Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
HOW TO PROTECT YOURSELF
          IN
     CYBER WORLD?

          Adv. Dipak G. Parmar
          B. Com., LL. M. , C. S. (...
   Pre 1990: People are not connected

   1990: Connecting People to Information

   2000: Connecting People to People
...
   We are now living in e-world… dominated by
    numbers of “e”.

   e-friend…e-music…e-network…e-ticket…
    e-book......
Cyberspace is the electronic medium of computer
  networks, in which online communication takes
  place.
 Now, the term h...
Characteristics of Cyberspace
    Cyber space is an intangible and provides an
    extreme mobility
     Events taking p...
Characteristics of Cyberspace
   Cyber space has Complete disrespect for national
    boundaries.
     A person in India...
Characteristics of Cyberspace

   Cyber space is absolutely open to participation by
    all.
            A ten year-old...
On the Internet,
      Nobody Knows You're a Dog.
   Cyber space offers enormous potential for
    anonymity to its membe...
ONLINE PREDATORS
    Online predators do exist and are a very real
    threat for our children.

    An online predator ...
Targets of Online Predators

Children that are
 Technically more savvy than their parents

  or
 emotionally vulnerable ...
Elliott McDermott, 19, Internet Predator, who exploited
   Facebook to meet young girls so he could rape and abuse
   them...
Learning: How to avoid predators?
1. Do not give out identifying information such as name, home
   address, school name or...
Cyber-Bullying
What is Cyber-bullying?
  Cyber-bullying is defined as the use of
  technology, such as the Internet or te...
Cyber-Bullying affects real lives
Cyber-bullying had been likened to a “nuclear
attack'' on a person's feelings and reput...
Cyber-Bullying affects real lives
The Social pressure of Cyber-bullying can lead to
  suicide , such was the case for thes...
Video: A Cyber Bullying Suicide
Story -- Ryan Halligan age 13
http://www.youtube.com/watch?v=E1LG9NymhTE&
  feature=BFa&li...
Learning: Cyber-Bullying
1. Being bullied...immediately inform to your
  parents, school authority and, if needed, the loc...
Pornography
     Publishing, transmitting of any pornography
    material in electronic form is an offence under
    the ...
TOI dated 05-09-09 page 11
TOI dated 18-08-09 pg 7   TOI dated 31-08-09 pg 10
                                   Copyright...
Hackers had used the illegally taped peephole video of Erin Andrews as
a lure to infect user machine with malware.

      ...
JNU MMS
  Abha Kumar, 25, (name changed) clicked semi-nude
  pictures of herself and sent them to her commitment-
  phobic...
Learning: Pornography
1. Do not visit porn site. You end up downloading
  virus.
2. Do not transmit(share) porn.
3. Do not...
Digital content (software, movies, songs, pictures
content etc) is particularly vulnerable to piracy
because making and sh...
Digital Piracy
   India was the fourth largest downloader behind
    US, Britain and Canada.

    “Free-to-user” appeal ...
Emmanuel Nimley
 jailed for six months:
 recorded the latest
 releases on his phone
 and put them on a film
 piracy websit...
Learning: Digital Piracy
1. Do not upload copyrighted materials of others
  (software, movies, songs, pictures content etc...
1.    Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws
      (http://www.asianlaws.org/library/c...
Thank You

Adv. Dipak G. Parmar
B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law

    Founder, Cybe...
How to protect yourself in e world?
How to protect yourself in e world?
Upcoming SlideShare
Loading in …5
×

of

How to protect yourself in e world?  Slide 1 How to protect yourself in e world?  Slide 2 How to protect yourself in e world?  Slide 3 How to protect yourself in e world?  Slide 4 How to protect yourself in e world?  Slide 5 How to protect yourself in e world?  Slide 6 How to protect yourself in e world?  Slide 7 How to protect yourself in e world?  Slide 8 How to protect yourself in e world?  Slide 9 How to protect yourself in e world?  Slide 10 How to protect yourself in e world?  Slide 11 How to protect yourself in e world?  Slide 12 How to protect yourself in e world?  Slide 13 How to protect yourself in e world?  Slide 14 How to protect yourself in e world?  Slide 15 How to protect yourself in e world?  Slide 16 How to protect yourself in e world?  Slide 17 How to protect yourself in e world?  Slide 18 How to protect yourself in e world?  Slide 19 How to protect yourself in e world?  Slide 20 How to protect yourself in e world?  Slide 21 How to protect yourself in e world?  Slide 22 How to protect yourself in e world?  Slide 23 How to protect yourself in e world?  Slide 24 How to protect yourself in e world?  Slide 25 How to protect yourself in e world?  Slide 26 How to protect yourself in e world?  Slide 27 How to protect yourself in e world?  Slide 28 How to protect yourself in e world?  Slide 29 How to protect yourself in e world?  Slide 30
Upcoming SlideShare
Neoleading in an e world
Next
Download to read offline and view in fullscreen.

0 Likes

Share

Download to read offline

How to protect yourself in e world?

Download to read offline

Target audience: grade 5 & above students and all parents

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

How to protect yourself in e world?

  1. 1. HOW TO PROTECT YOURSELF IN CYBER WORLD? Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Copyright Dipak G. Parmar 1 Meant for educational purpose only 18/09/2012
  2. 2.  Pre 1990: People are not connected  1990: Connecting People to Information  2000: Connecting People to People  2010: Everything is connected
  3. 3.  We are now living in e-world… dominated by numbers of “e”.  e-friend…e-music…e-network…e-ticket… e-book... e-learning... e-commerce…  In my opinion, right to life includes right to e-life.
  4. 4. Cyberspace is the electronic medium of computer networks, in which online communication takes place.  Now, the term has become a conventional means to describe anything associated with computers, information technology, the Internet and the diverse Internet culture.  Cyberspace includes – The Internet, websites – Computers, networks – Software, data storage devices, emails – Electronic devices (cell phones, ATM machines etc)
  5. 5. Characteristics of Cyberspace  Cyber space is an intangible and provides an extreme mobility  Events taking place on the Internet are not happening in the locations where participants or servers are physically located, but "in cyberspace".
  6. 6. Characteristics of Cyberspace  Cyber space has Complete disrespect for national boundaries.  A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer/mobile with the Internet connection.
  7. 7. Characteristics of Cyberspace  Cyber space is absolutely open to participation by all.  A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  8. 8. On the Internet, Nobody Knows You're a Dog.  Cyber space offers enormous potential for anonymity to its members.  A classic sting operation led by William Swallow, an FBI Agent, to identify and arrest malicious hackers.  During 18-month sting operation, Swallow and his team gathered critical evidence on several people , including “Mafiaboy”, the 17-year-old hacker who plead guilty to 58 charges related to a series of DOS attacks in Feb 2000 against companies such Amazon.com, eBay and Yahoo.
  9. 9. ONLINE PREDATORS  Online predators do exist and are a very real threat for our children.  An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes.  They target both boys and girls of all ages and use the anonymity of the Internet to their advantage since they can be whomever they want.
  10. 10. Targets of Online Predators Children that are  Technically more savvy than their parents or  emotionally vulnerable which can be related to personal issues derived from problems at school or home.
  11. 11. Elliott McDermott, 19, Internet Predator, who exploited Facebook to meet young girls so he could rape and abuse them was described as "every parent's worst nightmare" as he was jailed for six years on July 1, 2012 by the UK Court.
  12. 12. Learning: How to avoid predators? 1. Do not give out identifying information such as name, home address, school name or telephone number in a chat room 2. Do not send your photograph to any one on the Net without initially checking with the parent or guardian. 3. Do not respond to messages or bulletin board items that are obscene, belligerent or threatening. 4. Never arrange a face to face meeting without informing your parent or guardian. 5. Remember that people online may not be who they seem to be. (On the Internet, Nobody Knows You're a Dog.) Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department, Mumbai http://cybercellmumbai.gov.in/html/general-tips/tips-for-children.html
  13. 13. Cyber-Bullying What is Cyber-bullying?  Cyber-bullying is defined as the use of technology, such as the Internet or text messaging to post derogatory or hateful material about another.  Cyber-bullying is often anonymous...Victims does not know who is bullying them.
  14. 14. Cyber-Bullying affects real lives Cyber-bullying had been likened to a “nuclear attack'' on a person's feelings and reputation. Unlike traditional bullying, the humiliation of cyber- bullying could be broadcast to hundreds of peers with the touch of a button.  Professor Donna Cross.Director of the Child Health Promotion Research Centre, Australia  Effects included poorer mental health, such as higher levels of depression, anxiety, and suicidal ideation.
  15. 15. Cyber-Bullying affects real lives The Social pressure of Cyber-bullying can lead to suicide , such was the case for these victims. Megan Meier, 13 Ryan Halligan, 13
  16. 16. Video: A Cyber Bullying Suicide Story -- Ryan Halligan age 13 http://www.youtube.com/watch?v=E1LG9NymhTE& feature=BFa&list=PL26C72EA6DE0A815A
  17. 17. Learning: Cyber-Bullying 1. Being bullied...immediately inform to your parents, school authority and, if needed, the local Police station . 2. Being by-stander, do not laugh... Raise your voice against it. Report the same to your school authority. 3.Think before you click.... just because its online... does not means those words do not hurt. You may be criminally liable for your act.
  18. 18. Pornography  Publishing, transmitting of any pornography material in electronic form is an offence under the Indian Information Technology Act, 2000.  As per the amended Information Technology Act, 2000, it is illegal to even viewing and possessing the child pornography.
  19. 19. TOI dated 05-09-09 page 11 TOI dated 18-08-09 pg 7 TOI dated 31-08-09 pg 10 Copyright Dipak G. Parmar Meant for educational purpose only 21
  20. 20. Hackers had used the illegally taped peephole video of Erin Andrews as a lure to infect user machine with malware. Times of India dated 22-07-2009 page 7 Copyright Dipak G. Parmar Meant for educational purpose only 22
  21. 21. JNU MMS Abha Kumar, 25, (name changed) clicked semi-nude pictures of herself and sent them to her commitment- phobic boyfriend without realising that the Internet is not a very safe place for naked pictures of a woman. One click and you are a porn star. In the recent JNU, MMS scandal, the man who circulated the MMS of his girlfriend was apparently doing this to seek revenge from her.
  22. 22. Learning: Pornography 1. Do not visit porn site. You end up downloading virus. 2. Do not transmit(share) porn. 3. Do not view or possess child porn. 4. Do not allow any person, even your so called best friend, to click or record when you in comprised position. 5. Do not share your nude photo/video to other. 6. Avoid the Internet when you are ANGRY.
  23. 23. Digital content (software, movies, songs, pictures content etc) is particularly vulnerable to piracy because making and sharing (or selling) copies is easy and inexpensive. Internet is the world’s biggest copy machine. -See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Copyright Dipak G. Parmar Meant for educational purpose only 01/08/2010 25
  24. 24. Digital Piracy  India was the fourth largest downloader behind US, Britain and Canada.  “Free-to-user” appeal of illegal file-sharing that creates its unfair advantage over legitimate music services.  Although, copyright piracy is a crime but end- users under the “free-to-user” concept’s influence does not perceived it as a crime.
  25. 25. Emmanuel Nimley jailed for six months: recorded the latest releases on his phone and put them on a film piracy website.
  26. 26. Learning: Digital Piracy 1. Do not upload copyrighted materials of others (software, movies, songs, pictures content etc) without permission. 2. Do not download copyrighted material from unauthorised source. You end up downloading virus, apart from being criminally liable for unauthorised downloading and violating copyright.
  27. 27. 1. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) 2. A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) 3. “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). 4. Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation- 5162852 Accessed on 13-09-2010) 5. LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on http://in.news.yahoo.com/lights-camera-sleaze.html (Accessed on 16-09-2012) 6. Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark ruling, MailOnline and available on http://www.dailymail.co.uk/news/article-1313016/Graduate-used- iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012) 7. Cyber Bullying Awareness Video, created By: Tyler. S and available on http://www.youtube.com/watch?v=PZvc2OZm8f8&feature=player_embedded (Accessed on 16-09-2012) 8. Internet predator, 19, who raped girls is 'every parent's worst nightmare' http://www.telegraph.co.uk/technology/facebook/9371220/Internet-predator-19-who-raped-girls-is- every-parents-worst-nightmare.html (Accessed on 16-09-2012) 9. http://www.unc.edu/depts/jomc/academics/dri/idog.html (Accessed on 17-09-2012) 10. http://www.maskmatters.org (Accessed on 16-09-2012) 11. Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09- 2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
  28. 28. Thank You Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Dipak@Cyber-IPR.com 09820196971

Target audience: grade 5 & above students and all parents

Views

Total views

459

On Slideshare

0

From embeds

0

Number of embeds

3

Actions

Downloads

4

Shares

0

Comments

0

Likes

0

×