SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
HOW TO PROTECT YOURSELF
          IN
     CYBER WORLD?

          Adv. Dipak G. Parmar
          B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law


                   Founder, Cyber-IPR

                Copyright Dipak G. Parmar
                                                                         1
            Meant for educational purpose only         18/09/2012
   Pre 1990: People are not connected

   1990: Connecting People to Information

   2000: Connecting People to People

   2010: Everything is connected
How to protect yourself in e world?
How to protect yourself in e world?
   We are now living in e-world… dominated by
    numbers of “e”.

   e-friend…e-music…e-network…e-ticket…
    e-book... e-learning... e-commerce…

   In my opinion, right to life includes right to e-life.
Cyberspace is the electronic medium of computer
  networks, in which online communication takes
  place.
 Now, the term has become a conventional means
  to describe anything associated with computers,
  information technology, the Internet and the
  diverse Internet culture.
 Cyberspace includes
 –   The Internet, websites
 –   Computers, networks
 –   Software, data storage devices, emails
 –   Electronic devices (cell phones, ATM machines etc)
Characteristics of Cyberspace
    Cyber space is an intangible and provides an
    extreme mobility
     Events taking place on the Internet are not happening in
    the locations where participants or servers are physically
    located, but "in cyberspace".
Characteristics of Cyberspace
   Cyber space has Complete disrespect for national
    boundaries.
     A person in India could break into a bank’s electronic
    vault hosted on a computer in USA and transfer millions of
    Rupees to another bank in Switzerland, all within minutes.
    All he would need is a laptop computer/mobile with the
    Internet connection.
Characteristics of Cyberspace

   Cyber space is absolutely open to participation by
    all.
            A ten year-old to an eighty year-old grand
           mother without any regard for the distance or the
           anonymity between them.
On the Internet,
      Nobody Knows You're a Dog.
   Cyber space offers enormous potential for
    anonymity to its members.

   A classic sting operation led by William Swallow, an FBI
    Agent, to identify and arrest malicious hackers.

   During 18-month sting operation, Swallow and his team
    gathered critical evidence on several people , including
    “Mafiaboy”, the 17-year-old hacker who plead guilty to 58
    charges related to a series of DOS attacks in Feb 2000
    against companies such Amazon.com, eBay and Yahoo.
ONLINE PREDATORS
    Online predators do exist and are a very real
    threat for our children.

    An online predator is an adult Internet user who
    exploits vulnerable children or teens, usually for
    sexual or other abusive purposes.

    They target both boys and girls of all ages and use
    the anonymity of the Internet to their advantage
    since they can be whomever they want.
Targets of Online Predators

Children that are
 Technically more savvy than their parents

  or
 emotionally vulnerable which can be

  related to personal issues derived from
  problems at school or home.
Elliott McDermott, 19, Internet Predator, who exploited
   Facebook to meet young girls so he could rape and abuse
   them was described as "every parent's worst nightmare" as
   he was jailed for six years on July 1, 2012 by the UK Court.
Learning: How to avoid predators?
1. Do not give out identifying information such as name, home
   address, school name or telephone number in a chat room
2. Do not send your photograph to any one on the Net without
   initially checking with the parent or guardian.
3. Do not respond to messages or bulletin board items that are
   obscene, belligerent or threatening.
4. Never arrange a face to face meeting without informing your
   parent or guardian.
5. Remember that people online may not be who they seem to
   be. (On the Internet, Nobody Knows You're a Dog.)
Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department,
   Mumbai http://cybercellmumbai.gov.in/html/general-tips/tips-for-children.html
Cyber-Bullying
What is Cyber-bullying?
  Cyber-bullying is defined as the use of
  technology, such as the Internet or text
  messaging to post derogatory or hateful material
  about another.

    Cyber-bullying is often anonymous...Victims
    does not know who is bullying them.
Cyber-Bullying affects real lives
Cyber-bullying had been likened to a “nuclear
attack'' on a person's feelings and reputation.

Unlike traditional bullying, the humiliation of cyber-
bullying could be broadcast to hundreds of peers
with the touch of a button.
                Professor Donna Cross.Director of the Child Health
                Promotion Research Centre, Australia
 Effects included poorer mental health, such as
higher levels of depression, anxiety, and suicidal
ideation.
Cyber-Bullying affects real lives
The Social pressure of Cyber-bullying can lead to
  suicide , such was the case for these victims.




 Megan Meier, 13           Ryan Halligan, 13
Video: A Cyber Bullying Suicide
Story -- Ryan Halligan age 13
http://www.youtube.com/watch?v=E1LG9NymhTE&
  feature=BFa&list=PL26C72EA6DE0A815A
Learning: Cyber-Bullying
1. Being bullied...immediately inform to your
  parents, school authority and, if needed, the local
  Police station .
2. Being by-stander, do not laugh... Raise your
  voice against it. Report the same to your school
  authority.
3.Think before you click.... just because its online...
  does not means those words do not hurt. You
  may be criminally liable for your act.
Pornography
     Publishing, transmitting of any pornography
    material in electronic form is an offence under
    the Indian Information Technology Act, 2000.

    As per the amended Information Technology
    Act, 2000, it is illegal to even viewing and
    possessing the child pornography.
TOI dated 05-09-09 page 11
TOI dated 18-08-09 pg 7   TOI dated 31-08-09 pg 10
                                   Copyright Dipak G. Parmar
                                Meant for educational purpose only                           21
Hackers had used the illegally taped peephole video of Erin Andrews as
a lure to infect user machine with malware.

                            Times of India dated 22-07-2009 page 7
                       Copyright Dipak G. Parmar
                    Meant for educational purpose only               22
JNU MMS
  Abha Kumar, 25, (name changed) clicked semi-nude
  pictures of herself and sent them to her commitment-
  phobic boyfriend without realising that the Internet is
  not a very safe place for naked pictures of a woman. One
  click and you are a porn star.

In the recent JNU, MMS scandal, the man who circulated
  the MMS of his girlfriend was apparently doing this to
  seek revenge from her.
Learning: Pornography
1. Do not visit porn site. You end up downloading
  virus.
2. Do not transmit(share) porn.
3. Do not view or possess child porn.
4. Do not allow any person, even your so called best
  friend, to click or record when you in comprised
  position.
5. Do not share your nude photo/video to other.
6. Avoid the Internet when you are ANGRY.
Digital content (software, movies, songs, pictures
content etc) is particularly vulnerable to piracy
because making and sharing (or selling) copies is
easy and inexpensive.

Internet is the world’s biggest copy machine.
      -See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).




                                                            Copyright Dipak G. Parmar
                                                    Meant for educational purpose only   01/08/2010   25
Digital Piracy
   India was the fourth largest downloader behind
    US, Britain and Canada.

    “Free-to-user” appeal of illegal file-sharing that creates its unfair
    advantage over legitimate music services.

   Although, copyright piracy is a crime but end-
    users under the “free-to-user” concept’s
    influence does not perceived it as a crime.
Emmanuel Nimley
 jailed for six months:
 recorded the latest
 releases on his phone
 and put them on a film
 piracy website.
Learning: Digital Piracy
1. Do not upload copyrighted materials of others
  (software, movies, songs, pictures content etc)
  without permission.
2. Do not download copyrighted material from
  unauthorised source. You end up downloading
  virus, apart from being criminally liable for
  unauthorised    downloading     and    violating
  copyright.
1.    Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws
      (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009)
2.    A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by
      Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007)
3.    “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
4.    Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing
      business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-
      5162852 Accessed on 13-09-2010)
5.     LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on
      http://in.news.yahoo.com/lights-camera-sleaze.html (Accessed on 16-09-2012)
6.    Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark
      ruling, MailOnline and available on http://www.dailymail.co.uk/news/article-1313016/Graduate-used-
      iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012)
7.    Cyber Bullying Awareness Video, created By: Tyler. S and available on
      http://www.youtube.com/watch?v=PZvc2OZm8f8&feature=player_embedded (Accessed on 16-09-2012)
8.    Internet predator, 19, who raped girls is 'every parent's worst nightmare'
      http://www.telegraph.co.uk/technology/facebook/9371220/Internet-predator-19-who-raped-girls-is-
      every-parents-worst-nightmare.html (Accessed on 16-09-2012)
9.    http://www.unc.edu/depts/jomc/academics/dri/idog.html (Accessed on 17-09-2012)
10.   http://www.maskmatters.org (Accessed on 16-09-2012)
11.   Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-
      2010)
      http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
Thank You

Adv. Dipak G. Parmar
B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law

    Founder, Cyber-IPR
          Dipak@Cyber-IPR.com
              09820196971

Mais conteúdo relacionado

Mais procurados

Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Rajeev Ranjan
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Dan Lohrmann
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Stevecd
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseOllie Bray
 
Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1Mneill34
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 

Mais procurados (20)

Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...Online safety and security 7 golden rules how to save your child from cyber c...
Online safety and security 7 golden rules how to save your child from cyber c...
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
 
Legalissues
LegalissuesLegalissues
Legalissues
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
SLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible UseSLF 2008 - Internet Safety snd Responsible Use
SLF 2008 - Internet Safety snd Responsible Use
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Copyright
CopyrightCopyright
Copyright
 
Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1Copyright And Ethics On The Internet1
Copyright And Ethics On The Internet1
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 

Destaque

Neoleading in an e world
Neoleading in an e worldNeoleading in an e world
Neoleading in an e worldNathan Campbell
 
Knowledge Transfer in The E-World
Knowledge Transfer in The E-WorldKnowledge Transfer in The E-World
Knowledge Transfer in The E-WorldKemal Sahin
 
Field Study 3 Episode 7
Field Study 3 Episode 7Field Study 3 Episode 7
Field Study 3 Episode 7Jundel Deliman
 
Field study 3
Field study 3Field study 3
Field study 3lorne27
 
Fs3 episode 6- sarah jane cabilino
Fs3 episode 6- sarah jane cabilinoFs3 episode 6- sarah jane cabilino
Fs3 episode 6- sarah jane cabilinoSarah Cabilino
 

Destaque (8)

Neoleading in an e world
Neoleading in an e worldNeoleading in an e world
Neoleading in an e world
 
Knowledge Transfer in The E-World
Knowledge Transfer in The E-WorldKnowledge Transfer in The E-World
Knowledge Transfer in The E-World
 
Myporfolio Jen
Myporfolio JenMyporfolio Jen
Myporfolio Jen
 
Max Weber
Max WeberMax Weber
Max Weber
 
Field Study 3 Episode 7
Field Study 3 Episode 7Field Study 3 Episode 7
Field Study 3 Episode 7
 
Field study 3
Field study 3Field study 3
Field study 3
 
Fs3 episode 6- sarah jane cabilino
Fs3 episode 6- sarah jane cabilinoFs3 episode 6- sarah jane cabilino
Fs3 episode 6- sarah jane cabilino
 
Fs 3
Fs 3Fs 3
Fs 3
 

Semelhante a How to protect yourself in e world?

cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Computer Ethics And Information Systems
Computer Ethics And Information SystemsComputer Ethics And Information Systems
Computer Ethics And Information SystemsMandy Froemming
 
Disadvantages Of Cyber Crime
Disadvantages Of Cyber CrimeDisadvantages Of Cyber Crime
Disadvantages Of Cyber CrimePay For Paper UK
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in iHassan Nasir
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 

Semelhante a How to protect yourself in e world? (20)

Cyber-Crime Is A Serious Problem Essay Examples
Cyber-Crime Is A Serious Problem Essay ExamplesCyber-Crime Is A Serious Problem Essay Examples
Cyber-Crime Is A Serious Problem Essay Examples
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer Ethics And Information Systems
Computer Ethics And Information SystemsComputer Ethics And Information Systems
Computer Ethics And Information Systems
 
Cybercrime And Its Effect On The Youth
Cybercrime And Its Effect On The YouthCybercrime And Its Effect On The Youth
Cybercrime And Its Effect On The Youth
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Piracy Essay
Internet Piracy EssayInternet Piracy Essay
Internet Piracy Essay
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Advantages And Disadvantages Of Cyber Crime
Advantages And Disadvantages Of Cyber CrimeAdvantages And Disadvantages Of Cyber Crime
Advantages And Disadvantages Of Cyber Crime
 
Persuasive Essay On Cybercrime
Persuasive Essay On CybercrimePersuasive Essay On Cybercrime
Persuasive Essay On Cybercrime
 
Disadvantages Of Cyber Crime
Disadvantages Of Cyber CrimeDisadvantages Of Cyber Crime
Disadvantages Of Cyber Crime
 
Essay On CyberCrime
Essay On CyberCrimeEssay On CyberCrime
Essay On CyberCrime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Digital Safety
Digital SafetyDigital Safety
Digital Safety
 
Cyber Security Threats And Crimes
Cyber Security Threats And CrimesCyber Security Threats And Crimes
Cyber Security Threats And Crimes
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 

How to protect yourself in e world?

  • 1. HOW TO PROTECT YOURSELF IN CYBER WORLD? Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Copyright Dipak G. Parmar 1 Meant for educational purpose only 18/09/2012
  • 2. Pre 1990: People are not connected  1990: Connecting People to Information  2000: Connecting People to People  2010: Everything is connected
  • 5. We are now living in e-world… dominated by numbers of “e”.  e-friend…e-music…e-network…e-ticket… e-book... e-learning... e-commerce…  In my opinion, right to life includes right to e-life.
  • 6. Cyberspace is the electronic medium of computer networks, in which online communication takes place.  Now, the term has become a conventional means to describe anything associated with computers, information technology, the Internet and the diverse Internet culture.  Cyberspace includes – The Internet, websites – Computers, networks – Software, data storage devices, emails – Electronic devices (cell phones, ATM machines etc)
  • 7. Characteristics of Cyberspace  Cyber space is an intangible and provides an extreme mobility  Events taking place on the Internet are not happening in the locations where participants or servers are physically located, but "in cyberspace".
  • 8. Characteristics of Cyberspace  Cyber space has Complete disrespect for national boundaries.  A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer/mobile with the Internet connection.
  • 9. Characteristics of Cyberspace  Cyber space is absolutely open to participation by all.  A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  • 10. On the Internet, Nobody Knows You're a Dog.  Cyber space offers enormous potential for anonymity to its members.  A classic sting operation led by William Swallow, an FBI Agent, to identify and arrest malicious hackers.  During 18-month sting operation, Swallow and his team gathered critical evidence on several people , including “Mafiaboy”, the 17-year-old hacker who plead guilty to 58 charges related to a series of DOS attacks in Feb 2000 against companies such Amazon.com, eBay and Yahoo.
  • 11. ONLINE PREDATORS  Online predators do exist and are a very real threat for our children.  An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes.  They target both boys and girls of all ages and use the anonymity of the Internet to their advantage since they can be whomever they want.
  • 12. Targets of Online Predators Children that are  Technically more savvy than their parents or  emotionally vulnerable which can be related to personal issues derived from problems at school or home.
  • 13. Elliott McDermott, 19, Internet Predator, who exploited Facebook to meet young girls so he could rape and abuse them was described as "every parent's worst nightmare" as he was jailed for six years on July 1, 2012 by the UK Court.
  • 14. Learning: How to avoid predators? 1. Do not give out identifying information such as name, home address, school name or telephone number in a chat room 2. Do not send your photograph to any one on the Net without initially checking with the parent or guardian. 3. Do not respond to messages or bulletin board items that are obscene, belligerent or threatening. 4. Never arrange a face to face meeting without informing your parent or guardian. 5. Remember that people online may not be who they seem to be. (On the Internet, Nobody Knows You're a Dog.) Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department, Mumbai http://cybercellmumbai.gov.in/html/general-tips/tips-for-children.html
  • 15. Cyber-Bullying What is Cyber-bullying?  Cyber-bullying is defined as the use of technology, such as the Internet or text messaging to post derogatory or hateful material about another.  Cyber-bullying is often anonymous...Victims does not know who is bullying them.
  • 16. Cyber-Bullying affects real lives Cyber-bullying had been likened to a “nuclear attack'' on a person's feelings and reputation. Unlike traditional bullying, the humiliation of cyber- bullying could be broadcast to hundreds of peers with the touch of a button.  Professor Donna Cross.Director of the Child Health Promotion Research Centre, Australia  Effects included poorer mental health, such as higher levels of depression, anxiety, and suicidal ideation.
  • 17. Cyber-Bullying affects real lives The Social pressure of Cyber-bullying can lead to suicide , such was the case for these victims. Megan Meier, 13 Ryan Halligan, 13
  • 18. Video: A Cyber Bullying Suicide Story -- Ryan Halligan age 13 http://www.youtube.com/watch?v=E1LG9NymhTE& feature=BFa&list=PL26C72EA6DE0A815A
  • 19. Learning: Cyber-Bullying 1. Being bullied...immediately inform to your parents, school authority and, if needed, the local Police station . 2. Being by-stander, do not laugh... Raise your voice against it. Report the same to your school authority. 3.Think before you click.... just because its online... does not means those words do not hurt. You may be criminally liable for your act.
  • 20. Pornography  Publishing, transmitting of any pornography material in electronic form is an offence under the Indian Information Technology Act, 2000.  As per the amended Information Technology Act, 2000, it is illegal to even viewing and possessing the child pornography.
  • 21. TOI dated 05-09-09 page 11 TOI dated 18-08-09 pg 7 TOI dated 31-08-09 pg 10 Copyright Dipak G. Parmar Meant for educational purpose only 21
  • 22. Hackers had used the illegally taped peephole video of Erin Andrews as a lure to infect user machine with malware. Times of India dated 22-07-2009 page 7 Copyright Dipak G. Parmar Meant for educational purpose only 22
  • 23. JNU MMS Abha Kumar, 25, (name changed) clicked semi-nude pictures of herself and sent them to her commitment- phobic boyfriend without realising that the Internet is not a very safe place for naked pictures of a woman. One click and you are a porn star. In the recent JNU, MMS scandal, the man who circulated the MMS of his girlfriend was apparently doing this to seek revenge from her.
  • 24. Learning: Pornography 1. Do not visit porn site. You end up downloading virus. 2. Do not transmit(share) porn. 3. Do not view or possess child porn. 4. Do not allow any person, even your so called best friend, to click or record when you in comprised position. 5. Do not share your nude photo/video to other. 6. Avoid the Internet when you are ANGRY.
  • 25. Digital content (software, movies, songs, pictures content etc) is particularly vulnerable to piracy because making and sharing (or selling) copies is easy and inexpensive. Internet is the world’s biggest copy machine. -See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Copyright Dipak G. Parmar Meant for educational purpose only 01/08/2010 25
  • 26. Digital Piracy  India was the fourth largest downloader behind US, Britain and Canada.  “Free-to-user” appeal of illegal file-sharing that creates its unfair advantage over legitimate music services.  Although, copyright piracy is a crime but end- users under the “free-to-user” concept’s influence does not perceived it as a crime.
  • 27. Emmanuel Nimley jailed for six months: recorded the latest releases on his phone and put them on a film piracy website.
  • 28. Learning: Digital Piracy 1. Do not upload copyrighted materials of others (software, movies, songs, pictures content etc) without permission. 2. Do not download copyrighted material from unauthorised source. You end up downloading virus, apart from being criminally liable for unauthorised downloading and violating copyright.
  • 29. 1. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) 2. A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) 3. “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). 4. Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation- 5162852 Accessed on 13-09-2010) 5. LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on http://in.news.yahoo.com/lights-camera-sleaze.html (Accessed on 16-09-2012) 6. Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark ruling, MailOnline and available on http://www.dailymail.co.uk/news/article-1313016/Graduate-used- iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012) 7. Cyber Bullying Awareness Video, created By: Tyler. S and available on http://www.youtube.com/watch?v=PZvc2OZm8f8&feature=player_embedded (Accessed on 16-09-2012) 8. Internet predator, 19, who raped girls is 'every parent's worst nightmare' http://www.telegraph.co.uk/technology/facebook/9371220/Internet-predator-19-who-raped-girls-is- every-parents-worst-nightmare.html (Accessed on 16-09-2012) 9. http://www.unc.edu/depts/jomc/academics/dri/idog.html (Accessed on 17-09-2012) 10. http://www.maskmatters.org (Accessed on 16-09-2012) 11. Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09- 2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
  • 30. Thank You Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Dipak@Cyber-IPR.com 09820196971