SlideShare una empresa de Scribd logo
1 de 40
“ Any Criminal act wherein the computer is
used either a tool or target or both”
Cyber crimes - definition
5 January 2015
Why Criminals use internet
No need for
physical contact
with the victims
Easy to learn techniques
and acquire tools
Small investment
can cause massive
economic damage
Easy for the
players to hide
Inadequate cyberspace
legislation
5 January 2015
Internet
 Accessing Various Websites
 Instant Communication
(E-mail, Chat, Talk, Live Video etc.)
 Information Gathering
 File Sharing
 Education
 Entertainment
 E-Commerce
(Eg. Internet Banking, Ticket Booking)
 And for ILLEGAL ACTIVITIES
WE don’t know what happens
in the darkness !!!!
5 January 2015
Railway reservation
Banking
E - commerce
E-mail
browsing
Social network
5 January 2015
5 January 2015
Internet Addiction
Children and young people can easily become 'hooked'
on online activities such as multi-user games, instant
messaging, pornography and chat rooms.
The most vulnerable children, are those who are
"lonely and bored from families where nobody is at
home to relate to after school”.
5 January 2015
Internet Addiction
Psychological symptoms
 Having a sense of well-being while at the
computer
 Inability to stop the activity
 Neglecting family and friends
 Feeling empty, depressed and irritable when not at
the computer
 Lying to family and friends about activities
 Problems with school or work
Social network ……..
5 January 2015
5 January 2015
Chat Rooms
Establish new relationships outside the family.
Moving away from parental control
Conversations can quickly become intimate, making
them vulnerable to online predators.
Exploring sexuality
Most of them are unknown
CHATING ……… CHEATING ?
5 January 2015
5 January 2015
5 January 2015
5 January 2015
5 January 2015
Ordinary Images are being exploited now a days.
People at water theme
park
A young lady
celebrating her
birthday
College friends enjoying a
day of Holi and below on a
night out
Girl at water
theme park
5 January 2015
Movies and Magazines exploit minds of youth
Why this ? Rather than this?
PRECAUTIONS AGAINST HARASSMENTS
5 January 2015
•Never give out personal information to a stranger.
•For women, use gender-neutral id names online.
•Make sure to differentiate between harassment and merely
inconvenient or annoying communications.
•Don’t keep it a secret. Don’t let your harasser pressure you.
•Be prepared to abandon your current chat channel, network
and/or nickname.
•Report the harassment to the appropriate online authorities.
Mobile phones
5 January 2015
5 January 2015
Institutional children should be provided with minimal
featured phones that do not have a camera, Bluetooth or
Infrared or other unique features. A mobile capable of only
receiving and making calls with SMS service is ideal.
Do not take photos / videos using cell phones without consent
of others. People especially ladies should vigilant while in
public toilets, locker rooms, Always check the surrounding area
for Mobile/hidden camera,
Tips on keeping Mobile Safe
5 January 2015
Don’t pose in front of a mobile camera even if it is friends or relatives.
Do not give your mobile phone numbers while chatting over the
internet to avoid stalking. And do not lend it either.
Always remove the memory card from your hand set while giving it to
service centre.
If you sell your mobile, you should never give the used memory card
with your mobile phone
Do not use or buy a used SIM card. Make sure your SIM card is bought
and registered under your name with your permanent address,
Tips on keeping Mobile Safe……
5 January 2015
Do not use the mobile phone for sending, transferring or storing
obscene/pornographic images, videos, SMS or MMS.
Do not assume that any crime done with your mobile is
undetectable.
Do not talk on your cell phone while driving.
Do not talk on your cell phone in classrooms. (You’re disturbing
others too!)
Turn your cell phone to silent/vibrate mode in Places of Worship,
Funerals, Job Interviews, Classrooms, Banks and places where
you are requested to do so.
Tips on keeping Mobile Safe……
5 January 2015
Trial rooms in clothing stores, hotel and motel rooms, and even
private bedrooms, train journey, Bus stops, etc Spend at least a
minute or two to check.
Inform the police, parents or teachers if you are a victim of above
said incidents etc without delay.
Help the Law Enforcement Agencies to serve you better
.
Tips on keeping Mobile Safe……
5 January 2015
 Make a note of the mobile's serial number - you can
find it by typing *#06# on your phone. The serial
number can help to track the mobile if it's ever stolen.
 Call the service provider immediately. If your mobile
or your child's mobile is stolen: They will block use of
the stolen mobile on their network, even if the SIM
card has been changed.
 Report it to the police as soon as the crime occur.
Tips on keeping Mobile Safe
5 January 2015
5 January 2015
Don’t believe anyone online,
since you cannot see or hear
the cyber pals. They may not
be who they seem online.
A 40 year-old-man in reality
could be representing as a 20
year-old-woman in cyberspace.
Don’t give your personal
details like name, house
address, school name, family
details etc.
If someone makes you feel uncomfortable,
leave the service immediately and inform
about it to your parents.
Avoid having face-to-face meetings with cyberpals.
But, if you are interested to meet somebody you met online, bring
it to the notice of your parents, and let your parents accompany
you.
5 January 2015
Be aware of copyright issues while
using the online information
Don’t click links or URLs that
look suspicious
If you get suspicious e-mails, files,
or pictures from someone you
don't know and trust, trash them
just like any other junk mail. You
could have a lot to lose by
trusting someone you've never
even met.
5 January 2015
Don't let people online trick you
into thinking of them as real-life
friends if you've never met
them in person.
Don't let people online
provoke you into online
fights.
Avoid chat rooms or discussion
areas that look vague or
provocative.
5 January 2015
Don’t forward/send unknown/untrusted messages
to your cyberpals.
You can even play vital role in providing safety for your
cyberpals.
Let your parents know the services accessed by you online. Don’t
spend too much time online. Always follow your family's rules in
using Internet. These rules are made to make sure you have fun
and stay safe online.
5 January 2015
LAW AND ACTS
Information Technology
Act 2000 amended in 2008
Relevant Sections of IPC &
SLL
Offences & Punishments
5 January 2015
Offence
Section
of Law
Punishment
Damage to computer,
computer system, hacking,
unauthorised downloading,
deleting, altering etc
43 of IT
Act 2000
Compensation not exceeding
5 Crore Rupees
Tampering with computer
source documents
65 of IT
Act 2000
Three years imprisonment
or with fine up to 2 lakhs
or with both
5 January 2015
Offences & Punishments
Offence Section of Law Punishment
Computer related offences
referred to in Sec 43
66 of ITA Act
2008
Three years imprisonment or
with fine up to 5 lakhs
or with both
Sending offensive or false
messages through
communication service, etc
66(A) of ITA Act
2008
Three years imprisonment
and with fine
Dishonestly receiving stolen
computer resource or
communication device
66(B) of ITA Act
2008
Three years imprisonment or
with fine up to 1 lakh
or with both
5 January 2015
Offences & Punishments
Offence
Section of
Law
Punishment
Identity theft
66(C) of ITA
Act 2008
Three years imprisonment and
with fine up to 1 lakh
Cheating by personation by
using computer resource
66(D) of ITA
Act 2008
Three years imprisonment and
with fine up to 1 lakh
Violation of privacy
66(E) of ITA
Act 2008
Three years imprisonment or with
fine up to 2 lakhs
or with both
5 January 2015
Offences & Punishments
Offence
Section
of Law
Punishment
Cyber terrorism
66(F) of
ITA Act
2008
Imprisonment up to life time
Publishing or transmitting
obscene material in
electronic form
67 of ITA
Act 2008
(i) Three years imprisonment and
fine up to 5 lakhs
(ii) Five years imprisonment years
and fine up to 10 lakhs
(For repeated crime)
Publishing or transmitting of
material containing sexually
explicit act, etc., in
electronic form
67(A) of
ITA Act
2008
(i) Five years imprisonment and fine
up to 10 lakhs
(ii) Seven years imprisonment and
fine up to 10 lakhs
(For repeated crime)
5 January 2015
Offences & Punishments
Offence
Section of
Law
Punishment
Browsing, Downloading,
Publishing or transmitting of
material depicting children in
sexually explicit act, etc., in
electronic form
(Under the age of 18 yrs)
67(B) of ITA
Act 2008
1. Five years imprisonment and
fine up to 10 lakhs
2. Seven years imprisonment and
fine up to 10 lakhs
(For repeated crime)
Preservation and retention of
information by intermediaries
67(C) of ITA
Act 2008
Three years imprisonment with
fine
5 January 2015
HI TECH CRIME ENQUIRY CELL,
THIRUVANANTHAPURAM
0471 – 2721547 (EXT- 1274)
CYBER CRIME POLICE STATION
THIRUVANANTHAPURAM
0471 – 2449090
CHILD HELP LINE 1098
WOMEN HELPLINE 1091
CRIME STOPPER CELL 1090
POLICE CONTROL ROOM 100
For email IDs of Officers www.keralapolice.org
FOR ASSISTANCE --------
5 January 2015
You Can Click
You Can't Hide...!
But
For schoolchildren1
For schoolchildren1

Más contenido relacionado

La actualidad más candente

Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th gradePamela Taylor
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Top 10 Internet Safety
Top 10 Internet SafetyTop 10 Internet Safety
Top 10 Internet Safetydarrylstott1
 

La actualidad más candente (20)

Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Test
TestTest
Test
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Top 10 Internet Safety
Top 10 Internet SafetyTop 10 Internet Safety
Top 10 Internet Safety
 

Destacado

Internet
InternetInternet
Internetmnikol
 
Εθισμός στο διαδίκτυο
Εθισμός στο διαδίκτυοΕθισμός στο διαδίκτυο
Εθισμός στο διαδίκτυο4gymsch
 
Internet addiction 9. febr 2015
Internet addiction 9. febr 2015Internet addiction 9. febr 2015
Internet addiction 9. febr 2015Athina MINAIDI
 
Internet Addiction
Internet AddictionInternet Addiction
Internet AddictionHayatB
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentationguestb628c5
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
10 PowerPoint Templates That Don't Suck
10 PowerPoint Templates That Don't Suck10 PowerPoint Templates That Don't Suck
10 PowerPoint Templates That Don't SuckPresentation Panda
 
Digital, Social & Mobile in APAC in 2015
Digital, Social & Mobile in APAC in 2015Digital, Social & Mobile in APAC in 2015
Digital, Social & Mobile in APAC in 2015We Are Social Singapore
 

Destacado (12)

διαδίκτυο
διαδίκτυοδιαδίκτυο
διαδίκτυο
 
Internet
InternetInternet
Internet
 
Εθισμός στο διαδίκτυο
Εθισμός στο διαδίκτυοΕθισμός στο διαδίκτυο
Εθισμός στο διαδίκτυο
 
Internet addiction 9. febr 2015
Internet addiction 9. febr 2015Internet addiction 9. febr 2015
Internet addiction 9. febr 2015
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Internet Addiction
Internet AddictionInternet Addiction
Internet Addiction
 
Internet Addiction Presentation
Internet Addiction  PresentationInternet Addiction  Presentation
Internet Addiction Presentation
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
10 PowerPoint Templates That Don't Suck
10 PowerPoint Templates That Don't Suck10 PowerPoint Templates That Don't Suck
10 PowerPoint Templates That Don't Suck
 
Digital, Social & Mobile in APAC in 2015
Digital, Social & Mobile in APAC in 2015Digital, Social & Mobile in APAC in 2015
Digital, Social & Mobile in APAC in 2015
 

Similar a For schoolchildren1

For schoolchildren
For schoolchildrenFor schoolchildren
For schoolchildrenVinay Kumar
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tantaSamir Deutsch
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentationrenumann
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxTCPSM
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyJEcomputing
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationjanemiller48
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.pptNaeemAbbas286098
 

Similar a For schoolchildren1 (20)

For schoolchildren
For schoolchildrenFor schoolchildren
For schoolchildren
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber bully campaign
Cyber bully campaign Cyber bully campaign
Cyber bully campaign
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet Safety St Mary's Wollongong
Internet Safety St Mary's WollongongInternet Safety St Mary's Wollongong
Internet Safety St Mary's Wollongong
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Social_Media_Presentation.ppt
Social_Media_Presentation.pptSocial_Media_Presentation.ppt
Social_Media_Presentation.ppt
 

Más de Vinay Kumar (6)

MBA_Certificate
MBA_CertificateMBA_Certificate
MBA_Certificate
 
6
66
6
 
2
22
2
 
9
99
9
 
7
77
7
 
8
88
8
 

For schoolchildren1

  • 1.
  • 2. “ Any Criminal act wherein the computer is used either a tool or target or both” Cyber crimes - definition 5 January 2015
  • 3. Why Criminals use internet No need for physical contact with the victims Easy to learn techniques and acquire tools Small investment can cause massive economic damage Easy for the players to hide Inadequate cyberspace legislation
  • 4. 5 January 2015 Internet  Accessing Various Websites  Instant Communication (E-mail, Chat, Talk, Live Video etc.)  Information Gathering  File Sharing  Education  Entertainment  E-Commerce (Eg. Internet Banking, Ticket Booking)  And for ILLEGAL ACTIVITIES
  • 5. WE don’t know what happens in the darkness !!!! 5 January 2015 Railway reservation Banking E - commerce E-mail browsing Social network
  • 7.
  • 8. 5 January 2015 Internet Addiction Children and young people can easily become 'hooked' on online activities such as multi-user games, instant messaging, pornography and chat rooms. The most vulnerable children, are those who are "lonely and bored from families where nobody is at home to relate to after school”.
  • 9. 5 January 2015 Internet Addiction Psychological symptoms  Having a sense of well-being while at the computer  Inability to stop the activity  Neglecting family and friends  Feeling empty, depressed and irritable when not at the computer  Lying to family and friends about activities  Problems with school or work
  • 11. 5 January 2015 Chat Rooms Establish new relationships outside the family. Moving away from parental control Conversations can quickly become intimate, making them vulnerable to online predators. Exploring sexuality Most of them are unknown CHATING ……… CHEATING ?
  • 17. Ordinary Images are being exploited now a days. People at water theme park A young lady celebrating her birthday College friends enjoying a day of Holi and below on a night out Girl at water theme park
  • 18. 5 January 2015 Movies and Magazines exploit minds of youth Why this ? Rather than this?
  • 19. PRECAUTIONS AGAINST HARASSMENTS 5 January 2015 •Never give out personal information to a stranger. •For women, use gender-neutral id names online. •Make sure to differentiate between harassment and merely inconvenient or annoying communications. •Don’t keep it a secret. Don’t let your harasser pressure you. •Be prepared to abandon your current chat channel, network and/or nickname. •Report the harassment to the appropriate online authorities.
  • 21. 5 January 2015 Institutional children should be provided with minimal featured phones that do not have a camera, Bluetooth or Infrared or other unique features. A mobile capable of only receiving and making calls with SMS service is ideal. Do not take photos / videos using cell phones without consent of others. People especially ladies should vigilant while in public toilets, locker rooms, Always check the surrounding area for Mobile/hidden camera, Tips on keeping Mobile Safe
  • 22. 5 January 2015 Don’t pose in front of a mobile camera even if it is friends or relatives. Do not give your mobile phone numbers while chatting over the internet to avoid stalking. And do not lend it either. Always remove the memory card from your hand set while giving it to service centre. If you sell your mobile, you should never give the used memory card with your mobile phone Do not use or buy a used SIM card. Make sure your SIM card is bought and registered under your name with your permanent address, Tips on keeping Mobile Safe……
  • 23. 5 January 2015 Do not use the mobile phone for sending, transferring or storing obscene/pornographic images, videos, SMS or MMS. Do not assume that any crime done with your mobile is undetectable. Do not talk on your cell phone while driving. Do not talk on your cell phone in classrooms. (You’re disturbing others too!) Turn your cell phone to silent/vibrate mode in Places of Worship, Funerals, Job Interviews, Classrooms, Banks and places where you are requested to do so. Tips on keeping Mobile Safe……
  • 24. 5 January 2015 Trial rooms in clothing stores, hotel and motel rooms, and even private bedrooms, train journey, Bus stops, etc Spend at least a minute or two to check. Inform the police, parents or teachers if you are a victim of above said incidents etc without delay. Help the Law Enforcement Agencies to serve you better . Tips on keeping Mobile Safe……
  • 25. 5 January 2015  Make a note of the mobile's serial number - you can find it by typing *#06# on your phone. The serial number can help to track the mobile if it's ever stolen.  Call the service provider immediately. If your mobile or your child's mobile is stolen: They will block use of the stolen mobile on their network, even if the SIM card has been changed.  Report it to the police as soon as the crime occur. Tips on keeping Mobile Safe
  • 27. 5 January 2015 Don’t believe anyone online, since you cannot see or hear the cyber pals. They may not be who they seem online. A 40 year-old-man in reality could be representing as a 20 year-old-woman in cyberspace. Don’t give your personal details like name, house address, school name, family details etc. If someone makes you feel uncomfortable, leave the service immediately and inform about it to your parents.
  • 28. Avoid having face-to-face meetings with cyberpals. But, if you are interested to meet somebody you met online, bring it to the notice of your parents, and let your parents accompany you. 5 January 2015 Be aware of copyright issues while using the online information Don’t click links or URLs that look suspicious If you get suspicious e-mails, files, or pictures from someone you don't know and trust, trash them just like any other junk mail. You could have a lot to lose by trusting someone you've never even met.
  • 29. 5 January 2015 Don't let people online trick you into thinking of them as real-life friends if you've never met them in person. Don't let people online provoke you into online fights. Avoid chat rooms or discussion areas that look vague or provocative.
  • 30. 5 January 2015 Don’t forward/send unknown/untrusted messages to your cyberpals. You can even play vital role in providing safety for your cyberpals. Let your parents know the services accessed by you online. Don’t spend too much time online. Always follow your family's rules in using Internet. These rules are made to make sure you have fun and stay safe online.
  • 31. 5 January 2015 LAW AND ACTS Information Technology Act 2000 amended in 2008 Relevant Sections of IPC & SLL
  • 32. Offences & Punishments 5 January 2015 Offence Section of Law Punishment Damage to computer, computer system, hacking, unauthorised downloading, deleting, altering etc 43 of IT Act 2000 Compensation not exceeding 5 Crore Rupees Tampering with computer source documents 65 of IT Act 2000 Three years imprisonment or with fine up to 2 lakhs or with both
  • 33. 5 January 2015 Offences & Punishments Offence Section of Law Punishment Computer related offences referred to in Sec 43 66 of ITA Act 2008 Three years imprisonment or with fine up to 5 lakhs or with both Sending offensive or false messages through communication service, etc 66(A) of ITA Act 2008 Three years imprisonment and with fine Dishonestly receiving stolen computer resource or communication device 66(B) of ITA Act 2008 Three years imprisonment or with fine up to 1 lakh or with both
  • 34. 5 January 2015 Offences & Punishments Offence Section of Law Punishment Identity theft 66(C) of ITA Act 2008 Three years imprisonment and with fine up to 1 lakh Cheating by personation by using computer resource 66(D) of ITA Act 2008 Three years imprisonment and with fine up to 1 lakh Violation of privacy 66(E) of ITA Act 2008 Three years imprisonment or with fine up to 2 lakhs or with both
  • 35. 5 January 2015 Offences & Punishments Offence Section of Law Punishment Cyber terrorism 66(F) of ITA Act 2008 Imprisonment up to life time Publishing or transmitting obscene material in electronic form 67 of ITA Act 2008 (i) Three years imprisonment and fine up to 5 lakhs (ii) Five years imprisonment years and fine up to 10 lakhs (For repeated crime) Publishing or transmitting of material containing sexually explicit act, etc., in electronic form 67(A) of ITA Act 2008 (i) Five years imprisonment and fine up to 10 lakhs (ii) Seven years imprisonment and fine up to 10 lakhs (For repeated crime)
  • 36. 5 January 2015 Offences & Punishments Offence Section of Law Punishment Browsing, Downloading, Publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form (Under the age of 18 yrs) 67(B) of ITA Act 2008 1. Five years imprisonment and fine up to 10 lakhs 2. Seven years imprisonment and fine up to 10 lakhs (For repeated crime) Preservation and retention of information by intermediaries 67(C) of ITA Act 2008 Three years imprisonment with fine
  • 37. 5 January 2015 HI TECH CRIME ENQUIRY CELL, THIRUVANANTHAPURAM 0471 – 2721547 (EXT- 1274) CYBER CRIME POLICE STATION THIRUVANANTHAPURAM 0471 – 2449090 CHILD HELP LINE 1098 WOMEN HELPLINE 1091 CRIME STOPPER CELL 1090 POLICE CONTROL ROOM 100 For email IDs of Officers www.keralapolice.org FOR ASSISTANCE --------
  • 38. 5 January 2015 You Can Click You Can't Hide...! But