- ABSTRACT
Minors are increasingly participating in cyberspace as both users and criminals as a result of the growing digitization of daily life. Juvenile cybercrimes, such as identity theft, hacking, online fraud, and cyberbullying, present particular difficulties for conventional juvenile justice systems, which are sometimes unprepared to handle the nexus of child psychology and technological misbehaviour. The Juvenile Justice (Care and Protection of Children) Act, 2015, in India, brought about revisions to handle major crimes committed by 16–18-year-olds, but it is still not enough responsive to the rehabilitation requirements of cyber offenders.
This paper compares the judicial systems in South Africa, Singapore, and India with regard to the treatment of young cybercriminals. It examines each jurisdiction’s legal systems, governmental initiatives, and judicial practices, paying special attention to how accountability and rehabilitation are balanced. Drawing from national policy reports, international child rights documents, and core law, the study use doctrinal and comparative techniques.
According to the report, South Africa prioritizes diversion and restorative justice through its Child Justice Act, 2008, while Singapore has a systematic, state-supervised approach with initiatives like the systematic Juvenile Rehabilitation Pathway (SJRP). India, on the other hand, does not have a juvenile-specific cyber-reform approach. The study ends by suggesting a hybrid strategy for India that combines restorative diversion techniques based on child-centric principles with reform based on digital literacy.
- KEYWORDS
Juvenile justice, cyber offences, children in conflict with law (CICL), rehabilitation and diversion, comparative legal analysis, heinous offences, skill redirection, India–Singapore–South Africa.
- INTRODUCTION
Section 2(13) of the Juvenile Justice (Care and Protection of Children) Act, 2015 describes “child in conflict with law” as an individual who has not attained eighteen years of age and is said to have committed an offence when he or she was a juvenile. This paper is concerned with a key subcategory from within this group — children who are alleged to have committed cyber crimes — and examines how India’s juvenile justice system responds to their behavior in an age defined by technology. With digital access increasingly becoming the norm among children, old understandings of juvenile delinquency are being reexamined against new challenges presented by the online environment.
Section 2(33) of the JJ Act defines “heinous offences” as those for which the minimum sentence provided under any existing law is seven years or more. Sections 15 to 18 go on to detail the process of evaluating if a child who is 16 years or older and is accused of committing a heinous offence needs to be tried as an adult. The Juvenile Justice Board, upon a prima facie determination of the mental and physical ability of the child, appreciation of the seriousness of the offence, and situation surrounding the alleged offence, can direct adult trial if it is satisfied that the child has the ability to establish the criminal intent.
In the case of cyber offences, very few will be of the level of seriousness required under the law for the term “heinous”. Examples of such offences are cyber terrorism, habitual offence of child pornography, rape or sexual violence recorded or published on the internet, criminal breach of trust by public officials by way of technology, and forgery of valuable documents or electronic documents. Notably, this categorization depends not on the true harm occasioned or seriousness of the offence, but only on whether the offence mandates a minimum of seven years’ imprisonment. This leads to serious distortions — as an example, a major cheating operation leading to extensive damage may not be a heinous offence merely because the penalty under Section 420 of the IPC is “up to” seven years, not at least seven years.
Such strict sentencing-based categorization in India contradicts jurisdictions such as Singapore and South Africa, which have more flexible, case-by-case determinations. Singapore, though tough on cybercrimes of a national security nature, has a rehabilitative approach for young people through its Structured Juvenile Rehabilitation Pathway (SJRP). South Africa, however, takes a more robust rights-based approach, focusing on diversion and mainstreaming of child offenders, even those in cyber cases, unless the offence carries very severe penalties (e.g., in cyber extortion cases).
As opposed to these jurisdictions, India does not have a cyber-specific juvenile rehabilitation policy at present, making it challenging to effectively address the distinct psychological, social, and technological aspects of cyber misbehavior among children. The following discussion will elaborate on such issues, analyzing statutory arrangements, comparative models, and evolving reform requirements for improved responses to juvenile cyber offending in India.
- RESEARCH METHODOLOGY
This study takes a doctrinal and comparative law approach, with the purpose of critically analysing the treatment of children in conflict with the law — i.e., those who are alleged to have committed cyber offences in accordance to the juvenile justice systems of India, Singapore, and South Africa. The paper is focused on examining legislative provisions, court judgments, and policy designs in the context of cyber-enabled offences, and the way they cross-talk with the developing definition of childhood, criminal responsibility, and rehabilitation.
The major sources of this study are the statutory works like the Juvenile Justice (Care and Protection of Children) Act, 2015 (India), Computer Misuse Act, 1993 and Children and Young Persons Act, 1993 (Singapore), and the Cybercrimes Act, 2021 and Child Justice Act, 2008 (South Africa). Wherever possible, pertinent parts of the Bhartiya Nyaya Sanhita and Information Technology Act, 2000 have also been examined to comprehend the classification of the offences as “heinous” and their effects on the trial process of juveniles.
Secondary sources are academic journals, government reports, law commission reports, and various child rights group research publications. These placed the legal texts in a larger socio-legal environment and informed the recognition of what lacks in the current frameworks, particularly in relation to digital rehabilitation.
The comparative strategy used in this paper is evaluative and analytical. Singapore is selected due to its state-driven, structured juvenile rehabilitation model (SJRP), whereas South Africa presents a contrast, community-based, rights-driven alternative under its diversion-first model. This triangulated approach of comparison facilitates a critical evaluation of India’s existing legal standing, which does not provide a cyber-specific mechanism for juvenile rehabilitation but instead uses strict threshold sentences for determining “heinous” offences.
This research does not involve empirical fieldwork or interviews. It relies on strength, instead, from a thorough statutory and jurisprudential analysis to provide a deep and critical appreciation of the new legal issues raised in relation to juveniles in the digital era.
- REVIEW OF LITERATURE
India’s approach to juveniles who commit cyber-crimes is largely controlled by the Juvenile Justice (Care and Protection of Children) Act, 2015 (JJ Act) and the Information Technology Act, 2000. Section 2(13) of the JJ Act defines a “child in conflict with law” (CICL), whereas Section 2(33) defines “heinous offences” as offences punishable with imprisonment of not less than seven years. Sections 15–18 authorize the Juvenile Justice Board (JJB) to determine if a child above 16 years who commits such an offense ought to be tried as an adult, which was the case in the Nirbhaya case. Though Section 3 focuses on acting in the “best interest of the child,” the Act does not have a cyber-specific approach.
Cybercrimes like cyber terrorism (66F) and child pornography (67B) under the IT Act and cheating by impersonation (Sec. 64 BNS) and forgery of electronic records (Sec. 65 BNS) can be heinous depending on the penalty awarded. The categorization, though, is strict—merely on statutory thresholds instead of contextual gravity, which could lead to omission of serious but insufficiently punished cyber-crimes.
Institutionally, Indian juvenile homes are indicative of profound systemic failures. A Maharashtra State Human Rights Commission report uncovered poor sanitation, non-functional surveillance, unsafe dwelling conditions, and hazardous vocational activities allotted to juveniles . In most households, record maintenance is disjointed, children have no privacy or health services access, and girls have additional obstacles, such as inadequate infrastructure, exposed wiring, and unsafe training conditions. Widespread abuse, overcrowding, and under-trained staff in observation homes, especially among marginalized Dalits and Muslims, was reported by the Berkeley Public Policy Journal . Even with the progressive structure of the JJ Act, the absence of cyber-specific rehabilitation, fragile institutional capacity, and retributive public opinion persist to hamper reformative justice.
In comparison, Singapore’s youth justice model, run through the Children and Young Persons Act (CYPA), is tiered and risk-based, focused on reintegrating offenders among youths. With a 291% increase in youth cyber offences committed under the Computer Misuse Act between 2019 and 2023, Singapore has increased non-custodial diversion programmes such as the Guidance Programme, Enhanced Streetwise Programme, and Youth Enhanced Supervision Scheme, all with over 90% completion rates. For more severe offending, Probation Orders and Youth Home Orders provide structured intervention with continued access to education and the family . In about 50% of young offenders, pre-existing mental health problems were treated by therapy, psychoeducation, and family involvement—cutting psychological risk by 52%. The country’s two-year recidivism rates are significantly low—at only 7.8% among diversion programme members, and 17.9% among custody-based ones—due to strong interagency cooperation throughout the MSF, judiciary, police, and NGOs.
In South Africa, juvenile cybercrime is tried under the Child Justice Act, 2008, which prioritizes diversion, restorative justice, and community rehabilitation. Even for cyber crimes criminalized by the Cybercrimes Act, 2020—hacking, digital fraud, and cyberbullying—children as young as 10 years are managed through child-focused questioning and case-relevant diversion options. These include life skills training, therapy, and restitution-in-kind, to victim-offender mediation. NGOs such as NICRO have an important role in providing structured interventions. Where diversion is not possible, juveniles are detained in secure care facilities that continue to have a rehabilitative outlook. In the case of cyber offenders, South Africa prioritizes root-cause interventions such as digital ethics, confronting peer pressure, and diverting technical skills to ethical hacking or IT professions.
Though strong, South Africa is also limited: rural communities have few resources, gaps in technical expertise thwart effective intervention, and rehabilitation tailored to the cyber environment is underdeveloped. But its community-based, rights-oriented, and adaptable tiered model is compared favorably to India’s punitive threshold model. Together, South Africa and Singapore provide complementary but successful models—Singapore by staged institutional levels and state capital, South Africa by restorative, grassroots adaptability. Both arrive at a common stress on non-punitive, integrative justice—a precept India needs to integrate if it is to tackle juvenile cybercrime in a meaningful way in the digital age
- Comparative Analysis: Systems, Challenges, and Skill Redirection
- Legal Foundations and Offence Classifications:
a) India: Statutory Rigidity and Over-Reliance on Punishment Thresholds
India categorises “heinous offences” only on a seven-year punishment criterion under Section 2(33) of the Juvenile Justice Act, 2015. The provisions of the Bharatiya Nyaya Sanhita (BNS), 2023, such as Sections 316 (criminal breach of trust), 318 (cheating), and 336 (digital forgery), consequently imply that a broader spectrum of cyber offences can fall into the “heinous” category. This change in law permits juveniles between the ages of 16–18 to be tried as adults for the offences. Yet the retributive yardstick employed for categorization does not account for crimes of serious social or psychological consequences but smaller sentences. For example, ongoing cyberbullying or bulk phishing frauds might go unpunished as “heinous” solely because their maximum sanctioned punishment is less than seven years. This threatens legal disconnection from caused harm.
| SECTION | CYBER CRIME TYPE | DESCRIPTION |
| 43 | Unauthorized Access | Hacking or accessing computer systems without permission. |
| 66 | Computer-Related Offences | If unauthorized access (Sec. 43) is done dishonestly or fraudulently. |
| 66B | Dishonestly Receiving Stolen Computer Resources | Like stolen laptops or digital files. |
| 66C | Identity Theft | Using someone else’s digital identity like passwords, signatures, etc. |
| 66D | Cheating by Personation | Online frauds like phishing, fake profiles, or OTP scams |
| 66E | Violation of Privacy | Taking or circulating private images without consent. |
| 67 | Obscene Content | Publishing or transmitting obscene material electronically. |
| 67A | Sexually Explicit Content | Publishing sexually explicit material (videos, etc.) online. |
| 67B | Child Pornography | Circulation of material involving children in sexually explicit acts. |
| 69 | Government Surveillance | Failing to cooperate Interception/monitoring of data (only by authorized officials). |
| 69A | Blocking of Websites | Failing to Comply Central Government’s power to block public access to content. |
| 70 | Protected Systems | Hacking into critical infrastructure (like nuclear or defense systems). |
| 72 | Breach of Confidentiality | Disclosure of personal info obtained through official capacity. |
| 73&74 | Digital Signature Fraud | Forgery of electronic signatures and certificates. |
A table denoting all the crimes under Information Technology Act, 2000
b) Singapore: Offence-Based Adaptation, Not Sentence-Based
Singapore has a flexible approach under the Computer Misuse Act (CMA) and the Children and Young Persons Act (CYPA). 2024 amendments added cyber-specific offences like Sing pass credential abuse, demonstrating responsiveness to emerging digital threats. Classification and response follow the offence’s type and context, not quantum of punishment, allowing for more proportionate and specific intervention. Young offenders are managed through diversionary and rehabilitative programs, rather than adult criminal processes. This framework expresses a strong normative commitment to prevention and reintegration, eschewing the blunt filter of sentencing thresholds.
c) South Africa: Contextual Assessment Through Restorative Justice
South Africa’s Child Justice Act (CJA), 2008, and Cybercrimes Act, 2020, collectively provide a diversion-first system. Children between 12 and 14 years are presumed not to have criminal capacity, unless their incapacity is established. Unlike India, the gravity of a juvenile crime is not presumed by statutory sanctions. Rather, the CJA requires personalized examination of intent, harm, and circumstances—reflecting a restorative approach that mirrors, and in a few places surpasses, Singapore’s in contextual sensitivity.
| Jurisdiction | Heinous-Level Offences & Penalties | When treated as “Heinous” |
| Singapore | CMA §9: Protected computer hacks (up to 20 years) CMA §4: Intentional restricted access leading to fraud/bodily harm (up to 10 years) | Max >= 7–10 years |
| South Africa | Cyber Extortion (15–25 years) Hacking/Interference (up to 10 years) | Max >= 7 years |
A Table denoting Heinous crimes (cyber-crime) for Singapore and South Africa
- Systemic Implementation Gaps and Institutional Conditions
a) India: Structural Failure in Juvenile Homes
Even with the progressive legislative design of the JJ Act, actual on-the-ground implementation has been abysmal. Documentation from Maharashtra’s State Human Rights Commission and the Berkeley Public Policy Journal record overcrowding, squalor, and abuse in boys’ and girls’ juvenile homes. Poor sanitation, insufficient monitoring, antiquated record-keeping, and medical and psychological care are all absent in these institutions. This severely undermines the law’s reformative objective. Additionally, the lack of cyber-specific psychological diversion or digital literacy training also inhibits reintegration into a technologically advanced society. Such a system runs the risk of transforming reform homes into correctional units that reinforce alienation and recidivism.
b) Singapore: Data-Driven Rehabilitation and Recidivism Management
Singapore’s MSF Youth Homes and Integrated Service Providers (ISPs) operate structured programs like the Guidance Programme and Probation Orders, which prioritize psychological support, family involvement, and digital ethics education. The two-year recidivism rate for youths who completed the Guidance Programme in 2021 stood at just 7.8%, and even for more serious offenders under MSF Youth Home Orders, the rate remained at 17.9% Mental health integration is a highlight. A 52% reduction in youth offenders with mental health problems was observed in two years—427 to 208 cases among 813 youths—showing robust support systems. This integrated approach facilitates long-term reintegration instead of short-term containment.
c) South Africa: Restorative Ideals vs. Ground-Level Gaps
Though South Africa’s legal system—supported by bodies such as NICRO—prioritizes restorative justice and non-custodial alternatives, structural weaknesses are evident. Rural resource scarcity, limited technical courses for probation officers, and a lack of cyber-themed rehabilitation modules weaken the desired rehabilitative effect. These deficiencies are compounded by unequal access to secure care centres and sparse statistical monitoring of juvenile cyber offending.
- Cybercrime Trends and Risk-Based Diversion
a) Singapore: Real-Time Offender Profiling
Cybercrime cases related to youth offenders in Singapore between 2019 and 2023 increased tremendously. Offences committed under the Computer Misuse Act rose by 142 cases, which were mainly related to scams, digital impersonation, and unauthorized access, MSF’s offender profiling by age, offence type, and risk enables specific responses like the Youth Enhanced Supervision Scheme and Enhanced Streetwise Programme. These frameworks utilize psychological treatment and family-based restoration to divert offenders from formal court involvement.
Singapore’s recidivism statistics are methodically recorded, and high completion rates across programs (e.g., over 80% for the Guidance Programme) confirm systemic dependability
b) India and South Africa: Erratic Tracking, Limited Cyber Specialization
India does not have publicly available, cyber-specific juvenile crime data and thus has reactive instead of preventive responses. South Africa similarly has not created a national registry or reporting system for juvenile cybercrime recidivism, keeping it from refining or replicating interventions. Both countries could learn from Singapore’s data-intensive program evaluation and policy recalibration.
- Skill Redirection and Constructive Digital Engagement
a) Singapore: From Cyber Offender to Ethical Hacker
Singapore has institutionalized skill diversion as a rehabilitative resource. Young people possessing digital talent are steered into guided pathways of ethical hacking, digital forensic analysis, and cyber security. These schemes are complemented by digital literacies and victim-empathy training under the MSF system. This shift from punitive sanctions to pro-social talent development is indicative of a progressive juvenile justice approach.
b) India: Missed Opportunities
Although individualized care plans are envisaged under JJ Model Rules (Rule 7), India has not developed scalable or standard channels to steer the digital skills of juvenile offenders. What follows is an unexploited potential for healthy change and ongoing exclusion of young people from post-conviction life.
c) South Africa: Grassroots Redirection, Structural Bottlenecks
As NICRO and related NGOs try vocational and digital diversion in South Africa, irregular funding and the lack of personnel—particularly in rural regions—inhibit complete implementation. Nevertheless, South Africa shows a conceptual willingness to the concept of diversion, which can be scaled with committed investment and government backing.
- SUGGESTIONS
To reform the juvenile justice system in India for cyber offences, a rights-based and multi-dimensional strategy is necessary. Learning from Singapore’s planned interventions and South Africa’s restorative approach, the following recommendations are made:
1. Reform the Definition of Heinous Offences:
India must revisit its absolute threshold for the definition of “heinous offences” solely on grounds of a minimum sentence of seven years. A contextual and harm-based categorization, accounting for qualitative effects of offences such as mass cyber fraud or chronic cyberbullying, would enable proportionate responses and decrease over-criminalization of children.
2. Create Cyber-Specific Rehabilitation Frameworks:
India currently does not have specific rehabilitation approaches for teen cyber criminals. Special modules covering digital competency, internet ethics, psychological guidance, and positive rerouting (e.g., ethical hacking, cybersecurity education) need to be established in juvenile houses. These must reflect effective components of Singapore’s diversion schemes incorporating mental wellness and digital literacy.
3. Enhance Institutional Infrastructure and Accountability:
Juvenile homes throughout India need to be audited and improved immediately in order to do away with abuse, overpopulation, and unhygienic living conditions. Functional CCTV cameras, access to minimum amenities, trained probation officers, and qualified staff for digital skill training should be provided. Inspection committees and Child Welfare Boards should be revitalized and made accountable through third-party audits and review mechanisms.
4. Establish Individualized Care Plans and Diversion Programs:
Individual care plans under the Model JJ Rules must be properly implemented. Diversion must be the rule for first-time and low-risk cyber offenders. India can draw lessons from South Africa’s Level 1 and Level 2 diversions and Singapore’s Guidance Programme, which effectively curbs recidivism through focused early intervention.
5. Increase Interagency Cooperation and Data Transparency:
A digital centralized database should be established to monitor juvenile cyber offenders, rehabilitation status, and recidivism rates—Singapore’s data-driven model. Law enforcement, the judiciary, psychologists, educators, and NGOs should be coordinated to offer comprehensive care and continuity of care.
6. Invest in Capacity Building and Training:
Police, JJB members, probation officers, and social workers need to be given specialized training in order to handle cyber-specific crime and the psychosocial well-being of children in conflict with law. Collaboration with private cybersecurity professionals and digital rights groups can facilitate such capacities.
- Conclusion
As juveniles’ cybercrime becomes more sophisticated and widespread, juvenile justice systems must adapt to address the challenges of digital delinquency. In this paper, it has been demonstrated that although India has a good intentioned legal framework, its excessive dependence on punishment levels and inattention to cyber-specific rehabilitation strategies forestalls effective reform. Conversely, Singapore’s data-driven, structured model and South Africa’s community-based, restorative model are rich lessons for the formulation of child-focused interventions. These lessons, though, will be most relevant to India if reforms extend beyond textbooks—there needs to be transformation of institutions, more efficient use of resources, and, above all, a change of attitude in those who are involved in rehabilitating them. Most of the staff at juvenile homes continue to perceive youth offenders in terms of moral derision instead of understanding, hindering reintegration processes. Comprehensive sensitization and training programs are necessary in a hurry to make sure that caregivers, probation workers, and police officers learn about the developmental requirements of juvenile cyber offenders and regard them not as dangers, but as children with promise. It is only then that the promise of rehabilitative justice in the digital age can be fully realized.
YASH GUPTA
JINDAL GLOBAL LAW SCHOOL
LLB
