Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Be ware and be aware of social media risks


Published on

Prime Point Srinivasan addressed Junior Chamber International India - Madras Marina chapter on 5th April 2014 on the theme "Be ware and be aware of Social Media risks".

Published in: Social Media, Technology, Business
  • Be the first to comment

  • Be the first to like this

Be ware and be aware of social media risks

  1. 1. “Be ware and be aware of social media risks” Prime Point Srinivasan JCI, Madras Marina 5th April 2014
  2. 2. What we will discuss • Global internet scenario • Websites and social media networking sites • Challenges before the users • Information Technology Act 2000 • Protecting from cyber challenges
  3. 3. Global Internet scenario • Out of 7.1 billion population, 2.9 bn use internet.38.5 % use internet globally • 12% internet penetration in India and I billion mobile phones
  4. 4. Websites and social media • 1.5 bn Top Level domains (TLDS) com, org, net, info, biz, us • Facebook, Twitter, LinkedIn, YouTube, + many more • Blogs (wordpress and blogger) • Discussion groups (yahoo & google)
  5. 5. Social media networking sites • Facebook has 1.25 bn users (100 M users in India) Twitter 250 M users • Linkedin 280 M users • Wordpress 80 M blogs; • YouTube 1 bn + users and 4 bn + viewers per day.
  6. 6. Social Media • 600 million status updates / day • 400 milion emails per day (80% spam) • 350 millions photo uploads / day
  7. 7. Huge bandwidth loss due to unproductive and unwanted usage of social media + wastage of server space at global level
  8. 8. Internet is a double edged weapon
  9. 9. Challenges before the users • Information hacking. Eg: id and password theft. The id is being used for illegal purposes; • Cyber stalking – Cyber harassment through mail, mobile sms, phone call etc.
  10. 10. Cyber Challenges • Morphing / spoofing of IP address and email address. Sending mails as if it emanates from your IP address or email. • Cyber squatting – Getting the domain name of the branded person or organization and selling to the company at huge price.
  11. 11. Cyber Challenges • Defamation / character assassination of persons or organizations through internet and social media. • Spamming – sending unwanted and irrelevant junk mails.
  12. 12. Cyber Challenges • Cyber Terrorism • Eg: Spreading rumours to create clash, enmity, etc., Intruding on the computer system
  13. 13. Information Technology Act • IT Act 2000 effective from 17th October 2000 • Amendment of 2008 effective from 27th October 2009 • Using of computer for committing crime is an offense – computer is defined in the Act
  14. 14. Which are the devices ? • PCs, Laptops, Iphones, Ipads, Tablets, mobiles with internet, etc. • Mobile phones without internet • Even washing machines and electric ovens with memory chip
  15. 15. Cyber offenses punishable • Sections 43, 43A, 65, 66 and 67A of the IT Act define some of the offenses and the corresponding punishments.
  16. 16. • 66A. Punishment for sending offensive messages through communication service, etc. • Any person who sends, by means of a computer resource or a communication device,— • (a) any information that is grossly offensive or has menacing character; or
  17. 17. • (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,
  18. 18. • (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, • shall be punishable with imprisonment for a term which may extend to three years and with fine.
  19. 19. How to protect ourselves • Use BOSS operating system • Ignore all spam mails, lottery or prize mails, or mails asking for passwords and private data • Keep complicated password – do not share with others
  20. 20. How to protect ourselves • Use licensed software – avoid pirated software. Use licensed anti virus software • Avoid sharing personal information in social media. (phone numbers, address) Ladies may avoid uploading photos
  21. 21. How to protect ourselves • Some of the college and school students in the name of confession pages, post messages maligning teachers and other students. When the victims complain to police, the person who writes can be imprisoned for 3 to 5 years. Avoid maligning others.
  22. 22. How to protect ourselves • Avoid taking unknown people as friends. Review frequently. • Avoid hate/abusive messages – Avoid ‘liking’ such message. Do not share such messages • Avoid uploading photos with intimate pose
  23. 23. How to protect ourselves • Avoid games In social media and mobile apps. (do not become addict) • Avoid apps as far as possible • Sharing of porno contents is punishable under IPC and IT Act. • Impersonation is dangerous
  24. 24. How to protect ourselves • Avoid forwarding controversial mails or messages through internet and mobile • Victims of cyber offense should file a police complaint • Ensure safe journey in Cyber Space
  25. 25. Avoid addiction to internet -treat social media like shoes – use only when you need
  26. 26. Thank you K. Srinivasan Prime Point Foundation and Editor in Chief PreSense and New Gen Thamizhan