Cyber law unit 5
Cyber law unit 5
1. Gather Evidence
Before ling a complaint, collect all relevant evidence related to the cybercrime. This can include:
• Screenshots of suspicious emails, messages, or posts.
• Financial transac on records or evidence of fraud.
• IP addresses, URLs, or any other digital traces related to the crime.
• A clear descrip on of the event, including dates and mes.
Here’s the explana on of safe opera ons separately for computers and internet:
Basic Rules for Safe Computer Opera on
1. Use Strong Passwords
o Ensure that you use complex passwords that combine upper and
lowercase le ers, numbers, and special characters.
o Never use common passwords like "123456" or "password123" as
they are easy for a ackers to guess.
o Change your passwords regularly to reduce the risk of unauthorized
access.
2. Install An virus So ware
o Use reliable an virus so ware to protect your computer from
malware, viruses, and other harmful so ware.
o Regularly update the an virus so ware to ensure it can detect the
latest threats.
o Perform periodic scans to check for any exis ng security issues.
3. Keep Your Opera ng System Updated
ti
tt
ti
ti
tt
ti
ft
ft
ti
ft
ti
ti
ft
ti
ti
o Always install the latest updates for your opera ng system (OS).
These updates contain security patches that x vulnerabili es that
could be exploited by cybercriminals.
o Enable automa c updates to make sure you don't miss cri cal
security patches.
4. Backup Important Files
o Regularly back up your important les, documents, and photos to an
external hard drive or cloud storage.
o In case of a cybera ack like ransomware or a system failure, having
backups ensures that you don't lose important data.
5. Use a Firewall
o Enable your computer’s rewall to monitor incoming and outgoing
tra c.
o A rewall helps block malicious connec ons from cybercriminals
trying to access your computer or network.
o For enhanced security, you can install third-party rewalls in addi on
to your OS's default rewall.
6. Be Careful with External Devices
o When using USB drives or other external storage devices, ensure they
are scanned for viruses before accessing les.
o Avoid using external devices from untrusted sources, as they could
contain malware that can infect your system.
7. Encrypt Sensi ve Data
o Encrypt sensi ve les on your computer so that even if they are
stolen, the data will remain unreadable without the encryp on key.
o You can use built-in encryp on tools or third-party encryp on
so ware to protect important documents.
fi
ft
ffi
ti
ti
ti
fi
tt
fi
fi
ti
fi
ti
fi
fi
ti
fi
ti
ti
ti
ti
ti
Basic Rules for Safe Internet Usage
1. Use Secure Websites (HTTPS)
o Always check if the website you are visi ng uses HTTPS (indicated by
a padlock icon next to the URL) before entering any sensi ve
informa on such as passwords or payment details.
o HTTPS ensures that data sent between your browser and the website
is encrypted and cannot be intercepted by malicious actors.
2. Avoid Public Wi-Fi for Sensi ve Transac ons
o Public Wi-Fi networks are o en unsecured, making it easier for
hackers to intercept your data.
o Avoid accessing sensi ve accounts or making nancial transac ons
over public Wi-Fi unless you're using a secure VPN (Virtual Private
Network).
3. Use Strong Passwords and Enable Two-Factor Authen ca on
o For online accounts, use strong passwords and enable two-factor
authen ca on (2FA) wherever possible. This adds an extra layer of
security.
o With 2FA, you’ll need to provide something you know (a password)
and something you have (a one- me code sent to your phone) to
access your account.
4. Be Cau ous with Emails and Links
o Don’t click on suspicious email links or open a achments from
unknown sources. These could lead to phishing a acks or malicious
websites.
o Always verify the sender’s email address before responding or
clicking links in emails, especially if they ask for personal or nancial
informa on.
ti
ti
ti
ti
ti
ti
ft
ti
ti
ti
ti
fi
tt
tt
ti
ti
ti
fi
ti
5. Use a VPN (Virtual Private Network)
o A VPN encrypts your internet connec on, making it di cult for
hackers to track your online ac vity, especially when using public
networks.
o It also helps you access geo-restricted content by masking your real IP
address.
6. Monitor Your Online Presence
o Be mindful of what you share on social media. Avoid oversharing
personal details that could lead to iden ty the or social engineering
a acks.
o Adjust privacy se ngs on your accounts to limit the visibility of your
posts and personal informa on.
7. Avoid Downloading Suspicious Files
o Download so ware only from trusted websites. Avoid downloading
les from pop-up ads, unfamiliar websites, or torrents.
o Malicious so ware can o en be disguised as harmless les, so ensure
you are downloading from reputable sources.
8. Educate Yourself on Phishing and Scams
o Be aware of phishing scams where a ackers pose as legi mate
ins tu ons to steal your sensi ve informa on.
o Look out for red ags such as urgent requests, incorrect grammar, or
suspicious email addresses.
By following these rules for safe computer opera ons and internet usage, you can
signi cantly reduce your risk of being exposed to cyber threats. Each category
focuses on di erent aspects of security, but both are crucial for maintaining a safe
online and o ine experience.
fi
tt
ti
fi
ti
ft
ffl
ft
ff
fl
tti
ft
ti
ti
ti
tt
ti
ti
ti
ft
ti
ffi
fi
ti
The Criminal (Amendment) Act, 2013: Legisla ve
Remedies for Online Harassment and Cyberstalking in
India
The Criminal Law (Amendment) Act, 2013: Legisla ve Remedies for Online
Harassment and Cyberstalking in India
The Criminal Law (Amendment) Act, 2013, also known as the Nirbhaya Act, was
enacted to strengthen the legal framework against crimes, par cularly those
targe ng women. The amendment addressed several pressing issues, including
online harassment and cyberstalking, acknowledging the growing prevalence of
technology-driven crimes. Below is a comprehensive explana on of the act's
implica ons for tackling these issues.
Implementa on Challenges
1. Enforcement:
o Cybercrimes require advanced tools and exper se to trace
perpetrators, which many law enforcement agencies lack.
2. Awareness:
o Vic ms o en remain unaware of their rights and legal remedies,
preven ng them from seeking jus ce.
3. Jurisdic onal Issues:
o Cybercrimes o en cross geographical boundaries, complica ng the
prosecu on of o enders in interna onal cases.
Conclusion
ff
ti
fi
ti
ti
ti
ti
ft
ti
fi
ft
ti
ff
ti
ti
ti
ti
tf
ti
ti
ti
ti
ff
ti
The Criminal Law (Amendment) Act, 2013, marked a watershed moment in
addressing crimes against women, including those in the digital realm. By
criminalizing cyberstalking and online harassment, the act adapts the legal
framework to the evolving nature of crime in the 21st century. However, e ec ve
implementa on, awareness, and technological capabili es are essen al to fully
realize its poten al in comba ng online abuse.
ti
ti
ti
ti
ti
ff
ti