & T. Sherlock, “Who should manage your social media strategy”. Physician executive, vol: 37, iss: 2, 2011, pp: 68-72. http://www.kentbottles.com/modx/assets/templates/kb/pdfs/ WhoShouldManageYourSocialMediaStrategy.pdf [ Accessed on 06/07/2014 ]
K. Armstrong, “Managing your Online Reputation: Issues of Ethics, Trust and Privacy in a Wired, “No Place to Hide “World.” World Academy of Science, Engineering and Technology, vol: 6, 2012, pp. 716-21. http://www.waset.org/publications/2138 [ Accessed on 06/07/2014 ]
M. Chi, Security Policy and Social Media Use,2011 The SANS Institute. http://www.sans.org/ reading-room/whitepapers/policyissues/reducing-risks-social-media-organization-33749 [ Accessed on 07/07/2014]
M. Langheinrich and G. Karjoth, “Social networking and the risk to companies and institutions.” Information Security Technical Report, vol: 1 5, 2010,pp.51-6. http://ac.els-cdn.com/ 51363412710000233/1-s2.0-51363412710000233-main.pdf?_fid=880db588-052d- 1 1 e4-9416- 00000aacb361&acdnat=1404665564_4c01c9309cedc188fe4fc0888009c66e.[ Accessed on 06/07/ 2014 ]
M. McDonnell and B. King, “Keeping up Appearances Reputational Threat and Impression Management after Social Movement Boycotts.” Administrative Science Quarterly, vol: 58, iss: 3, 2013, pp. 387-419. http://asq.sagepub.com/content/58/3/387. [ Accessed on 07/08/ 2014]
M. Randazzo, M. Keeney,E.Kowalski, D. Cappelli, and A. Moore, Insider threat study: Illicit cyber activity in the banking and finance sector,2005(No. CMU/SEI-2004-TR-021). Carnegie-Mellon University Pittsburgh Pa Software Engineering Institute. http://www.dtic.mil/dtichr/ fulltext/u2/a441249.pdf. [Accessed on 01/08/2014]
N. Michaelidou, N. Siamagka and G. Christodoulides, “Usage, barriers and measurement of social media marketing: An exploratory investigation of small and medium B2B brands”. Industrial Marketing Management, vol: 40, iss: 7, 2011, pp. 1153-9. http://ac.els-cdn.com/ S0019850111001374/1-s2.0-50019850111001374-main.pdf?_tid=c846abe2-1e5e- 1 1 e4-8a82- 00000aacb35f&acdnat=1407435496_aflecOcd05602467585a29dcc4394261.[ Accessed on 07/08/ 2014 ]
P. Aula, “Social media, reputation risk and ambient publicity management”. Strategy & Leadership, Vol. 38 Iss: 6, 2010, pp. 43 — 9 http://www.emeraldinsight.com/ journals.htm?articleid=1886894. [Accessed on 07/08/2014]
P. Berthon, L. Pitt, K. Plangger and D. Shapiro, “Marketing meets Web 2.0, social media, and creative consumers: Implications for international marketing strategy.” Business Horizons, vol: 55, iss: 3, 2012, pp: 261-71. http://www.parsproje.com/tarjome/modiriyat/323.pdf [ Accessed on 07/08/2014 ]
P. Kotler, “Reinventing marketing to manage the environmental imperative. “Journal of Marketing, vol: 75, iss: 4, 2011, pp. 132-5. http://www.dyane.net/linked 2.1.%20Reinventing%20 Marketing%20to%20Manage%20the%20Environmental%20Imperative.pdf. [ Accessed on 07/ 08/2014]
R. Montalvo, “Social Media Management. “International Journal of Management & Information Systems. vol. 15, No.3,2011, pp. 91-6. http://www.cluteinstitute.com/ojs/index.php/IJMIS/ article/download/4645/4734.[ Accessed on 06/07/2014]
S. Brammer and S. Pavelin, “Corporate reputation and social performance: The importance of fit.” Journal of Management Studies, vol: 43, iss: 3, 2006,pp: 435-55. http:// http://www.researchgate.net/publication/4993041_Corporate_Reputation_and _Social_Performance_The_Importance_of Fit/file/60b7d522d9749b6686.pdf. [ Accessed on 07/08/2014 ]
S. Picazo-Vela, I. Gutierrez-Martinez and L. Luna-Reyes, “Understanding risks, benefits, and strategic alternatives of social media applications in the public sector.” Government Information Quarterly, vol: 29, 2012 pp. 504-11. http://ac.els-cdn.com/S0740624X12001025/1- s2.0-S0740624X12001025-main.pdf?_tid=a206f2a2-0527-11e4-a7ea-00000aacb362&acdnat=140466303198b29673394d658f23bd31968c72aefd. [Accessed on 06/ 07/2014]
T. Thompson, J. Hertzberg and M. Sullivan, Social media risks and rewards,2013 Financial Executive Research Foundation, Retrieved from http://www.grantthornton.com/-/media/ content-page-files/advisory/pdfs/2013/ADV-social-media-survey.ashx [Accessed 30/07/ 2014]
W. Mangold and D. Faulds, “Social media: The new hybrid element of the promotion mix.” Business horizons, vol: 52, Iss: 4, 2009, pp. 357-65. http://www.iaadiplom.d1c/Billeder/ MasterClass07/07-1SocialMedia-inthePromotionalMix.PDF. [Accessed 07/08/2014]
This entry was posted in Articles, Cyber security and tagged Cyber Defence, Cyber security, Information Assurance, LNJN NICFS, NICFS, Online Communication, Online Social Media, Organizational Reputation, OSM Risk, OSM Security, Reputational Risk, Sandeep Mittal IPS.
Basant Panchmi was celebrated with great enthusiasm on the 1st of February, 2017 at NICFS with lighting of the ceremonial lamp by the Sh. Sandeep Mittal, IPS, Director NICFS. The event began with Saraswati Vandana by the students. Sh. Sandeep Mittal, IPS, Director NICFS felicitated the Senior Faculty Members with a shawl on the occasion of Basant Panchmi.The festivities concluded with a speech by Sh. Sandeep Mittal, IPS, Director NICFS
Appointment of Shri Sandeep Mittal, IPS as Inspector General of Police & taking charge of Director, NICFS.
Shri Sandeep Mittal, IPS was appointed as the Inspector General of Police and took the charge of Director at LNJN NICFS on 17th October 2016. He was felicitated by the staff and faculty members of the institute on holding the charge of their Director. All the staff members congratulated Sh. Sandeep Mittal, IPS.
— NICFS (@nicfs_india) October 18, 2016
Workshop on Sensitisation of Forensic related “Do’s” & “Don’ts” for Crime Investigation
15th June 2016
LNJN National Institute of Criminology and Forensic Science
Ministry of Home Affairs, New Delhi
Anti-Terrorism Day was observed by the LNJN NICFS on May 21, 2016. The pledge was administered by Shri Sandeep Mittal, IPS, DIG (Admin), NICFS
NICFS celebrated “The Constitution Day” on 26th November, 2015. On this day the Director, faculty members, staff and students were assembled in Auditorium to celebrate the day. Sh. Sandeep Mittal, IPS, DIG (Admin) delivered lecture during the seminar on Constitution and Human right:
The Constitution of India, largest Constitution in the world and hand written in English and Hindi calligraphy was adopted by Constituent Assembly on 26 November 1949, and came into effect on 26 January 1950. The date 26 January was chosen to commemorate the Purna Swaraj declaration of independence of 1930.
It is the supreme law of India which lays down the framework defining fundamental political principles, establishes the structure, procedures, powers and duties of government institutions and sets out fundamental rights, directive principles and the duties of citizens.
The constitution of India imparts constitutional supremacy as it is not created by the Parliament but created by a constituent assembly and adopted by its people with a declaration in the preamble to the constitution. The constitution can not be overridden by Parliament. The Constitution declares India a sovereign, socialist, secular, democratic republic, assuring its citizens of justice, equality, and liberty, and endeavors to promote fraternity among them.
The constitution of India is not a black letter law. On the contrary, the Constitution of India is considered as a living document mainly because of Article 368 of the Constitution of India i.e. provision of amendment to the Constitution which is demonstrated by 100 amendments as on 1st August, 2015.
Today we are celebrating the Constitution Day and I call upon all participants to discuss various issues in this Seminar on “Constitution & Human Rights”.
A Forensic Guide for Crime Investigators: Standard Operating Procedures By LNJN National Institute of Criminology & Forensic Science
With the expansion of technology and emergence of new types of crime at one hand, and increasing demand and reliance on forensic evidence by courts and opinion makers on the other hand, investigating agencies are expected to collect newer types of evidence as well as get convincing forensic evidence to satisfy the courts as well as other stakeholders like the press, civil society & political leadership.
Each type of forensic evidence requires relevant method for collection, handling, packing and forwarding the physical evidence for forensic examination. Forensic evidence can be severely damaged due to shortcoming of any of the aspects. It is difficult for Investigating Officers to remember the correct procedure for each type of forensic evidence at the time of collection and also queries that could be made for the forensic expert’s opinion.
Therefore, it was felt that a handbook of Standard Operating Procedures (SOPs) should be available to the I.O. for their ready reference. This handbook tries to fulfill the long felt-need of the investigating agencies. It will be useful not only for I.Os. but also judicial officers and prosecutors. This is a maiden attempt by NICFS to empower different agencies of the criminal justice system and bridge the gap between technical and non-technical officials in the Criminal Justice System.
This comprehensive book, which comprises of 721 A4 size pages, gives relevant sections of law, crime statistics, crime scene management, crime scene kit, search procedure, potential evidence, preservation, packaging, transportation to laboratory, sample queries for laboratories, Do’s & Don’ts, precautions, case studies, photographs and references for each type of crime.
The book was released by Hon’ble Union Minister of State for Home Affairs, Shri Haribhai Parathibhai Chaudhary in the 34th National Symposium of Heads of Police Training Institutions at New Delhi on 28th Oct. 2015.