SlideShare a Scribd company logo
1 of 10
CYBER BULLYING
Presented By
Chandan Kumar Gupta
What is Cyber bullying
• Bullying or harassing or intimidating a person
on social media or instant massaging
platforms or any other online platform using
any technological devices.
• In simple words, Its online ragging.
Forms of Cyber Bullying
• Instant Massaging
• Text Massaging
• Blogs
• Websites
• Emailing Pictures
• Stealing Passwords
• Sending Porn
• Impersonation
Reasons for Cyber Bullying
• To show off to friends
• To embarrass
• For fun or entertainment (in forms of Trolls/Meme)
• For revenge (Mostly in misguided relationships)
• Organised IT Cells of Organisation (New Trend)
Some Surprising Facts
• India ranks 3rd in the world where most people
are affected by cyber bullying.
• Most of the victim are female.
• Mostly teenagers are affected.
• Source : Survey conducted by Microsoft
• Upper House of the Parliament in this winter
session (Nov-Dec 2019) has setup a committee to
study and submit the report on the content
which can be banned in India. The report will
come up with data of recent years and advice the
government.
Effects of Cyber Bullying
• Hurt Feeling
• Sadness
• Anxiety
• Depression
• Anger
• Shame
• Fear
• Frustration
• Trust Issues
• Suicide
In November 2017, MBBS
students in Kerala
jumped from highest
floor of her college.
Police reported that she
was victim of cyber
bullying.
Prevention
• Don’t Respond
• Don’t retaliate
• Save the evidence
• Talk to a trusted
adult
• Complaint
• Don’t be a bully
• You cannot change
people’s mindset (story of
Hyderabad Dr. Reddy) so change the
way you live.
• Privacy is myth, so
better never take
digital record which
you cannot share
publicly. Even for your
most loved ones!
Help
• Ministry of Women &
child Development at
mwcd@gov.in
• Cyber Cell of Police
• Incognito Forensic
Foundation
Information Technology Act
• 66A: Sending offensive massage
• 66C: Identity Theft
• 66D: Cheating by impersonation
• 66E: Violation of Privacy
• 67B: Explicit content of Child
Indian Penal Code
• 499: Defamatory Massage through
Mail
• 500: Email Abuse
• 503: Threatening massage through
mail
Think before you
• Type
• Forward a massage
• Post on social media
• Comment
• Share a post
THANK YOU
• CHANDAN KUMAR GUPTA
• 9911369185
• https://www.chandanopine.futani.in

More Related Content

What's hot

Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide sharebr03wood
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation introkscheidy
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*Amber Dee
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power pointmb29thom
 
Internet Addiction
Internet AddictionInternet Addiction
Internet AddictionHayatB
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentationSally Garza
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableKhy Amigable
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 

What's hot (20)

Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying presentation intro
Cyber bullying presentation   introCyber bullying presentation   intro
Cyber bullying presentation intro
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying power point
Cyber bullying   power pointCyber bullying   power point
Cyber bullying power point
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Addiction
Internet AddictionInternet Addiction
Internet Addiction
 
What is cyberbullying presentation
What is cyberbullying presentationWhat is cyberbullying presentation
What is cyberbullying presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Depression suicide presentation
Depression suicide presentationDepression suicide presentation
Depression suicide presentation
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar to Cyber bullying

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation courtneyjohnson105
 
CYBERBULLYING new (1).pdf
CYBERBULLYING new (1).pdfCYBERBULLYING new (1).pdf
CYBERBULLYING new (1).pdfshinyvibes26
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big ProblemGail Rebuck
 
A Case Study On Cyber Bullying
A Case Study On Cyber BullyingA Case Study On Cyber Bullying
A Case Study On Cyber BullyingSarah Marie
 
EFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGEFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGNITIN BASANTWANI
 
Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)Suraj Rawat
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crimePuja Dhakal
 
Geek out @ your library® cyberbullying
Geek out @ your library® cyberbullyingGeek out @ your library® cyberbullying
Geek out @ your library® cyberbullyingMelissa McDonald
 
Digital Citizenship Initiative1
Digital Citizenship Initiative1Digital Citizenship Initiative1
Digital Citizenship Initiative1kathyschmo
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1Samphiriane
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullyingZiar Khan
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01overcertified
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Csis200 cyberbullying
Csis200 cyberbullyingCsis200 cyberbullying
Csis200 cyberbullyingBl03_Cook
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdfJioAhuja
 

Similar to Cyber bullying (20)

Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
CYBERBULLYING new (1).pdf
CYBERBULLYING new (1).pdfCYBERBULLYING new (1).pdf
CYBERBULLYING new (1).pdf
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
A Case Study On Cyber Bullying
A Case Study On Cyber BullyingA Case Study On Cyber Bullying
A Case Study On Cyber Bullying
 
EFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKINGEFFECTS OF SOCIAL NETWORKING
EFFECTS OF SOCIAL NETWORKING
 
Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)Digital dilemma (Social Media & Cyber Crime)
Digital dilemma (Social Media & Cyber Crime)
 
Dark side of it and cyber crime
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crime
 
Geek out @ your library® cyberbullying
Geek out @ your library® cyberbullyingGeek out @ your library® cyberbullying
Geek out @ your library® cyberbullying
 
Digital Citizenship Initiative1
Digital Citizenship Initiative1Digital Citizenship Initiative1
Digital Citizenship Initiative1
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cabatian & Estrada 1
Cabatian & Estrada 1Cabatian & Estrada 1
Cabatian & Estrada 1
 
Bullying & cyber bullying
Bullying & cyber bullyingBullying & cyber bullying
Bullying & cyber bullying
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Csis200 cyberbullying
Csis200 cyberbullyingCsis200 cyberbullying
Csis200 cyberbullying
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyber bullying

  • 2. What is Cyber bullying • Bullying or harassing or intimidating a person on social media or instant massaging platforms or any other online platform using any technological devices. • In simple words, Its online ragging.
  • 3. Forms of Cyber Bullying • Instant Massaging • Text Massaging • Blogs • Websites • Emailing Pictures • Stealing Passwords • Sending Porn • Impersonation
  • 4. Reasons for Cyber Bullying • To show off to friends • To embarrass • For fun or entertainment (in forms of Trolls/Meme) • For revenge (Mostly in misguided relationships) • Organised IT Cells of Organisation (New Trend)
  • 5. Some Surprising Facts • India ranks 3rd in the world where most people are affected by cyber bullying. • Most of the victim are female. • Mostly teenagers are affected. • Source : Survey conducted by Microsoft • Upper House of the Parliament in this winter session (Nov-Dec 2019) has setup a committee to study and submit the report on the content which can be banned in India. The report will come up with data of recent years and advice the government.
  • 6. Effects of Cyber Bullying • Hurt Feeling • Sadness • Anxiety • Depression • Anger • Shame • Fear • Frustration • Trust Issues • Suicide In November 2017, MBBS students in Kerala jumped from highest floor of her college. Police reported that she was victim of cyber bullying.
  • 7. Prevention • Don’t Respond • Don’t retaliate • Save the evidence • Talk to a trusted adult • Complaint • Don’t be a bully • You cannot change people’s mindset (story of Hyderabad Dr. Reddy) so change the way you live. • Privacy is myth, so better never take digital record which you cannot share publicly. Even for your most loved ones!
  • 8. Help • Ministry of Women & child Development at mwcd@gov.in • Cyber Cell of Police • Incognito Forensic Foundation Information Technology Act • 66A: Sending offensive massage • 66C: Identity Theft • 66D: Cheating by impersonation • 66E: Violation of Privacy • 67B: Explicit content of Child Indian Penal Code • 499: Defamatory Massage through Mail • 500: Email Abuse • 503: Threatening massage through mail
  • 9. Think before you • Type • Forward a massage • Post on social media • Comment • Share a post
  • 10. THANK YOU • CHANDAN KUMAR GUPTA • 9911369185 • https://www.chandanopine.futani.in

Editor's Notes

  1. Advertisement at FB/Google, Google Photos