News letter april 12


Published on

ICISS Newsletter April 2012

Published in: Education, Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

News letter april 12

  1. 1. Newsle N etter: April 20 A 012 Let’s profe s essionalize the pro t ofessio onals… … Security Budg S y geting: Whos job is it? se s This time round ever security chief wor his ‘bel and boo must be trying T r ry y rth lt ot’ e to t get respectable b budget all locations for his deepartment! There ar new re locks and racks to be bought, new torch and dra r e hes agon light to be pro ts ocured and old windows an d almirahs to be rep a s paired! An not to fo nd orget the r repairs o perimeter lights a of and roads! Then the are ne security systems to be ere ew y s installed and old sec curity gadg gets to be upgraded Where fr d! rom all the much e needed money wil come? Security is not profit making fun n m ll y m nction. Everywher it is co E re onsidered as cost centre onl Yet the are bu c ly. ere udgets needed for security cannot be overlook or avo n r e ked oided. And here com the mes manageme m ents haggl ing for rea alistic budg get.Fe years back Con ew nfederation of Indian Industri n n ies underttook a su urvey on the policie and t espr ractices pr revalent in Indian in n ndustries regarding informati g ion securi ity. The survey sou ught to ssess the awarenes levels prevalent among organizatioas ss o ons regardding inforrmation se ecurityne eeds and th level of implemen he f ntation.Th survey report title “Report on Inform he ed t mation Sec curity Baseline 2005 also rev 5” vealed that “38% t,co ompanies do not ha ave an info ormation ssecurity policy of which 7% are indiffe p w erent to se ecuritypo olicy.” Exp perts estim mate that “nearly 80 per cent of all sma busines “ all sses fail in their first three n ears. In mo cases, the cause is poor managemye ost , ment”. “One of the m e most negle ected and poorlymaanaged asspects of s small busin ness operaation is se ecurity and loss prev d vention”.Th cost of security breaches has, for years, been calcu he f s r ulated bas sed on the direct c e cost ofremediation. However classic models to determin the app r, o ne propriate l level of se ecurity speendingwe develo ere oped befor compan re nies had to publish press rele o eases whe enever they had a se ecuritybr reach. As industry r regulations become ever more explicit in terms of best-p e t s practice seecuritypr rocedures, so do pot , tential liab bilities.We must als factor- in damage to compa so e any brands, declines in stock price, cus s stomer los (and ssthe legal and notification costs). This all m d means that adequate funding f data se t e for ecurity mea asuresbe ecome a re ecognized cost of doing busi d d iness. For rward-look king Manag gement must keep this in mco onsideratioon. Capt S B Tyagi C For ICISS r
  2. 2. Why is bu usiness still plagued by poor seecurity? Why do we constantly read stor W y ries about securitybreaches, data thef and cust , ft tomer lawssuits stemm ming from confidentia information getting lost or al gfalling into the wrong hands? Basically it because many enterprise ma o g B t’s e anagers viiew securit as the tymethod fo protectin their inf or ng formation o infrastru or uctures, rat ther than f focusing on the proteection ofthe data itself. Organizations, and theiir clients, are better served w when mana agement aand staffestablish a “culture o security protectin valuable data and infrastruct of y,” ng e ture resources.An ever-ggrowing gr rowing per rcentage o compute crimes are being committe by prof of er g ed fessional“criminals who stea market-v s” al valued sennsitive data – e.g. cre card d a edit data and customer id dentities.Sometime the crim es minals are inside an e enterprise; sometime insiders and outsid es ders work t togetherto steal aand resell valuable company data, as we’ve see recentlly in reports on cal center en llfraudsters in India a Scotlan s and nd.Corporate executive for the most par continue to be mo “reactiv than “proactive” when it e es, rt, e ore ve”comes to securing c porate and customer data. When security breaches such as those of critical corp d r y sBank of AAmerica an AOL make head lines, the mandate “keep us o of the press” is handed nd m outdown to SSecurity Th mandate frequentlly carries no addition budget to deliver the securit that is he e n nal tyrequired f the task at hand. for kEven as more com mpanies de evelop inc creasingly detailed security po s olicies and hire com d mplianceofficers, s security managers continue to report that the regulations a c o and securit policies are not tytranslating into be g ehavioral change. If anythin ng, security manag gers only report s y sporadicenforceme of sec ent curity polic cies and ggrowing coonfusion related to the owne r ership of t the dataprotection problem in some larger ente n erprises. In some or n rganization there are many different ns, adepartments and tea ams which own som e part of th data security / priv h he vacy problem, with th result hebeing difficulty in rea aching deccisions and deploying technolog and pro d g gy ocess chan nge.It is time t acknowledge that security p to policies and technolog alone, w d gy uy-in” by staff, and without “buenforceme by ma ent anagement will not resolve the needs for regulato compliance, and for the t, ory dsafety of ccustomer, partner an employe informa nd ee ation. Security tools w play the role in s will eir securingsensitive ddata from acquisition by the en n nterprise un its stora and de ntil age eletion.However, it remains the task of manage ment to make real-w s o world assesssments of risks to da how f ata,those risk are best mitigated and how t ks these asseessment de ecisions ar promulgated and e re enforcedthroughou the enterprise. But ultimately as I see it, the real challenge is in establishing a genuine ut t y, e“culture of security” where staf and man f ff nagement view their data resou v urces as ce entral to th health heand succe of their organizat ess r tion.Food fo thought: orAlan Co ohen:It takes a lot of courag to rel ge lease the familia and s ar seemingl secure, to lyembrace the n e new. But there is no real security in what is no lo t r s ongermeaning gful. The is more secu ere urity in the adve t enturous and ex s xciting, fo in ormoveme there is life, and in ch ent e a hange th here is po ower.
  3. 3. Business out-sour s rcing has become th harbinger of eco he onomic chhanges in India! It h also haschanged the Indian society! With tho ! ose nocturrnal office hours an dispos e nd sable incoome, theyoungsteer’s zeal to spend th money on having good tim has cr o he g me reated a cuultural imb balancewhere on half ha taken naturally the west ne as tern concepts of ‘d dating’ an ‘living- nd -in’ andremaining other ha is yet to accept t g alf o these as part of soc norms p cial s.The allied problem is that lib d m beral beha avior of a partner is often mis s sundersto as con ood nsent. Italso is m male chauvinistic approach t that befor consen a woma must resists and bit of re nt an rforce is p part of the consequent agreem e ment! Ala Both are farther from the truth. Th sharp as! a r heincrease in the num mber of se exual assa aults repoorted ampl proves this fact. lySome pe eople hav the wro ve ong idea about seexual assaault. They think th assaila was y he antovercome with sex e xual desir the vic re, ctim was dressed too seduc ctively or "asked fo it", or orthat all vi ictims wan nted sexual contact t!These ide assum that se eas me exual assa tivated by passion. It isnt. Se ault is mot exual assa ault is aviolent cr rime, a ho ostile attac an atte ck, empt to hu and hum urt miliate. Se is only the weapon! exSexual asssault is a crime, an it occurs with incr nd s reasing fre equency, b remains the mos under- but streported crime. There is a rape victim every sixteen min r m s nutes. A wwoman is beaten e every 18seconds; three to fo million are battere every year. Three out of fou women will be the victims our ed y e ur eof at leas one vio st olent crime during t heir lifetim These statistics are repeated, in c e me. countriesworldwidee. one-half of reported rapes, the rapist is an acquaIn over o f e s aintance, neighbor, friend or relative.Acquaintaance rape is less likely to b reported to the authorities than rap by a s be d s pe stranger.Acquaintaance rape frequently occurs un y nder circum mstances where the victim, the attacker or both e rhave been drinking or are into n oxicated. T victim of an acqu The o uaintance rrape may not recogn n nize it asa crime or consider the inciden as a rap r nt pe. You ar a victim of a crime if you hav had unw re e ve wanted se exual conta Sexual assault act. lis no less serious just beca s ause you know your assailant. Previou sexual contact w us with yourassailant does not justify or excuse the crime. If you think sexual ass e y s sault is motivated by passionor happen because the victim asked fo r or wanted it, look at the facts . Sexual assault can happen ns e m ato anyone - you, your children, co-w workers or friends, or other members of your family. o r s r Perh haps you think sexua assault happens only in cert t al o tain high-risk situatio such onsas hitchhiking, walkking alone at night, o going ou socially alone. Its true that sexual ass or ut s sault canoccur in s such situat tions, but it also take place in ordinary, seemingly safe places. In fac about i es n y ct,one-third of all rapes occur in or near th e victims residence. About one e-half of ra apes are by first orcasual daates or rommantic acquuaintances . Imagin a typica rapist. W ne al Whom do you picture A sex-c y e? crazed man? A psyc chopath?More ofte than no those stereotypes are wrong. Most rapists do en ot, s s ont look peculiar or behave
  4. 4. strangely. Mainly, th want to hurt, hum . hey o miliate and degrade another hu d uman bein Rapists are not ng. ssexually d deprived mmen; most have availa h able sexua outlets. In addition , many are married a lead al e andnormal liv prior to conviction and often come fro the sam socioec ves o n n om me conomic baackground as theirvictims. Rapists m may be repeaters and may continue to rap until they are caught. r y pe t "I thoug I could trust him; I thought he was my friend. I st ght h tarted feeli uncomfortable, ing ored my feelings. I thbut I igno hought he would nev do any ver ything to h urt me. Su uddenly, he was astranger. He was do oing something I nev thought he would be capab of - my friend was raping ver d ble yme." Donn - 20-yea old acqu na ar uaintance rape survivvor.Anyone c can be a victim! Sexual ass S sault awa areness is based o environ on nmental al lertness.Remembe alcohol dulls your reflexes. W er, r When uncoomfortable trust you instincts! e, ur !Find out a about new friends or acquaint w o tances. As others who know or have dated the person. sk wDate with friends before acceepting a siingle date. Make definite plans in advan . s nce. Dont leave agroup sett ting with a person yo dont kno well. ou owSet sexua limits and commun al d nicate those limits. Te your par e ell rtner clearlly what you intend. E Establishthat any ssexual acti ivity will be a mutuall decision. Speak up if youre getting confusing me e p essagesfrom your partner. B forceful and firm; dont worry about being polite Dont fal for lines such as r Be l e. ll"You would if you lo oved me." Consider o practice approaches such as "Stop this! Im not e C or s enjoyingit." Pay yo own w or share costs to avoid arg our way o guments such as "Y You owe me - I spent all this mmoney on you." Bew n ware of par rtners who disregard your requests. oBe asserttive. State what you really wa and ar feeling. Remembe alcoho and othe drugs e u ant re er, ol ercompromi your ab ise bility to ma decisio ake ons. When you say "no", make your mes n " e ssage clea When say "yes", be ssure you kn now what youre agr reeing to. Dont be e embarrasse to yell, make a edscene or r away. Dont worr about of run ry ffending yo partner remembe you are being hum our r; er, e miliated.If you are uncomfor e rtable with a date, yo can cho ou oose to end it. Take your own vehicle or meet at nation. Carry money for a ph one call or fare hom Avoid parties where men greatlythe destin y o me. w noutnumbe women. Dont acce rides fr er ept rom newly made acquaintances s.Be carefu when inviting som ul meone to y your reside ence or ac ccepting a invitatio to theirs Avoid an on s.secluded places wh here you are put in a vulnerable position. Acquainttance rape often oc es ccur in aresidence e.Take care of yourse - dont assume ot e elf a ther people will take care of yo or prote you from harm. e ou ect mTrust your INSTINCCTS - believ your inn feelings when you get unco ve ner omfortable about a pe erson orsituation. Respond a soon as you feel u as s uncomforta able!Anyone can be a victim of sex xual assau You should think about the kinds of defense yo would ult. d oube willing to use. In some cas ses, resista ance can frighten off or discou f f urage the attacker, but it can aalso lead a rapis to bec d st come mor violent or incre re ease effor rts to subdue the victim.Now is th time to consider your option there is little time to think d he y ns; s e during an attack. Co ould youreally hur an acqua rt aintance who tried t hurt you Are you willing to yell? Are you able to run? w to u? u o e
  5. 5. Remembe rape is a crime of violence, not passio Youve got to ass ume that a rapist is w er, f on. willing to ence. If you are attacked, your main conceuse viole m ern must always be your safety.Because a people and all situ all uations are different, there is no ONE wa for you to protect y e ay t yourself.People ha differe capabilities, and y ave ent you must decide for yourself tthe best de efense me ethod foryou.The goal of passive resistanc is to th e ce hink and ta your way out of the situat alk w f tion. With passiveresistance you can: e, :  Try to calm th attacker Try to pe y he r. ersuade him not to ca out the attack. m arry e  Cla to be s aim sick or pre egnant. Te him you have a sexually tra ell u ansmitted disease. T d This may intimidate the attacker. e  Try to disco y ourage him. Pretend to faint, cry hysterically act ins h y, sane or m mentally inccapacitated d.  youre at your residence, tell th attacker a friend is coming over or th your sp If y he hat pouse or rooommate will be back soon. sistance is intended to distract or temporaActive res t arily injure your attac cker to cre eate an oppportunityfor escape Nobody can tell you whethe or not active resis e. y y er a stance will be the "rig ght" thing to do. Adecision t resist actively, ho to owever, is irreversible Your go is to es e. oal scape, not to win. HHere aresome pros and cons regarding the mo r ost comm mon type es of active res sistance:  Yelling: It ca surprise or frighten an attack away if he fears p an n ker f people will come to h help. But yelling wont help in isolated or no oisy areas.  Strruggling a and fightin back: A forceful struggle may also discourage an attac ng e cker, but mo will reta ost aliate and have the po h otential to inflict serio injuries Howeve you mus not be ous s. er, st afra to hurt an attacker. All kic and blows must be forcef and sh aid cks b t ful hould be a aimed at vulnerable ar reas such as the groiin, eyes, or instep. a r  Maartial arts: Special self-defens skills such as ju : se s udo or karrate are po opular. If you are pro oficient in s such techniques, they can be very effectiv But pro y ve. oficiency re equires praactice.  Weeapons: m people carry weap me c pons such as guns, knives, or spray che emicals to ward off atta ackers. Un nless you are trained and not afraid to use these weapons, they can be very d u danngerous. T The attack might be able to turn them against you. Also some w ker o t o, weapons cannnot legally be carrie so chec with loca law enfo y ed, ck al orcement a authorities.If you beli ieve you m might get severely hu defending yoursel or if youre afraid to fight bac dont. urt lf o ck,Sexual asssault is st an assa and st a crime, even if you do not have a single cut or bruise. till ault tillVictims who do not resist shou never fe guilty; it is the assailant who committe the crim uld eel o ed me.  If a attacked, escape  If tr rapped, sta alive ay  If a assaulted, memorize details *** *
  6. 6. …with " … "The Tri iangle of Life" o"Triangle of Life": Simply by looking a the follow e y at wing self-exxplanatory photos, you can lea more y y arnthan in a t thousand w words abou how to p ut protect you urself durin a major earthquak ng ke... If you are in y nside a veehicle, com out an sit or me nd lie down ne to it. If someth ext hing falls on the vehhicle, it will leave a empty space alo w an ong the siddes. See below: b
  7. 7. Where to Go D During an Earth a hquake Reemember that stuff about f hid ding unde er a ta able or sta anding in a doorway Well, y? forg it! get Moostly every yone who simply o ucks and covers when du buiilding colla apse are crushed to death. People w P who get undder object like desks or ts, car are crus rs, shed.Get near the outer walls of buildings or routside o them if possible - It is mu of uchbetter to b near the outside of the build be e o dingrather tha the inte an erior. The farther ins f sideyou are fr rimeter of the rom the outside perbuilding tthe greate the pro er obability t thatyour esca route w be blocked. ape willThis is a real eye opener! It could sa aveyour life s someday.Identity s systems a powerf and pro are ful rofitable business to ools, but o only takes one brok link s kenin the ide entity chai to foul the whole works up in t p..." James Va Dyke an Presi elin Strate ident, Jave egies & Re esearchA person I know su uddenly lea arned that he was a debit-card identity theft victim - while h debit t m hiscard was locked in a bank safe deposit b e box!He immeddiately info ormed his debit-card issuer, a major ban but the branch re d nk, e epresentat tive saidthere was nothing s s she could do. I direc cted him quickly to an identity theft hotl q y line, buried on his dbanks We site. ebSuch a slow respon by you bank co uld lead yo to suffe a greate financial loss if an identity nse ur ou er er l nthief targe you. So it could pay when y open your bank account to find out exactly wh steps ets o p you y o e hatyour bank takes to c k curb identit theft. tyWhile many credit a debit-c and card accou unts promis consum se mers zero lliability if th credit or debit heircard is los and stol st len, that do oesnt mea you can suffer. Your bank may not buy your st an nt Y b tory andyou may be forced to hire an attorney. Many vic n . ctims dont prosecute because thieves o e e often arefamily me embers. So you still could suf o ffer un-reim osses, lost wages and legal mbursed financial lo f tfees.Warning: Some 12% of majo banks la ck a zero- : or -liability policy for deb cards th require access bit hat evia a pers sonal identification nu umber or P PIN, accord ding to ‘Jav velin Strate & Rese egy earch’ a m marketing
  8. 8. research organization based in USA. So learn how your bank protects against identity theft,particularly before opening a PIN-accessed debit card.In USA, federal law limits card holder’s losses on a lost or stolen credit card to $50. In India thereappear to be no such guidelines. Even if there is one, it is not widely publicized. You may havesome protection for credit / debit cards - provided that you promptly notify your bank.Nevertheless, losses when your identity is stolen, according to Javelins 2008 Identity FraudSurvey Report, can escalate the longer the fraud goes undetected. Victims who detected the fraudwithin one day spent an average of $428. But those who took up to five months lost three times asmuch -- $1,207, its report says.Meanwhile, if somebody opens a new account in your name and nobody contacts you, you risksuffering greater losses. You might not hear about it until a debt collector calls or youre suddenlydenied credit. This gives thieves a maximum amount of time to do their damage.Your bank can take precautionsThere are certain things your bank can do to nip an identity theft in the bud. It could pay to makesure your bank takes certain precautions, advocated in the Javelin Strategy survey:  Provides you with the ability to create restrictions - either online, by phone or in-branch -- on particular transactions. Dont think youll ever conduct any wire transfers outside the United States? Bank only with institutions that let you limit those transactions.  Eliminates distribution of your personal information and limits use of your Social Security number to the last four digits.  Offers to email or text message you if theres ever a change of personal information, including a change of address, addition of a cardholder or unusually low balance on your account.  Has a centralized fraud resolution department.  Lets you quickly freeze your account.  Requires at least two ways to confirm your identity both by telephone and online banking.  Regularly educates employees on how to properly secure sensitive information.  Regularly examines employees for insider collusion.  Encrypts your personal identification numbers, passwords, Social Security numbers and other private data.  Uses no hyperlinks in emails. This way, you can determine which emails dont come from your bank.Meanwhile, Javelin Strategy & Research reports increased theft via mail order or telephone orderpurchases. It cites a newer tactic, "Vishing," or using the Internet to place phone calls. Internet-placed calls are tougher to trace.
  9. 9. Bottom line: Never provide personal information -- even over the telephone. If you get acommunication from your bank, call only the telephone number you already have -- not the one inthe communication.ID thefts: up or down?It seems comforting that Javelin Strategy reports a 12% decline in identity theft in 2007. But noteveryone agrees with that companys study, sponsored by Visa, Wells Fargo Bank and CheckFreeServices Corp.For one thing, the Federal Trade Commission reports a 32% rise in identity theft complaints to258,427 during the 2008 calendar year. Chris Jay Hoofnagle, senior fellow at the University ofCalifornia-Berkeley law school, complains that consumers, regulators and businesses have noreliable way to assess identity fraud at major financial institutions."Lending institutions should publicly report basic statistical information about identity theft events,"he says. Information they should disclose: The number of identity theft events suffered or avoided;the form of identity theft attempted; the targeted product, such as a mortgage loan or credit card;and the amount of loss suffered.When Radha Baijal checked her email on November 3 last year to see if there was any responseto her application for a job in the UN, she couldnt believe her eyes. In her inbox lay a letter sayingshe had landed her dream job. As it turned out, Radha shouldnt have believed her incredibly goodluck. For though she had posted her application on the genuine UN site, the 24-year-oldschoolteacher from the Capital today finds herself poorer by Rs 1.5 lakh and smarting with therealization that she has been had. Here is what happened. Radha received a signed reply fromone Dr Christy Owen, "Chief Administrative Officer, US Committee for the UN", confirming herappointment. The email communication carried the UN logo and address. As instructed, shecontacted one Kate Bruce at the given email address for instructions before she was to fly off for a"training program in Seattle".Radha was instructed to transfer Rs 1.5 lakh into a US bank via a given swift account number. Theunsuspecting victim delved into her fathers retirement benefits and sent the money. Radhasmelled a rat only when she responded to a second request for money - this time for Rs 70,000 –by saying she had none and asking that it be deducted from her promised salary of $152,678 peryear. Thats when all communication from the other end stopped. Radha isnt the only victim of thisscam. N.Y. Suresh Kumar, a zoology scholar in Kerala, received a similar letter saying hed been"selected" for the post of environmental officer in the "United Nation Center for DevelopmentInitiative" and a request for $2,280. Luckily for him, Suresh Kumar got the letter checked by the UNInformation Center’s office in Delhi and was told that the UN had no such outfit.In the last six months, a number of people from across the country have approached the Delhioffice to verify the authenticity of "job confirmation letters" sent to them by email and post. Theseletters come complete with the UN logo and address of the United Nations headquarters in NewYork. In all cases, the letters have turned out to be fake. Shalini Dewan, UN representative forIndia, says these cases "have been brought to the notice of appropriate authorities for suitableaction". Cautioning those who have received offers for jobs and training, invitations to conferences
  10. 10. and reque ests for fun nds, she says that it is misuse of the UN name by tricksters using the Internet. gency asks for funds in exchan for training or em"No UN ag s nge mployment, Dewan says. ,The racke has bee going on for some time. Th Geneva office of U et en e he UNAIDS had in September hlast year issued a w worldwide alert warn ning people to verify the authe y enticity of emails and letters dcarrying it logo or a ts address be efore meetting any request for money. It h also re m had equested p people toprovide deetails of su uspect com mmunicatio to help investigate the fraud ons e d.How they duped yre d  All letters cam with UN logo and address of UN head me N o dquarters in New Yor n rk  Job offers we followed by reque b ere ests for mo oney  The were a ere also invitations to con nferences and training program a m  The Delhi off e fice of UN Informatio Centre has receiv severa requests for verific on ved al s cation of the authentic of such job confir e city rmation lett ters in last six month t hsPrior warrning: The Geneva office of U e o UNAID had in Septem mber issue a worldw ed wide alert warningpeople to verify the authentic of ema e city ails/letters carrying its logo or a s efore meeting any address berequest fo money. or Notic some ce ething in the ph hotogra aph!See th helme it is there but not where it could h he et, w t have sa aved the life! e Surely th here are st few pe till eople who will quest tion the ut tility of a helmet! h
  11. 11. Courtesy: Prof. K. Ganapathy MS (Neuro) MNAMS (Neuro) FACS FICS Ph.D, Secretary of the AsianAustralasian Society of NeurologicalHelmets have not suddenly arrived At least 50 years of research in various fields have led to thisdevelopment. Helmets have been designed based on cadaver studies, animal experiments,computer simulation studies, biomechanical studies and study of crash injury patterns. Sir HugeCairns was the first person to understand the role of helmets in preventing severe head injuriesand deaths. Before a helmet is certified it has to pass through four main tests namely: 1. Shock absorption – Cushioning capabilities of the padding test. 2. Resistance to penetration-to make sure the shell of the helmet is strong. 3. Strength of the retention system-to test the stretching of the chin strap. 4. Rigidity-to test the structural and safety performance. Most injured motorcyclists who do not wear helmets report that they did not expect to be injured; yet 40% of the head injury-associated deaths were ascribed to the motorcyclist’s loss of control, not, apparently, to some action of the driver of another motor vehicle. 5. Studies have shown that when helmet use is voluntary, it is used by 40-50 %; when it is compulsory it is almost 100 %; no other approach has succeeded in raising helmet use to anything close to these levels.How is a helmet useful?  The brain is the only organ in the body with its own safe deposit vault.  When a major impact occurs, the skull however thick cannot absorb the entire force! The impact only slightly attenuated is still transmitted to the underlying brain. When direct injury occurs, the damages to brain are very serious - often irreversible.  A helmet considerably increases the thickness of the container. The blow gets absorbed, spreading the impact over a larger region. The intensity at any one point is considerably diminished. The time lag also reduces the ultimate intensity reaching the brain through the helmet, hair, skin, skull and the meninges of the brainREASONS FOR NOT WEARING HELMETS  “I am a good driver. How can an accident ever happen to me “?  “But, it is not compulsory “  “I use the scooter for very short distances” (If only the bus driver knew this  “Where do I keep it“ (Where there is a will there is a way )  “I may loose my hair“(How many bald motor cyclists does one see?)  “It is so hot and uncomfortable“(If only you knew how much hotter it can get without one!!!)  “I may get headache and neck pain” ( at least you will still have a head )  “Neck & Spinal Cord injuries may increase , reduced hearing &, vision, increased fatigue & overconfidence ( Detailed studies have shown that this is not true)  “Ungainly appendage on a beautiful feminine head” (and we talk about equality and women’s liberation!)  “What is to be will be” (Alas the bereaved family does not subscribe to this oriental fatalism)  “What about the family” (Buy three for the price of two?)  “I have just not had the time” ( Time and tide wait for no Man)  “A helmet is expensive” ( Obviously the contents are not )
  12. 12.  Addventure, recklessn ness, mis splaced enthusiasm particu e m ularly in the youn – ng heelmets wor only by “sissies ( Knowle rn y s” edge is lea arning from one’s kn m nown mistaakes, wissdom is lea arning from another’ s mistakes – alas se m s elf-acquired knowledge may be too d e late ) e  “WWhat abou protecting other body par ut rts” (death & major disability is due to b h brain inju – prote ury ecting the brain is eas pragma and eff b sy, atic fective)Suggestions:  Ple ease recon nsider your decision n to wear helmet. r not r  Young ladies please decide to u helmet while you comforta s, d use t u ably sit at the back sseat. On the Womens day, ple e s ease take some po e ositive decisions an convinc your b nd ce brothers, hussband, frieends, fathe etc. to u helme I am su you do not bothe about yo hair- er, use et. ure er our sty and use helmet yo yle e ourself.  Ca drivers, u seat be avoid m ar use elt, ones while driving. mobile pho  Folllow all traf rules, even if som ffic e meone is not watchin you. And do not ce n ng d elebrate w when you dod a traffi man, ultimately we will suffer dge ic e r.  ease do no try to sa some petrol by driving on wrong sid to avoid taking a U-Turn Ple ot ave n de som distanc away. me ce   uggestion & feedb Su ns back may b sent to us on e-m be o mail: capts sbtyagi@y .inP.S. - If you dont like to receive our newsletter, w apologize for bothering you. Please let us know your mail ad u o we g e w ddress, wewill move it out of our coontact list, tha you! ank