MeitY’s 24-hour NCII Takedown Rule Empowers Victims, Cracks Down on Revenge Porn, Deepfakes and Online Harassment
Adv (Dr) Prashant Mali 17 November 2025
India’s digital landscape finally has a uniform, victim-centric framework to deal with one of the most invasive online crimes of our era, the sharing of intimate images without consent. The Union ministry of electronics and information technology (MeitY) has issued a sweeping standard operating procedure (SOP) designed to ensure that such content is taken down within 24 hours of being reported, marking a major step forward in protecting personal dignity in cyberspace.
 
The SOP on non-consensual intimate imagery (NCII), released on 11 November 2025, does far more than outline regulatory expectations. It functions as a powerful, systemic assurance to victims of intimate image abuse—whether through leaks, hacks, revenge uploads, or AI-generated deepfakes—that the government and intermediaries will respond swiftly, uniformly and with accountability.
 
For the first time, India now has a clear playbook backed by coordinated action across MeitY, the Indian cybercrime coordination centre (I4C), the department of telecommunications (DoT), online platforms and the police. This framework was developed following directions from the Madras High Court in writ petition (civil) 25017/2025.
 
Victim-centric Approach Based on Ease of Reporting
The SOP recognises that survivors of intimate image abuse are often traumatised, unsure of how to proceed, or afraid to approach law enforcement. It, therefore, provides multiple reporting avenues, allowing victims to choose the path that feels safest and most accessible.
 
Victims can now report through:
One-stop centres (OSCs) for help with NCRP reporting, legal aid and counselling
Social media platforms or apps directly, through grievance officers or in-app tools
National cybercrime reporting portal (NCRP) or helpline 1930
Local police stations, including online FIR mechanisms
 
This flexibility is crucial because intimidation, shame and emotional distress often act as barriers to timely reporting.
 
24-hour Mandatory Takedown: The Heart of the SOP
 
At the core of the new SOP is a decisive, non-negotiable requirement:
All intermediaries must remove intimate, sexual, nude, morphed or deepfake content within 24 hours of receiving a complaint.
 
Significant social media intermediaries (SSMIs)—platforms with large user bases—have additional obligations:
Deploy hash-matching and crawler technology to detect and block re-upload attempts
Coordinate with the I4C’s secure NCII hash bank
Provide action-taken reports to designated authorities
Support URL disabling requests routed through government channels
 
This proactive technological approach is essential, as NCII content tends to resurface repeatedly through new URLs, mirror sites and anonymous accounts.
 
Inter-agency Coordination for Faster Action
 
The SOP formalises coordination across key agencies:
I4C (MHA) will aggregate NCII complaints nationwide and maintain the central hash bank to prevent re-uploads.
DoT will work with ISPs to block offending URLs.
MeitY will monitor compliance, oversee coordination with platforms, and ensure timelines are met.
 
This integrated workflow reduces delays, eliminates ambiguity, and ensures each stakeholder understands their role.
 
What the SOP Covers: Real-world Scenarios Victims Face
The ministry’s framework is designed to address a wide range of situations – not just traditional 'revenge porn'. The following examples illustrate exactly how the SOP applies to everyday NCII cases across India:
 
1. Private photos shared by an ex
A young woman discovers that her former partner has uploaded her private images after a breakup.
 
Under the SOP, the platform must remove this content within 24 hours.
 
2. Morphed images circulating on WhatsApp
A student finds her face pasted onto a nude body and forwarded across WhatsApp groups.
 
Platforms must delete the morphed content and use hash-matching to block reuploads.
 
3. Hidden-camera footage posted online
Secretly recorded trial-room or bathroom videos appear on shady websites.
 
Intermediaries, I4C and DoT work together to initiate rapid takedown and block URLs.
 
4. Revenge porn on social media
A jilted partner uploads intimate videos to shame a victim.
 
Direct platform reporting triggers guaranteed action within 24 hours.
 
5. AI-created sexual deepfakes
A person’s face is used to create an explicit deepfake video.
 
The SOP treats this as artificially morphed content, requiring urgent removal.
 
6. Leaked cloud storage images
Private images stolen through hacking are posted on forums.
 
Platforms and law enforcement act to disable access and notify the victim.
 
7. Search engine results showing deleted intimate content
Even when the source content is removed, search engines continue to show cached images.
 
Search engines must de-index NCII links under the SOP.
 
8. Multiple re-uploads through new URLs
Trolls repeatedly upload banned NCII content via new links.
 
Crawler tech and central hash banks stop the resurfacing of the same images/ videos.
 
9. Victims unsure or afraid to report
Traumatised survivors who don’t know where to start can rely on OSCs, NCRP, intermediaries, or police — whichever feels easiest.
 
The SOP gives them multiple pathways to seek help.
 
Restoring Dignity in the Digital Age
The SOP is not merely a compliance framework; it is a long-overdue recognition of dignity as a fundamental digital right. For years, victims of NCII have been navigating a maze of inconsistent responses, slow takedowns and jurisdictional confusion. This SOP brings clarity, speed and consistency to a domain where every minute of exposure compounds psychological harm.
 
By mandating swift removal, preventing reappearance and ensuring coordinated government response, MeitY has delivered exactly the kind of systemic muscle victims have long deserved.
 
(Advocate (Dr) Prashant Mali is an internationally renowned Cyber & Privacy lawyer with a Master's in Computer Science and Law, and holds a Ph.D. in Cyberwarfare & International Cyberlaw. He is a sought-after expert who has represented Fortune 500 companies, celebrities, and governmental agencies. An author of six books and numerous research papers, one of his books serves as an official textbook in prestigious academic institutions. Beyond law, he is actively involved in charitable activities and cyber education initiatives to support underprivileged communities.)
Comments
Free Helpline
Legal Credit
Feedback