To each his own – Hindustan Times.
Just like our identity is verified before buying a SIM card, there could be a verification for social media. In the days of landline phones without caller id and no mobiles, harassment was very easy, and now it has dropped down a lot as the receiver knows the exact number of the abuser, and there is a real person who could be identified.
Any law could be misused, and arresting the girls for a benign comment was disgusting. But the biggest misuse of 66A is – not applying the law to abusers using really filthy language on social media to intimidate people, especially women.
Welcome to WordPress.com. After you read this, you should delete and write your own post, with a new title above. Or hit Add New on the left (of the admin dashboard) to start a fresh post.
Here are some suggestions for your first post.
- You can find new ideas for what to blog about by reading the Daily Post.
- Add PressThis to your browser. It creates a new blog post for you about any interesting page you read on the web.
- Make some changes to this page, and then hit preview on the right. You can always preview any post or edit it before you share it to the world.