SlideShare a Scribd company logo
HOW TO PROTECT YOURSELF
          IN
     CYBER WORLD?

          Adv. Dipak G. Parmar
          B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law


                   Founder, Cyber-IPR

                Copyright Dipak G. Parmar
                                                                         1
            Meant for educational purpose only         18/09/2012
   Pre 1990: People are not connected

   1990: Connecting People to Information

   2000: Connecting People to People

   2010: Everything is connected
How to protect yourself in e world?
How to protect yourself in e world?
   We are now living in e-world… dominated by
    numbers of “e”.

   e-friend…e-music…e-network…e-ticket…
    e-book... e-learning... e-commerce…

   In my opinion, right to life includes right to e-life.
Cyberspace is the electronic medium of computer
  networks, in which online communication takes
  place.
 Now, the term has become a conventional means
  to describe anything associated with computers,
  information technology, the Internet and the
  diverse Internet culture.
 Cyberspace includes
 –   The Internet, websites
 –   Computers, networks
 –   Software, data storage devices, emails
 –   Electronic devices (cell phones, ATM machines etc)
Characteristics of Cyberspace
    Cyber space is an intangible and provides an
    extreme mobility
     Events taking place on the Internet are not happening in
    the locations where participants or servers are physically
    located, but "in cyberspace".
Characteristics of Cyberspace
   Cyber space has Complete disrespect for national
    boundaries.
     A person in India could break into a bank’s electronic
    vault hosted on a computer in USA and transfer millions of
    Rupees to another bank in Switzerland, all within minutes.
    All he would need is a laptop computer/mobile with the
    Internet connection.
Characteristics of Cyberspace

   Cyber space is absolutely open to participation by
    all.
            A ten year-old to an eighty year-old grand
           mother without any regard for the distance or the
           anonymity between them.
On the Internet,
      Nobody Knows You're a Dog.
   Cyber space offers enormous potential for
    anonymity to its members.

   A classic sting operation led by William Swallow, an FBI
    Agent, to identify and arrest malicious hackers.

   During 18-month sting operation, Swallow and his team
    gathered critical evidence on several people , including
    “Mafiaboy”, the 17-year-old hacker who plead guilty to 58
    charges related to a series of DOS attacks in Feb 2000
    against companies such Amazon.com, eBay and Yahoo.
ONLINE PREDATORS
    Online predators do exist and are a very real
    threat for our children.

    An online predator is an adult Internet user who
    exploits vulnerable children or teens, usually for
    sexual or other abusive purposes.

    They target both boys and girls of all ages and use
    the anonymity of the Internet to their advantage
    since they can be whomever they want.
Targets of Online Predators

Children that are
 Technically more savvy than their parents

  or
 emotionally vulnerable which can be

  related to personal issues derived from
  problems at school or home.
Elliott McDermott, 19, Internet Predator, who exploited
   Facebook to meet young girls so he could rape and abuse
   them was described as "every parent's worst nightmare" as
   he was jailed for six years on July 1, 2012 by the UK Court.
Learning: How to avoid predators?
1. Do not give out identifying information such as name, home
   address, school name or telephone number in a chat room
2. Do not send your photograph to any one on the Net without
   initially checking with the parent or guardian.
3. Do not respond to messages or bulletin board items that are
   obscene, belligerent or threatening.
4. Never arrange a face to face meeting without informing your
   parent or guardian.
5. Remember that people online may not be who they seem to
   be. (On the Internet, Nobody Knows You're a Dog.)
Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department,
   Mumbai http://cybercellmumbai.gov.in/html/general-tips/tips-for-children.html
Cyber-Bullying
What is Cyber-bullying?
  Cyber-bullying is defined as the use of
  technology, such as the Internet or text
  messaging to post derogatory or hateful material
  about another.

    Cyber-bullying is often anonymous...Victims
    does not know who is bullying them.
Cyber-Bullying affects real lives
Cyber-bullying had been likened to a “nuclear
attack'' on a person's feelings and reputation.

Unlike traditional bullying, the humiliation of cyber-
bullying could be broadcast to hundreds of peers
with the touch of a button.
                Professor Donna Cross.Director of the Child Health
                Promotion Research Centre, Australia
 Effects included poorer mental health, such as
higher levels of depression, anxiety, and suicidal
ideation.
Cyber-Bullying affects real lives
The Social pressure of Cyber-bullying can lead to
  suicide , such was the case for these victims.




 Megan Meier, 13           Ryan Halligan, 13
Video: A Cyber Bullying Suicide
Story -- Ryan Halligan age 13
http://www.youtube.com/watch?v=E1LG9NymhTE&
  feature=BFa&list=PL26C72EA6DE0A815A
Learning: Cyber-Bullying
1. Being bullied...immediately inform to your
  parents, school authority and, if needed, the local
  Police station .
2. Being by-stander, do not laugh... Raise your
  voice against it. Report the same to your school
  authority.
3.Think before you click.... just because its online...
  does not means those words do not hurt. You
  may be criminally liable for your act.
Pornography
     Publishing, transmitting of any pornography
    material in electronic form is an offence under
    the Indian Information Technology Act, 2000.

    As per the amended Information Technology
    Act, 2000, it is illegal to even viewing and
    possessing the child pornography.
TOI dated 05-09-09 page 11
TOI dated 18-08-09 pg 7   TOI dated 31-08-09 pg 10
                                   Copyright Dipak G. Parmar
                                Meant for educational purpose only                           21
Hackers had used the illegally taped peephole video of Erin Andrews as
a lure to infect user machine with malware.

                            Times of India dated 22-07-2009 page 7
                       Copyright Dipak G. Parmar
                    Meant for educational purpose only               22
JNU MMS
  Abha Kumar, 25, (name changed) clicked semi-nude
  pictures of herself and sent them to her commitment-
  phobic boyfriend without realising that the Internet is
  not a very safe place for naked pictures of a woman. One
  click and you are a porn star.

In the recent JNU, MMS scandal, the man who circulated
  the MMS of his girlfriend was apparently doing this to
  seek revenge from her.
Learning: Pornography
1. Do not visit porn site. You end up downloading
  virus.
2. Do not transmit(share) porn.
3. Do not view or possess child porn.
4. Do not allow any person, even your so called best
  friend, to click or record when you in comprised
  position.
5. Do not share your nude photo/video to other.
6. Avoid the Internet when you are ANGRY.
Digital content (software, movies, songs, pictures
content etc) is particularly vulnerable to piracy
because making and sharing (or selling) copies is
easy and inexpensive.

Internet is the world’s biggest copy machine.
      -See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).




                                                            Copyright Dipak G. Parmar
                                                    Meant for educational purpose only   01/08/2010   25
Digital Piracy
   India was the fourth largest downloader behind
    US, Britain and Canada.

    “Free-to-user” appeal of illegal file-sharing that creates its unfair
    advantage over legitimate music services.

   Although, copyright piracy is a crime but end-
    users under the “free-to-user” concept’s
    influence does not perceived it as a crime.
Emmanuel Nimley
 jailed for six months:
 recorded the latest
 releases on his phone
 and put them on a film
 piracy website.
Learning: Digital Piracy
1. Do not upload copyrighted materials of others
  (software, movies, songs, pictures content etc)
  without permission.
2. Do not download copyrighted material from
  unauthorised source. You end up downloading
  virus, apart from being criminally liable for
  unauthorised    downloading     and    violating
  copyright.
1.    Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws
      (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009)
2.    A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by
      Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007)
3.    “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997).
4.    Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing
      business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation-
      5162852 Accessed on 13-09-2010)
5.     LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on
      http://in.news.yahoo.com/lights-camera-sleaze.html (Accessed on 16-09-2012)
6.    Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark
      ruling, MailOnline and available on http://www.dailymail.co.uk/news/article-1313016/Graduate-used-
      iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012)
7.    Cyber Bullying Awareness Video, created By: Tyler. S and available on
      http://www.youtube.com/watch?v=PZvc2OZm8f8&feature=player_embedded (Accessed on 16-09-2012)
8.    Internet predator, 19, who raped girls is 'every parent's worst nightmare'
      http://www.telegraph.co.uk/technology/facebook/9371220/Internet-predator-19-who-raped-girls-is-
      every-parents-worst-nightmare.html (Accessed on 16-09-2012)
9.    http://www.unc.edu/depts/jomc/academics/dri/idog.html (Accessed on 17-09-2012)
10.   http://www.maskmatters.org (Accessed on 16-09-2012)
11.   Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09-
      2010)
      http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
Thank You

Adv. Dipak G. Parmar
B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law

    Founder, Cyber-IPR
          Dipak@Cyber-IPR.com
              09820196971

More Related Content

PPT
East Lothian June Internet Safety Talks Slideshare
PPTX
Internet safety presentation 2011
PPT
Internet Safety and Responsible Use: NQT Presentation - August 2009
KEY
Digital Citizenship & Media Literacy
PPTX
DIGITAL LITERACY Steps to Becoming a Digital Citizen
PPTX
Digital citizenship project
PPTX
Digital dangers pp1
East Lothian June Internet Safety Talks Slideshare
Internet safety presentation 2011
Internet Safety and Responsible Use: NQT Presentation - August 2009
Digital Citizenship & Media Literacy
DIGITAL LITERACY Steps to Becoming a Digital Citizen
Digital citizenship project
Digital dangers pp1

What's hot (20)

PDF
Online safety and security 7 golden rules how to save your child from cyber c...
PDF
Adolescent Mobile Safety: Not a LOL-ing Matter
PPT
cyber ethics
PPTX
Internet safety presentation 2014
PPTX
KidSafe - Parental Training Presentation
PDF
Freedom-and-Responsibility-Dan-Lohrmann (3)
PPTX
Internet safety presentation 2013
PPT
Danger Of The Internet
PPTX
Piracypowerpoint
PPTX
Internet safety presentation 2012
PDF
Online safety for children
PDF
Cyber bullying write up
PPT
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
PPT
Legalissues
PPS
Dangers Of Internet - Parents Beware
PPT
SLF 2008 - Internet Safety snd Responsible Use
PPT
Ethical issues
PPT
Copyright
POT
Copyright And Ethics On The Internet1
PDF
Cybercrimes (Against Children)
Online safety and security 7 golden rules how to save your child from cyber c...
Adolescent Mobile Safety: Not a LOL-ing Matter
cyber ethics
Internet safety presentation 2014
KidSafe - Parental Training Presentation
Freedom-and-Responsibility-Dan-Lohrmann (3)
Internet safety presentation 2013
Danger Of The Internet
Piracypowerpoint
Internet safety presentation 2012
Online safety for children
Cyber bullying write up
Safeguarding Children Online. Training from Stephen Carrick-Davies for Southw...
Legalissues
Dangers Of Internet - Parents Beware
SLF 2008 - Internet Safety snd Responsible Use
Ethical issues
Copyright
Copyright And Ethics On The Internet1
Cybercrimes (Against Children)
Ad

Viewers also liked (8)

PPTX
Neoleading in an e world
PDF
Knowledge Transfer in The E-World
DOC
Myporfolio Jen
PPT
Max Weber
DOCX
Field Study 3 Episode 7
PPTX
Field study 3
DOCX
Fs3 episode 6- sarah jane cabilino
DOCX
Neoleading in an e world
Knowledge Transfer in The E-World
Myporfolio Jen
Max Weber
Field Study 3 Episode 7
Field study 3
Fs3 episode 6- sarah jane cabilino
Ad

Similar to How to protect yourself in e world? (20)

PPTX
cyber-crime by cr.pptx
DOCX
Cyber ethics
PPTX
Cyber Crime
PDF
ICT, the Self, and Society.pdf
PPTX
impact of cyber crime on youth ppt |pptx
PDF
Computer Crime Essay
PPTX
Cyber-crime PPT
DOCX
Social and legal issues in i
DOCX
New microsoft office word document (3)
PPTX
cyber-crime-140128140443-phpapp02.pptx
PPTX
Cybercrime
PPTX
Cybercrime
PPTX
ppt on child pornography and cyber crime
PDF
The Unlimited Power of Cyber Bullying
PPTX
The disadvantage of ict.pptx
PDF
Essays On Cyber Crime
PPTX
CYBERCRIME.pptx.........................
PPTX
Digital law
PPTX
Digital law
cyber-crime by cr.pptx
Cyber ethics
Cyber Crime
ICT, the Self, and Society.pdf
impact of cyber crime on youth ppt |pptx
Computer Crime Essay
Cyber-crime PPT
Social and legal issues in i
New microsoft office word document (3)
cyber-crime-140128140443-phpapp02.pptx
Cybercrime
Cybercrime
ppt on child pornography and cyber crime
The Unlimited Power of Cyber Bullying
The disadvantage of ict.pptx
Essays On Cyber Crime
CYBERCRIME.pptx.........................
Digital law
Digital law

How to protect yourself in e world?

  • 1. HOW TO PROTECT YOURSELF IN CYBER WORLD? Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Copyright Dipak G. Parmar 1 Meant for educational purpose only 18/09/2012
  • 2. Pre 1990: People are not connected  1990: Connecting People to Information  2000: Connecting People to People  2010: Everything is connected
  • 5. We are now living in e-world… dominated by numbers of “e”.  e-friend…e-music…e-network…e-ticket… e-book... e-learning... e-commerce…  In my opinion, right to life includes right to e-life.
  • 6. Cyberspace is the electronic medium of computer networks, in which online communication takes place.  Now, the term has become a conventional means to describe anything associated with computers, information technology, the Internet and the diverse Internet culture.  Cyberspace includes – The Internet, websites – Computers, networks – Software, data storage devices, emails – Electronic devices (cell phones, ATM machines etc)
  • 7. Characteristics of Cyberspace  Cyber space is an intangible and provides an extreme mobility  Events taking place on the Internet are not happening in the locations where participants or servers are physically located, but "in cyberspace".
  • 8. Characteristics of Cyberspace  Cyber space has Complete disrespect for national boundaries.  A person in India could break into a bank’s electronic vault hosted on a computer in USA and transfer millions of Rupees to another bank in Switzerland, all within minutes. All he would need is a laptop computer/mobile with the Internet connection.
  • 9. Characteristics of Cyberspace  Cyber space is absolutely open to participation by all.  A ten year-old to an eighty year-old grand mother without any regard for the distance or the anonymity between them.
  • 10. On the Internet, Nobody Knows You're a Dog.  Cyber space offers enormous potential for anonymity to its members.  A classic sting operation led by William Swallow, an FBI Agent, to identify and arrest malicious hackers.  During 18-month sting operation, Swallow and his team gathered critical evidence on several people , including “Mafiaboy”, the 17-year-old hacker who plead guilty to 58 charges related to a series of DOS attacks in Feb 2000 against companies such Amazon.com, eBay and Yahoo.
  • 11. ONLINE PREDATORS  Online predators do exist and are a very real threat for our children.  An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes.  They target both boys and girls of all ages and use the anonymity of the Internet to their advantage since they can be whomever they want.
  • 12. Targets of Online Predators Children that are  Technically more savvy than their parents or  emotionally vulnerable which can be related to personal issues derived from problems at school or home.
  • 13. Elliott McDermott, 19, Internet Predator, who exploited Facebook to meet young girls so he could rape and abuse them was described as "every parent's worst nightmare" as he was jailed for six years on July 1, 2012 by the UK Court.
  • 14. Learning: How to avoid predators? 1. Do not give out identifying information such as name, home address, school name or telephone number in a chat room 2. Do not send your photograph to any one on the Net without initially checking with the parent or guardian. 3. Do not respond to messages or bulletin board items that are obscene, belligerent or threatening. 4. Never arrange a face to face meeting without informing your parent or guardian. 5. Remember that people online may not be who they seem to be. (On the Internet, Nobody Knows You're a Dog.) Source:Cyber Crime Investigation cell, Crime Branch, Crimnal Investigation Department, Mumbai http://cybercellmumbai.gov.in/html/general-tips/tips-for-children.html
  • 15. Cyber-Bullying What is Cyber-bullying?  Cyber-bullying is defined as the use of technology, such as the Internet or text messaging to post derogatory or hateful material about another.  Cyber-bullying is often anonymous...Victims does not know who is bullying them.
  • 16. Cyber-Bullying affects real lives Cyber-bullying had been likened to a “nuclear attack'' on a person's feelings and reputation. Unlike traditional bullying, the humiliation of cyber- bullying could be broadcast to hundreds of peers with the touch of a button.  Professor Donna Cross.Director of the Child Health Promotion Research Centre, Australia  Effects included poorer mental health, such as higher levels of depression, anxiety, and suicidal ideation.
  • 17. Cyber-Bullying affects real lives The Social pressure of Cyber-bullying can lead to suicide , such was the case for these victims. Megan Meier, 13 Ryan Halligan, 13
  • 18. Video: A Cyber Bullying Suicide Story -- Ryan Halligan age 13 http://www.youtube.com/watch?v=E1LG9NymhTE& feature=BFa&list=PL26C72EA6DE0A815A
  • 19. Learning: Cyber-Bullying 1. Being bullied...immediately inform to your parents, school authority and, if needed, the local Police station . 2. Being by-stander, do not laugh... Raise your voice against it. Report the same to your school authority. 3.Think before you click.... just because its online... does not means those words do not hurt. You may be criminally liable for your act.
  • 20. Pornography  Publishing, transmitting of any pornography material in electronic form is an offence under the Indian Information Technology Act, 2000.  As per the amended Information Technology Act, 2000, it is illegal to even viewing and possessing the child pornography.
  • 21. TOI dated 05-09-09 page 11 TOI dated 18-08-09 pg 7 TOI dated 31-08-09 pg 10 Copyright Dipak G. Parmar Meant for educational purpose only 21
  • 22. Hackers had used the illegally taped peephole video of Erin Andrews as a lure to infect user machine with malware. Times of India dated 22-07-2009 page 7 Copyright Dipak G. Parmar Meant for educational purpose only 22
  • 23. JNU MMS Abha Kumar, 25, (name changed) clicked semi-nude pictures of herself and sent them to her commitment- phobic boyfriend without realising that the Internet is not a very safe place for naked pictures of a woman. One click and you are a porn star. In the recent JNU, MMS scandal, the man who circulated the MMS of his girlfriend was apparently doing this to seek revenge from her.
  • 24. Learning: Pornography 1. Do not visit porn site. You end up downloading virus. 2. Do not transmit(share) porn. 3. Do not view or possess child porn. 4. Do not allow any person, even your so called best friend, to click or record when you in comprised position. 5. Do not share your nude photo/video to other. 6. Avoid the Internet when you are ANGRY.
  • 25. Digital content (software, movies, songs, pictures content etc) is particularly vulnerable to piracy because making and sharing (or selling) copies is easy and inexpensive. Internet is the world’s biggest copy machine. -See “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). Copyright Dipak G. Parmar Meant for educational purpose only 01/08/2010 25
  • 26. Digital Piracy  India was the fourth largest downloader behind US, Britain and Canada.  “Free-to-user” appeal of illegal file-sharing that creates its unfair advantage over legitimate music services.  Although, copyright piracy is a crime but end- users under the “free-to-user” concept’s influence does not perceived it as a crime.
  • 27. Emmanuel Nimley jailed for six months: recorded the latest releases on his phone and put them on a film piracy website.
  • 28. Learning: Digital Piracy 1. Do not upload copyrighted materials of others (software, movies, songs, pictures content etc) without permission. 2. Do not download copyrighted material from unauthorised source. You end up downloading virus, apart from being criminally liable for unauthorised downloading and violating copyright.
  • 29. 1. Introduction to Indian Cyber Law, Rohas Nagpal, Asian School of Cyber Laws (http://www.asianlaws.org/library/cyber-laws/intro-indian-cyber-law.pdf accessed on 27-09-2009) 2. A False Bargain: The Los Angeles County Economic consequences of counterfeit Product, prepared by Gregory Freeman, Nancy D Sidhu and Michael Montoya (February 2007) 3. “It’s the World’s Biggest Copy Machine,” PC week (January 27, 1997). 4. Presentation on Digital DNA & Digital Augmentation (how technology and new economic force are changing business) by Martin Deinoff (http://www.slideshare.net/MartinDeinoff/digital-dna-digital-augmentation- 5162852 Accessed on 13-09-2010) 5. LIGHTS CAMERA SLEAZE, By Anindita Datta Choudhury, Mail Today and available on http://in.news.yahoo.com/lights-camera-sleaze.html (Accessed on 16-09-2012) 6. Graduate who used iPhone to record blockbusters inside cinema is jailed for six months in landmark ruling, MailOnline and available on http://www.dailymail.co.uk/news/article-1313016/Graduate-used- iPhone-record-blockbusters-cinema-jailed-months-landmark-ruling.html (Accessed on 16-09-2012) 7. Cyber Bullying Awareness Video, created By: Tyler. S and available on http://www.youtube.com/watch?v=PZvc2OZm8f8&feature=player_embedded (Accessed on 16-09-2012) 8. Internet predator, 19, who raped girls is 'every parent's worst nightmare' http://www.telegraph.co.uk/technology/facebook/9371220/Internet-predator-19-who-raped-girls-is- every-parents-worst-nightmare.html (Accessed on 16-09-2012) 9. http://www.unc.edu/depts/jomc/academics/dri/idog.html (Accessed on 17-09-2012) 10. http://www.maskmatters.org (Accessed on 16-09-2012) 11. Wikipedia http://en.wikipedia.org/wiki/On_the_Internet,_nobody_knows_you're_a_dog (Accessed on 15-09- 2010) http://en.wikipedia.org/wiki/Cyberspace (Accessed on 15-09-2010)
  • 30. Thank You Adv. Dipak G. Parmar B. Com., LL. M. , C. S. (Inter), CCI, DEA, ADFI, Adv. Dip. in Cyber Law Founder, Cyber-IPR Dipak@Cyber-IPR.com 09820196971