SlideShare a Scribd company logo
Social Networking Sites-Security
30 – 05 - 2013
Background
 SNSs-Facebook, Orkut, Twitter, Friendster, MySpace, Hi5, etc.
 Virtual community- People standoffish- New privacy settings -
 Criminals exploit –Inactiveness of the account - Poor security for
information in social networking forum- Personal lives of people are
publicly discussed- Greater damage.
Privacy
 Right to control one’s personal information,
 Ability to determine how that information should be obtained and
used.
 Right to Privacy is an implied right under Fundamental Rights.
 The Supreme Court of India Spelt out from the provision of Article 21
which deals with the right to life and liberty.
 Its application vis-à-vis internet content has not yet been directly
clarified by a judicial ruling.
ITAA-2008-Protecting Privacy.
 Sections 43 A/ 72A for privacy issues.
 Section 43A- Sensitive Information/Reasonable Security Practice by the
data handlers-Compensation from the body corporate that has been
negligent.
 Section 72A -A person including an intermediary could be held liable if
he discloses “sensitive information” which he accessed while providing
services under a contract.
Continued.,
ITAA-2008-Encroaching privacy.
 Sections 69/ 69B encroach upon the right to privacy.
 Section 69 of the amended Act empowers the state to issue directions for
interception, monitoring, decryption of any information through any
computer resource.
 Section 69B empowers the Government the authority to monitor, collect
traffic data or information through any computer resource for cyber
security
Privacy and security
 The security and privacy issues are entirely two different beasts.
 A security issue occurs when a hacker gains unauthorized access to a
site’s protected coding or written language.
 Privacy issues are those involving the unwarranted access to the private
information which doesn’t necessarily have to involve security breaches.
 But both types of breaches are often intertwined on social
networks, especially since anyone who breaches a site’s security network
opens the door for easy access to private information belonging to any
user.
Youth culture.
 They may not always know what is appropriate, factual, or legal for them to view
or use.
 A youth who has grown up with computers, other IT devices and the Internet
may be developing different standards for behaving “online” as opposed to when
they are “offline”, because they are interacting more via cyberspace, where social
sanctions are not clearly defined or consistently sanctioned as they are in the
real world.
 Concerns about youth creating fake profiles in order to carry out harmful
activities online or, conversely, to protect their real identities are also increasing
along with social networking popularity lying about one’s age.
Data Protection by Corporations
 Social networking fraud. These sites create exponential networks and
allow tapping into other people’s network and their friends’ networks. -
 The most common method for obtaining personal information is social
engineering. Once personal information is provided to an
unscrupulous company or person, it is difficult to regain control of the
information.
 Justification for restricting employee Internet access to social
networking sites in an organization- for the following reasons :virus or
spyware prevention-employee productivity drain-bandwidth concerns-
liability issues
Security Measures.
 Users can also block specific Facebook users . Facebook also limits the
ability of search-site Web crawlers to harvest user information.
 A new option has also been introduced by Facebook where a user who
logs in from a different computer is asked for authorization.
 This login is notified to the registered email of the Facebook user. So if
the account is hacked or an unknown user logs in, the information of
such an access is instantaneously sent on the registered email.
ITAA-2008-0FFENCES.
 Jurisdiction under IT Act, 2008 extends to persons outside India and
persons who are not citizens of India provided at least one computer
situated in India has been used in the commission of the offence. That
is the reason why they have adopted two distinct provisions relating to
jurisdiction, in Section 1(2) and Section 75.
 Section 66: This Section is attracted when the imposter fraudulently
and dishonestly with ulterior motive uses the fake profiles to spread
spam or viruses or commit data theft
Continued.,
 Section 66A: When the imposter posts offensive or menacing
information on the fake profile concerning the person in whose name
the profile is created. Further, the fake profile also misleads the
recipient about the origin of the Message posted..
 Section 66C: When the imposter uses the unique identification
feature of the real person like his/her photograph and other personal
details to create a fake profile, the offence under Section 66C
Information Technology Act is attracted
 Section 66D: When the imposter personates the real person by means
of a fake profile and cheats then the provision of Section 66D is
attracted .
Continued.,
 Section 79 An intermediary shall not be liable for any third party
information data or communication link made available or hosted by
him if; (a) the function of the intermediary is limited to providing
access to a communication system over which information made
available by third parties is transmitted or temporarily stored or hosted;
(b) the intermediary does not initiate the transmission or select the
receiver of the transmission and select or modify the information
contained in the transmission; (c) the intermediary observes due
diligence while discharging his duties.
Continued.,
 Section 85 Every person who, at the time of the contravention, was in
charge of and was responsible for the conduct of the business of the
company would be guilty of the contravention.
 Not liable if he proves that the contravention took place without his
knowledge/ he exercised all due diligence to prevent the contravention
 . “Body corporate” has been defined as any company and includes a
firm, sole proprietorship or other association of individuals engaged in
commercial or professional activities. Thus, government agencies and
nonprofit organizations are entirely excluded from the ambit of this
section.
Conclusion and Suggestions
 Adequate amount of caution/ common sense.
 Anti-Phishing Working Group (APWG).
 Anti-spam reputation systems.
 Awareness-raising/educational campaigns by users/Sites.
 Cross reference verification by social networking websites.
 Cyber Crime Insurance Programme.
 Discover trends to prevent future harm.
 Effective enforcement of laws
 Encouragement for “Security Culture” in the community.
Continued.,
 External auditors for updating knowledge/ procedures.
 ICP should be made liable and not the ISP.
 Information Security Auditors in the organization.
 Introduce IPv6 for IPv4 for better monitoring and security.
 Pop-up confirmation.
 Read and understand documents.
 Regularly check your privacy settings on social networking sites.
 Research should be carried out
 Self-regulation.
 Skill improvement of IOs/prosecuting and judicial officers.
 Taught Children about the harms and ways to counter it.
Thank You
 " SEC RITY IS NOT COMPLETE WITHOUT 'U' "
S.Balu , Addl.SP. (Retd)/
Adviser-Admin & PR,
HAND IN HAND INDIA.
Cell : +91 9841013541
E-mail : baluacp@gmail.com

More Related Content

What's hot

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
9945446746
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
Anish Rai
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
Nasir Bhutta
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Deepak Bhojwani
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
PravinGhosekar
 
Cyber law
Cyber lawCyber law
Cyber law
abiabel
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
Col Mukteshwar Prasad
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
Abdul Rehman
 

What's hot (19)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 

Viewers also liked

Briefing for fad
Briefing for fadBriefing for fad
Briefing for fadBilbranchen
 
Se legal foss makassar
Se legal foss makassarSe legal foss makassar
Se legal foss makassar
Muchammad Sholeh
 
Tugas topik - topik lanjutan ke 1
Tugas topik - topik lanjutan ke 1Tugas topik - topik lanjutan ke 1
Tugas topik - topik lanjutan ke 1
Marchsun Tjahyadi
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
Muchammad Sholeh
 
Teknologi Informasi dan Komunikasi BAB 5
Teknologi Informasi dan Komunikasi BAB 5Teknologi Informasi dan Komunikasi BAB 5
Teknologi Informasi dan Komunikasi BAB 5
rahmapuji9b21
 
Lev vigotsky por Elizabeth Sarango
Lev vigotsky por Elizabeth SarangoLev vigotsky por Elizabeth Sarango
Lev vigotsky por Elizabeth Sarango
Elizabeth Sarango
 
Epistolie Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)
Epistolie  Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)Epistolie  Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)
Epistolie Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)Daniel Dorobantu
 

Viewers also liked (8)

Briefing for fad
Briefing for fadBriefing for fad
Briefing for fad
 
Se legal foss makassar
Se legal foss makassarSe legal foss makassar
Se legal foss makassar
 
Tugas topik - topik lanjutan ke 1
Tugas topik - topik lanjutan ke 1Tugas topik - topik lanjutan ke 1
Tugas topik - topik lanjutan ke 1
 
Web Application Hacking
Web Application HackingWeb Application Hacking
Web Application Hacking
 
Teknologi Informasi dan Komunikasi BAB 5
Teknologi Informasi dan Komunikasi BAB 5Teknologi Informasi dan Komunikasi BAB 5
Teknologi Informasi dan Komunikasi BAB 5
 
Lev vigotsky por Elizabeth Sarango
Lev vigotsky por Elizabeth SarangoLev vigotsky por Elizabeth Sarango
Lev vigotsky por Elizabeth Sarango
 
Презентация Academ live
Презентация Academ liveПрезентация Academ live
Презентация Academ live
 
Epistolie Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)
Epistolie  Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)Epistolie  Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)
Epistolie Pentru Cinstire Patimilor Mantuitorului Pe Drumul Crucii (Def)
 

Similar to Htc itmr 30-05-13

Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
xosap
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
Mahua Narayan
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Bi
BiBi
Social engineering
Social engineeringSocial engineering
Social engineering
Alexander Zhuravlev
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
AVISHITYAGI
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
czarviscayno
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
GogoOmolloFrancis
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
KavithaK23
 
Cyber security laws
Cyber security lawsCyber security laws

Similar to Htc itmr 30-05-13 (20)

Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Bi
BiBi
Bi
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Recently uploaded

B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 

Recently uploaded (20)

B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 

Htc itmr 30-05-13

  • 2. Background  SNSs-Facebook, Orkut, Twitter, Friendster, MySpace, Hi5, etc.  Virtual community- People standoffish- New privacy settings -  Criminals exploit –Inactiveness of the account - Poor security for information in social networking forum- Personal lives of people are publicly discussed- Greater damage.
  • 3. Privacy  Right to control one’s personal information,  Ability to determine how that information should be obtained and used.  Right to Privacy is an implied right under Fundamental Rights.  The Supreme Court of India Spelt out from the provision of Article 21 which deals with the right to life and liberty.  Its application vis-à-vis internet content has not yet been directly clarified by a judicial ruling.
  • 4. ITAA-2008-Protecting Privacy.  Sections 43 A/ 72A for privacy issues.  Section 43A- Sensitive Information/Reasonable Security Practice by the data handlers-Compensation from the body corporate that has been negligent.  Section 72A -A person including an intermediary could be held liable if he discloses “sensitive information” which he accessed while providing services under a contract. Continued.,
  • 5. ITAA-2008-Encroaching privacy.  Sections 69/ 69B encroach upon the right to privacy.  Section 69 of the amended Act empowers the state to issue directions for interception, monitoring, decryption of any information through any computer resource.  Section 69B empowers the Government the authority to monitor, collect traffic data or information through any computer resource for cyber security
  • 6. Privacy and security  The security and privacy issues are entirely two different beasts.  A security issue occurs when a hacker gains unauthorized access to a site’s protected coding or written language.  Privacy issues are those involving the unwarranted access to the private information which doesn’t necessarily have to involve security breaches.  But both types of breaches are often intertwined on social networks, especially since anyone who breaches a site’s security network opens the door for easy access to private information belonging to any user.
  • 7. Youth culture.  They may not always know what is appropriate, factual, or legal for them to view or use.  A youth who has grown up with computers, other IT devices and the Internet may be developing different standards for behaving “online” as opposed to when they are “offline”, because they are interacting more via cyberspace, where social sanctions are not clearly defined or consistently sanctioned as they are in the real world.  Concerns about youth creating fake profiles in order to carry out harmful activities online or, conversely, to protect their real identities are also increasing along with social networking popularity lying about one’s age.
  • 8. Data Protection by Corporations  Social networking fraud. These sites create exponential networks and allow tapping into other people’s network and their friends’ networks. -  The most common method for obtaining personal information is social engineering. Once personal information is provided to an unscrupulous company or person, it is difficult to regain control of the information.  Justification for restricting employee Internet access to social networking sites in an organization- for the following reasons :virus or spyware prevention-employee productivity drain-bandwidth concerns- liability issues
  • 9. Security Measures.  Users can also block specific Facebook users . Facebook also limits the ability of search-site Web crawlers to harvest user information.  A new option has also been introduced by Facebook where a user who logs in from a different computer is asked for authorization.  This login is notified to the registered email of the Facebook user. So if the account is hacked or an unknown user logs in, the information of such an access is instantaneously sent on the registered email.
  • 10. ITAA-2008-0FFENCES.  Jurisdiction under IT Act, 2008 extends to persons outside India and persons who are not citizens of India provided at least one computer situated in India has been used in the commission of the offence. That is the reason why they have adopted two distinct provisions relating to jurisdiction, in Section 1(2) and Section 75.  Section 66: This Section is attracted when the imposter fraudulently and dishonestly with ulterior motive uses the fake profiles to spread spam or viruses or commit data theft Continued.,
  • 11.  Section 66A: When the imposter posts offensive or menacing information on the fake profile concerning the person in whose name the profile is created. Further, the fake profile also misleads the recipient about the origin of the Message posted..  Section 66C: When the imposter uses the unique identification feature of the real person like his/her photograph and other personal details to create a fake profile, the offence under Section 66C Information Technology Act is attracted  Section 66D: When the imposter personates the real person by means of a fake profile and cheats then the provision of Section 66D is attracted . Continued.,
  • 12.  Section 79 An intermediary shall not be liable for any third party information data or communication link made available or hosted by him if; (a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted; (b) the intermediary does not initiate the transmission or select the receiver of the transmission and select or modify the information contained in the transmission; (c) the intermediary observes due diligence while discharging his duties. Continued.,
  • 13.  Section 85 Every person who, at the time of the contravention, was in charge of and was responsible for the conduct of the business of the company would be guilty of the contravention.  Not liable if he proves that the contravention took place without his knowledge/ he exercised all due diligence to prevent the contravention  . “Body corporate” has been defined as any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities. Thus, government agencies and nonprofit organizations are entirely excluded from the ambit of this section.
  • 14. Conclusion and Suggestions  Adequate amount of caution/ common sense.  Anti-Phishing Working Group (APWG).  Anti-spam reputation systems.  Awareness-raising/educational campaigns by users/Sites.  Cross reference verification by social networking websites.  Cyber Crime Insurance Programme.  Discover trends to prevent future harm.  Effective enforcement of laws  Encouragement for “Security Culture” in the community. Continued.,
  • 15.  External auditors for updating knowledge/ procedures.  ICP should be made liable and not the ISP.  Information Security Auditors in the organization.  Introduce IPv6 for IPv4 for better monitoring and security.  Pop-up confirmation.  Read and understand documents.  Regularly check your privacy settings on social networking sites.  Research should be carried out  Self-regulation.  Skill improvement of IOs/prosecuting and judicial officers.  Taught Children about the harms and ways to counter it.
  • 16. Thank You  " SEC RITY IS NOT COMPLETE WITHOUT 'U' " S.Balu , Addl.SP. (Retd)/ Adviser-Admin & PR, HAND IN HAND INDIA. Cell : +91 9841013541 E-mail : baluacp@gmail.com