Go to the Internet for information, entertainment, relationships and support. . Heavy users are at risk when they are plugged for More Than 18 Hours A Week. There is no official diagnosis for an addiction to the Internet. The proposed disorder is called Internet Addiction Disorder (IAD).USING THE NET IS NOT A PROBLEM FOR INTERNETUSERS WHO ARE ON-LINE LESS THAN TWO HOURS A WEEK.
The people going on-line excessively will encounter one or more of the following problems. Personal neglect Compulsive checking and "clicking" Isolation and avoidance from people Lost productivity Depression Marital problems Internet abuse in the workplace Academic failure.
when people mistreat or misuse other people, showing no concern for theirintegrity or innate worth as individuals, and in a manner that degrades their well being
Am I Being Abused? Domestic Violence Stalking Sexual Harassment Financial Abuse Credit card or debt, identity theft and other money matters.
BETTER FOCUS CONCERTATION MEMORY FLEXIBILITYIMPROVE INTELLIGENCE SOLVE THINK OUTSIDE THE & I.Q PROBLEM BOX SPEED ATTENEION THINK FASTER AND BE A SHARPER AND IMPROVE REACTION TIME BETTER DRIVER
Internet Security Safety with an Abuser think of ways to try to stay safe if you are currently living with someone who is violent. Getting Ready to Leave Ending the Abusive RelationshipIf you have left an abusive relationship, or you are trying to keep the abuser away, Safety in Rural AreasIf you live in a rural area or a small town, there are some extra things to keep in mind when youre making a safety plan. Safety Tips for Stalking Victims how to stay safe if you are a victim of stalking Safety with Social Media How to stay safe on Face book, MySpace, Twitter and Blog Where to Find Help Additional resources + create a safety plan that is right for you.
STRONG PASSWORD BEING CAREFUL –FILE OR DOC SHARING EXTRA CONCERNED WITH UR ONLINE BILL PAYMENT DISCLOSING INFORMATIONS MISUSE OF PHOTOGRAPH CHILD CODE LATEST ANTI-VIRUS UPDATE AWARENESS BACK VOLUME-AVOID DATA LOSS
• to two years. Criminal • three hundred access. thousand rupeesCriminal • to three years data • with fine access • with both.
• three years, Data • with finedamage • or with both • three years, System • with finedamage • or with both
Whoever for wrongfulgain interferes with oruses any data, electronicsystem or device orinduces any person toenter into a relationship • seven years,or with intent to deceive , Electronicwhich act or omission is • with fine,likely to cause damage or fraud • with Bothharm to that personwrongful gain interfereswith data, electronic • seven years,system or device, withintent to cause damage Electronic • with fineor injury to the public orto any person, make forgery • with bothillegal claim or title or tocause any person to partwith property or to enterinto any express orimplied contract, or withintent to commit fraudby any input
Misuse of •three year electronic system • with fine, or electronic device •three year . Unauthorized • with fine, access to code •five years,encrypts any Misuse of • with fine,communication or data encryption • with both.contained in electronicsystem relating to thatcrime or incriminatingevidence, commits theoffence of misuse ofencryption
• ten years • with fine not less than one hundred . Cyber stalking thousand rupees, • with bothwith intent to coerce , intimidate, or harass any person usescomputer, computer network, internet, network site ,electronic mail or anyother similar means of communication (a) communicate obscene, vulgar, profane, lewd, lascivious , or indecentlanguage, picture or image; (b) make any suggestion or proposal of an obscene nature (c) threaten any illegal or immoral act;(d) take or distribute pictures or photographs of any person without his consentor knowledge;(e) display or distribute information in a manner that substantially increases therisk of harmor violence to any other person, commits the offence of cyber stalking.
•fine not exceeding fifty . thousand rupees for the first time Spamming •imprisonment of three months • with both.transmits harmful, fraudulent , misleading, illegal orunsolicitedelectronic messages in bulk to any person without theexpress permission of the recipient,• causes any electronic system to show any suchmessage or involves in falsified online user accountregistration falsified domain name registration for commercialpurpose commits the offence of
•ten years Cyber •with fine not less than ten million rupees, terrorism • with both.a website, or sends an •to three yearselectronic message with a • with fine,counterfeit Spoofing •both.source •to five years Malicious • with fine code • with both •to five years, Unauthorized •five hundred thousand rupees, interception • with both.
Enhanced punishment for •ten years, offences involving •with fine not exceeding one sensitive electronic systems million rupees, or with both. . Of abets, aids or •oneha1f of the longest term of attempts to commits imprisonment offence
sections 193 and 228 of the Pakistan Penal Code 1860 (XLV of 1860 ) sections 480 and 482 of the Code ESTABLISHMENT OF INVESTIGATION AND PROSECUTION AGENCIES – Federal Investigation Agency to investigate and prosecute the offences under this Act- retain its traffic data minimum for a period of ninety days – in writing to the Ministry of Foreign Affairs of Government of Pakistan I other relevant agencies as the case may be . the Information and Communication Technologies Tribunal whose principal seat shall be at Islamabad
Overview Most of the laws related to domestic violence and sexual assault are state laws. Restraining Orders A restraining order is a legal order requiring one person to stop harming another. Custody General information about custody and visitation laws. Parental Kidnapping the laws of taking your child away from another parent without that parents consent. Divorce General information about the basic steps to get a divorce. Crimes General information about crimes the abuser may have committed. Suing Your Abuser You may have a right to sue your abuser for medical costs, destroyed property, or other damages.
An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011). ‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010). ‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, (April 12-19, 2010). ‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth common space after land, sea, air and outer space neeed international law as a framework. - EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to Cybersecurity» - Brussels (February 17, 2010). ‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts, Denver, USA, (September 2009) (pdf) ‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries (pdf) prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May 2009) ‣The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva (pdf) Stein Schjolberg (December 2008)
SMALL AND MICRO ENTERPRISES FOR DEVELOPMENT NEW TRENDS IN GOOD GOVERNANCE CONFLICT RESOLUTION SUSTAINABILITY ISSUES IN POVERTY REDUCTION SOCIAL MOBILIZATION IN DEVELOPMENT PLANNING TOOLS