1. HOW TO PROTECT YOURSELF
IN
CYBER WORLD?
Adv. Dipak G. Parmar
B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law
Founder, Cyber-IPR
Copyright Dipak G. Parmar
1
Meant for educational purpose only 18/09/2012
2. Pre 1990: People are not connected
1990: Connecting People to Information
2000: Connecting People to People
2010: Everything is connected
5. We are now living in e-world… dominated by
numbers of “e”.
e-friend…e-music…e-network…e-ticket…
e-book... e-learning... e-commerce…
In my opinion, right to life includes right to e-life.
6. Cyberspace is the electronic medium of computer
networks, in which online communication takes
place.
Now, the term has become a conventional means
to describe anything associated with computers,
information technology, the Internet and the
diverse Internet culture.
Cyberspace includes
– The Internet, websites
– Computers, networks
– Software, data storage devices, emails
– Electronic devices (cell phones, ATM machines etc)
7. Characteristics of Cyberspace
Cyber space is an intangible and provides an
extreme mobility
Events taking place on the Internet are not happening in
the locations where participants or servers are physically
located, but "in cyberspace".
8. Characteristics of Cyberspace
Cyber space has Complete disrespect for national
boundaries.
A person in India could break into a bank’s electronic
vault hosted on a computer in USA and transfer millions of
Rupees to another bank in Switzerland, all within minutes.
All he would need is a laptop computer/mobile with the
Internet connection.
9. Characteristics of Cyberspace
Cyber space is absolutely open to participation by
all.
A ten year-old to an eighty year-old grand
mother without any regard for the distance or the
anonymity between them.
10. On the Internet,
Nobody Knows You're a Dog.
Cyber space offers enormous potential for
anonymity to its members.
A classic sting operation led by William Swallow, an FBI
Agent, to identify and arrest malicious hackers.
During 18-month sting operation, Swallow and his team
gathered critical evidence on several people , including
“Mafiaboy”, the 17-year-old hacker who plead guilty to 58
charges related to a series of DOS attacks in Feb 2000
against companies such Amazon.com, eBay and Yahoo.
11. ONLINE PREDATORS
Online predators do exist and are a very real
threat for our children.
An online predator is an adult Internet user who
exploits vulnerable children or teens, usually for
sexual or other abusive purposes.
They target both boys and girls of all ages and use
the anonymity of the Internet to their advantage
since they can be whomever they want.
12. Targets of Online Predators
Children that are
Technically more savvy than their parents
or
emotionally vulnerable which can be
related to personal issues derived from
problems at school or home.
13. Elliott McDermott, 19, Internet Predator, who exploited
Facebook to meet young girls so he could rape and abuse
them was described as "every parent's worst nightmare" as
he was jailed for six years on July 1, 2012 by the UK Court.
14. Learning: How to avoid predators?
1. Do not give out identifying information such as name, home
address, school name or telephone number in a chat room
2. Do not send your photograph to any one on the Net without
initially checking with the parent or guardian.
3. Do not respond to messages or bulletin board items that are
obscene, belligerent or threatening.
4. Never arrange a face to face meeting without informing your
parent or guardian.
5. Remember that people online may not be who they seem to
be. (On the Internet, Nobody Knows You're a Dog.)
Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department,
Mumbai http://cybercellmumbai.gov.in/html/general-tips/tips-for-children.html
15. Cyber-Bullying
What is Cyber-bullying?
Cyber-bullying is defined as the use of
technology, such as the Internet or text
messaging to post derogatory or hateful material
about another.
Cyber-bullying is often anonymous...Victims
does not know who is bullying them.
16. Cyber-Bullying affects real lives
Cyber-bullying had been likened to a “nuclear
attack'' on a person's feelings and reputation.
Unlike traditional bullying, the humiliation of cyber-
bullying could be broadcast to hundreds of peers
with the touch of a button.
Professor Donna Cross.Director of the Child Health
Promotion Research Centre, Australia
Effects included poorer mental health, such as
higher levels of depression, anxiety, and suicidal
ideation.
17. Cyber-Bullying affects real lives
The Social pressure of Cyber-bullying can lead to
suicide , such was the case for these victims.
Megan Meier, 13 Ryan Halligan, 13
18. Video: A Cyber Bullying Suicide
Story -- Ryan Halligan age 13
http://www.youtube.com/watch?v=E1LG9NymhTE&
feature=BFa&list=PL26C72EA6DE0A815A
19. Learning: Cyber-Bullying
1. Being bullied...immediately inform to your
parents, school authority and, if needed, the local
Police station .
2. Being by-stander, do not laugh... Raise your
voice against it. Report the same to your school
authority.
3.Think before you click.... just because its online...
does not means those words do not hurt. You
may be criminally liable for your act.
20. Pornography
Publishing, transmitting of any pornography
material in electronic form is an offence under
the Indian Information Technology Act, 2000.
As per the amended Information Technology
Act, 2000, it is illegal to even viewing and
possessing the child pornography.
21. TOI dated 05-09-09 page 11
TOI dated 18-08-09 pg 7 TOI dated 31-08-09 pg 10
Copyright Dipak G. Parmar
Meant for educational purpose only 21
22. Hackers had used the illegally taped peephole video of Erin Andrews as
a lure to infect user machine with malware.
Times of India dated 22-07-2009 page 7
Copyright Dipak G. Parmar
Meant for educational purpose only 22
23. JNU MMS
Abha Kumar, 25, (name changed) clicked semi-nude
pictures of herself and sent them to her commitment-
phobic boyfriend without realising that the Internet is
not a very safe place for naked pictures of a woman. One
click and you are a porn star.
In the recent JNU, MMS scandal, the man who circulated
the MMS of his girlfriend was apparently doing this to
seek revenge from her.
24. Learning: Pornography
1. Do not visit porn site. You end up downloading
virus.
2. Do not transmit(share) porn.
3. Do not view or possess child porn.
4. Do not allow any person, even your so called best
friend, to click or record when you in comprised
position.
5. Do not share your nude photo/video to other.
6. Avoid the Internet when you are ANGRY.
25. Digital content (software, movies, songs, pictures
content etc) is particularly vulnerable to piracy
because making and sharing (or selling) copies is
easy and inexpensive.
Internet is the world’s biggest copy machine.
-See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
Copyright Dipak G. Parmar
Meant for educational purpose only 01/08/2010 25
26. Digital Piracy
India was the fourth largest downloader behind
US, Britain and Canada.
“Free-to-user” appeal of illegal file-sharing that creates its unfair
advantage over legitimate music services.
Although, copyright piracy is a crime but end-
users under the “free-to-user” concept’s
influence does not perceived it as a crime.
27. Emmanuel Nimley
jailed for six months:
recorded the latest
releases on his phone
and put them on a film
piracy website.
28. Learning: Digital Piracy
1. Do not upload copyrighted materials of others
(software, movies, songs, pictures content etc)
without permission.
2. Do not download copyrighted material from
unauthorised source. You end up downloading
virus, apart from being criminally liable for
unauthorised downloading and violating
copyright.
29. 1. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws
(http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009)
2. A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by
Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007)
3. “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
4. Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing
business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-
5162852 Accessed on 13-09-2010)
5. LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on
http://in.news.yahoo.com/lights-camera-sleaze.html (Accessed on 16-09-2012)
6. Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark
ruling, MailOnline and available on http://www.dailymail.co.uk/news/article-1313016/Graduate-used-
iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012)
7. Cyber Bullying Awareness Video, created By: Tyler. S and available on
http://www.youtube.com/watch?v=PZvc2OZm8f8&feature=player_embedded (Accessed on 16-09-2012)
8. Internet predator, 19, who raped girls is 'every parent's worst nightmare'
http://www.telegraph.co.uk/technology/facebook/9371220/Internet-predator-19-who-raped-girls-is-
every-parents-worst-nightmare.html (Accessed on 16-09-2012)
9. http://www.unc.edu/depts/jomc/academics/dri/idog.html (Accessed on 17-09-2012)
10. http://www.maskmatters.org (Accessed on 16-09-2012)
11. Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-
2010)
http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
30. Thank You
Adv. Dipak G. Parmar
B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law
Founder, Cyber-IPR
Dipak@Cyber-IPR.com
09820196971