How to protect yourself in e world?


Published on

Target audience: grade 5 & above students and all parents

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

How to protect yourself in e world?

  1. 1. HOW TO PROTECT YOURSELF IN CYBER WORLD? Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Copyright Dipak G. Parmar 1 Meant for educational purpose only 18/09/2012
  2. 2.  Pre 1990: People are not connected 1990: Connecting People to Information 2000: Connecting People to People 2010: Everything is connected
  3. 3.  We are now living in e-world… dominated by numbers of “e”. e-friend…e-music…e-network…e-ticket… e-book... e-learning... e-commerce… In my opinion, right to life includes right to e-life.
  4. 4. Cyberspace is the electronic medium of computer networks, in which online communication takes place. Now, the term has become a conventional means to describe anything associated with computers, information technology, the Internet and the diverse Internet culture. Cyberspace includes – The Internet, websites – Computers, networks – Software, data storage devices, emails – Electronic devices (cell phones, ATM machines etc)
  5. 5. Characteristics of Cyberspace Cyber space is an intangible and provides an extreme mobility Events taking place on the Internet are not happening in the locations where participants or servers are physically located, but "in cyberspace".
  6. 6. Characteristics of Cyberspace Cyber space has Complete disrespect for national boundaries. A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer/mobile with the Internet connection.
  7. 7. Characteristics of Cyberspace Cyber space is absolutely open to participation by all.  A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  8. 8. On the Internet, Nobody Knows Youre a Dog. Cyber space offers enormous potential for anonymity to its members. A classic sting operation led by William Swallow, an FBI Agent, to identify and arrest malicious hackers. During 18-month sting operation, Swallow and his team gathered critical evidence on several people , including “Mafiaboy”, the 17-year-old hacker who plead guilty to 58 charges related to a series of DOS attacks in Feb 2000 against companies such, eBay and Yahoo.
  9. 9. ONLINE PREDATORS Online predators do exist and are a very real threat for our children. An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. They target both boys and girls of all ages and use the anonymity of the Internet to their advantage since they can be whomever they want.
  10. 10. Targets of Online PredatorsChildren that are Technically more savvy than their parents or emotionally vulnerable which can be related to personal issues derived from problems at school or home.
  11. 11. Elliott McDermott, 19, Internet Predator, who exploited Facebook to meet young girls so he could rape and abuse them was described as "every parents worst nightmare" as he was jailed for six years on July 1, 2012 by the UK Court.
  12. 12. Learning: How to avoid predators?1. Do not give out identifying information such as name, home address, school name or telephone number in a chat room2. Do not send your photograph to any one on the Net without initially checking with the parent or guardian.3. Do not respond to messages or bulletin board items that are obscene, belligerent or threatening.4. Never arrange a face to face meeting without informing your parent or guardian.5. Remember that people online may not be who they seem to be. (On the Internet, Nobody Knows Youre a Dog.)Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department, Mumbai
  13. 13. Cyber-BullyingWhat is Cyber-bullying? Cyber-bullying is defined as the use of technology, such as the Internet or text messaging to post derogatory or hateful material about another. Cyber-bullying is often anonymous...Victims does not know who is bullying them.
  14. 14. Cyber-Bullying affects real livesCyber-bullying had been likened to a “nuclearattack on a persons feelings and reputation.Unlike traditional bullying, the humiliation of cyber-bullying could be broadcast to hundreds of peerswith the touch of a button.  Professor Donna Cross.Director of the Child Health Promotion Research Centre, Australia Effects included poorer mental health, such ashigher levels of depression, anxiety, and suicidalideation.
  15. 15. Cyber-Bullying affects real livesThe Social pressure of Cyber-bullying can lead to suicide , such was the case for these victims. Megan Meier, 13 Ryan Halligan, 13
  16. 16. Video: A Cyber Bullying SuicideStory -- Ryan Halligan age 13 feature=BFa&list=PL26C72EA6DE0A815A
  17. 17. Learning: Cyber-Bullying1. Being bullied...immediately inform to your parents, school authority and, if needed, the local Police station .2. Being by-stander, do not laugh... Raise your voice against it. Report the same to your school authority.3.Think before you click.... just because its online... does not means those words do not hurt. You may be criminally liable for your act.
  18. 18. Pornography Publishing, transmitting of any pornography material in electronic form is an offence under the Indian Information Technology Act, 2000. As per the amended Information Technology Act, 2000, it is illegal to even viewing and possessing the child pornography.
  19. 19. TOI dated 05-09-09 page 11TOI dated 18-08-09 pg 7 TOI dated 31-08-09 pg 10 Copyright Dipak G. Parmar Meant for educational purpose only 21
  20. 20. Hackers had used the illegally taped peephole video of Erin Andrews asa lure to infect user machine with malware. Times of India dated 22-07-2009 page 7 Copyright Dipak G. Parmar Meant for educational purpose only 22
  21. 21. JNU MMS Abha Kumar, 25, (name changed) clicked semi-nude pictures of herself and sent them to her commitment- phobic boyfriend without realising that the Internet is not a very safe place for naked pictures of a woman. One click and you are a porn star.In the recent JNU, MMS scandal, the man who circulated the MMS of his girlfriend was apparently doing this to seek revenge from her.
  22. 22. Learning: Pornography1. Do not visit porn site. You end up downloading virus.2. Do not transmit(share) porn.3. Do not view or possess child porn.4. Do not allow any person, even your so called best friend, to click or record when you in comprised position.5. Do not share your nude photo/video to other.6. Avoid the Internet when you are ANGRY.
  23. 23. Digital content (software, movies, songs, picturescontent etc) is particularly vulnerable to piracybecause making and sharing (or selling) copies iseasy and inexpensive.Internet is the world’s biggest copy machine. -See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Copyright Dipak G. Parmar Meant for educational purpose only 01/08/2010 25
  24. 24. Digital Piracy India was the fourth largest downloader behind US, Britain and Canada. “Free-to-user” appeal of illegal file-sharing that creates its unfair advantage over legitimate music services. Although, copyright piracy is a crime but end- users under the “free-to-user” concept’s influence does not perceived it as a crime.
  25. 25. Emmanuel Nimley jailed for six months: recorded the latest releases on his phone and put them on a film piracy website.
  26. 26. Learning: Digital Piracy1. Do not upload copyrighted materials of others (software, movies, songs, pictures content etc) without permission.2. Do not download copyrighted material from unauthorised source. You end up downloading virus, apart from being criminally liable for unauthorised downloading and violating copyright.
  27. 27. 1. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws ( accessed on 27-09-2009)2. A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007)3. “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).4. Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff ( 5162852 Accessed on 13-09-2010)5. LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on (Accessed on 16-09-2012)6. Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark ruling, MailOnline and available on iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012)7. Cyber Bullying Awareness Video, created By: Tyler. S and available on (Accessed on 16-09-2012)8. Internet predator, 19, who raped girls is every parents worst nightmare every-parents-worst-nightmare.html (Accessed on 16-09-2012)9. (Accessed on 17-09-2012)10. (Accessed on 16-09-2012)11. Wikipedia,_nobody_knows_youre_a_dog (Accessed on 15-09- 2010) (Accessed on 15-09-2010)
  28. 28. Thank YouAdv. Dipak G. ParmarB. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR 09820196971