0% found this document useful (0 votes)
313 views98 pages

Cyber Safety Manual

Cyber safety

Uploaded by

chinnu sneha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
313 views98 pages

Cyber Safety Manual

Cyber safety

Uploaded by

chinnu sneha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 98

CYBER

Safety
HANDBOOK FOR STUDENTS OF SECONDARY & SENIOR SECONDARY SCHOOLS

BE S LET
MAR S
T ON
LINE
Year of Publication: 2020
CBSE in collaboration with Cyber Peace Foundation
ACKNOWLEDGMENT

Patrons:

Sh. Ramesh Pokhriyal 'Nishank', Minister of Human Resource Development, Government of India.

Sh. Sanjay Dhotre, Minister of State for Human Resource Development, Government of India.

Ms. Anita Karwal, IAS, Secretary, Department of School Education and Literacy, Ministry of Human Resource Development,
Government of India.

Advisory, Editorial and Creative Inputs:

Our gratitude to Ms. Anita Karwal, IAS, for her advisory, editorial and creative inputs for this Manual during her tenure as
Chairperson, Central Board of Secondary Education (CBSE).

Mr. SN Pradhan, IPS, Director General, National Disaster Response Force (NDRF).

Sh. Anurag Tripathi, IRPS, Secretary, Central Board of Secondary Education (CBSE).

Dr. Antriksh Johri, Director( Information Technology),Central Board of Secondary Education (CBSE).

Dr. Joseph Emmanuel, Director( Academics),Central Board of Secondary Education (CBSE).

Dr. Biswajit Saha, Director( Skill Education& Training),Central Board of Secondary Education (CBSE).

Sh. Rakesh Maheshwari, Group Coordinator, Cyber Laws and e-Security, Ministry of Electronics and Information Technology (MeitY).

Dr. Debarati Haldar, Professor, Legal Studies, Karnavati University.

Dr. Manoj Sharma, National Institute of Mental Health and Neurosciences (NIMHANS).

Dr. Rachna Bhargava and Dr. Rajesh Sagar, All India Institute of Medical Sciences (AIIMS).

Dr. HK Kaul, Developing Library Network (DELNET).

Value adder and Co-ordinator:

Dr. Praggya M. Singh, Joint Secretary (Academics), Central Board of Secondary Education (CBSE).

Capt. Vineet Kumar, President, Cyber Peace Foundation.

Content Developed and Curated by Cyber Peace Foundation:

Ms. Neelam Singh | Ms. Karuna Bishnoi | Ms. Janice Verghese | Ms. Akanksha Kapur | Mr. Kumar Vikram | Ms. Aditi Pradhan
Ms. Dhruvi Shah | Ms. Jemisha Bhalsod | Ms. Ayushi Shukla
CONTENTS
INTRODUCTION 1

01 DIGITAL ACCESS 4

02 DIGITAL LITERACY 9

03 DIGITAL COMMUNICATION 15

04 DIGITAL COMMERCE 24

05 DIGITAL ETIQUETTE 29

06 DIGITAL HEALTH AND WELLNESS


42
CONTENTS

07 DIGITAL RIGHTS, FREEDOMS AND


RESPONSIBILITIES
49

08 DIGITAL SECURITY 55

DIGITAL LAW 72

USEFUL CONTACTS 82

USEFUL RESOURCES 83

ANSWERS 84
INTRODUCTION

T
Social norms have impeded girls’ access to opportunities,
echnological advances are changing the world in ways including the access and use of digital devices and the
that could not have been imagined. The emergence of internet. Many of them belonging to socially or economically
advanced digital innovations are providing new opportunities marginalised families in rural, semi-urban and urban areas
to connect and learn, and have begun influencing every aspect have either no access, or limited, or supervised access to
of human life. digital technologies, which could enable them to exercise their
agency, autonomy and rights in an increasingly
Children and young people have shown greater ability to adapt interconnected world.
and adopt digital devices and innovations, which augurs well
for the future. They use the devices and apps for a variety of The exploration of new vistas and acquisition of rich
functions, including self-expression, communication, experiences online require a strong element of caution. After
networking, research, entertainment, and much more. The all, every light has its shadow. The technologies can be
internet has enabled children to become active social agents misused or overused in ways that are detrimental to the users
and to mobilise for social, ecological and other causes. They and even non-users.
are increasingly able to project their voices with
unprecedented reach. UNICEF in its Child Online Protection in India report in 2016
had presented the following typology of risks and threats
However, an assumption is often made that young people
have superior skills with digital technology, which surpass
those of their parents and teachers.

It may or may not be right. Many young people are confident


in using a wide range of technologies and often turn to the
internet for information. They seem able to learn to operate
unfamiliar hardware or software very quickly and may take on
the role of teaching adults how to use computers and the
internet. But the confidence with digital technology can also
be misleading.

Many of them frequently struggle when applying them to


research tasks. They can find it difficult to work out whether
information on an unfamiliar website is trustworthy, and rely
on their chosen search engine’s rankings for their selection of
material. They may not understand how search terms work or
of the powerful commercial forces that can result in a
particular company being top of the search engine’s list. They
may not be aware of the lurking risks and threats and the fact
that some of their actions can invite them trouble.

Furthermore, the digital skills and knowledge are not evenly


spread amongst all young people. Dearth of research on the
subject has prevented a nuanced analysis of who are most
likely to lag behind in the opportunities afforded by
technological advances. However, there is general agreement
among those working on cyber safety and security among
children and young people that gender is a major impediment.
1 | Introduction
Figure 1: Manifestations of child online threats, abuse and exploitation in india

Cyber bullying Online sexual Online attacks


exploitation & frauds

Online sexual Cyber


abuse radicalization Online enticement

GROOMING

Production and Ideological Attacks on devices: Harmful behaviour: exposure


Emotional Sexual
consumption of child indoctrination malware infection to inappropraite content,
harassment harrassment
sexual abuse materials and recruitment Access to alcohol and drugs

Exposure to Illegal behaviour: cheating


Defamation Sexual solicitation Threats or act of
inappropriate plagiarism, gambling,
& exposure Aggressive sexual solicitation extreme violence
content: Pharming drug trafficking

Commercial sexual Identity theft:


Blackmail and Self-harm:
Imtimidation exploitation and phishing, hacking,
financial extortion sexting, self-exposure
trafficking privacy breach

Social
Malvertising
exclusion

Producing and
consuming pirated
music and videos

Financial fraud

Enticement to
drug trafficking

Source: UNICEF India Report

The above classification presents a birds’ eye view of the risks and threats which contribute to the vulnerability of
children and young people in the digital age. The other side of the coin is resilience among them, which needs to be
3 | Cyber Safety Booklet for Children

nurtured and strengthened in order to empower them for the challenges and opportunities introduced by digital
technologies.

The optimal safeguard for children is to facilitate their access to the internet, protect their privacy, encourage
self-expression, and ensure that they can recognise potential dangers and know what to do about them. The concept of
digital citizenship has emerged as a useful framework of various facets that need to be developed and strengthened.

2 | Introduction
Basically, there are nine elements of digital citizenship

Digital Access:
Equitable distribution of technology and online resources is an
important issue from the perspective of human rights and social
justice.

Digital Literacy:
Understanding technology and its use is the basic condition for
optimising its benefits.

Digital Communication:
The electronic exchange of information with other people, through
emails, cell-phones and instant messaging, constantly and
without delay.

Digital Commerce:
Increasing buying and selling of goods and services has opened
vistas for the sellers, service providers, and consumers.

Digital Etiquette:
Digital etiquette describes the norms or appropriate and
responsible behaviours while using technology devices.

Digital Health and Wellness:


Digital well-being is balancing your online and offline lives and
using tools efficiently to make the most of technology and the
internet.

Digital Rights, Freedoms and


Responsibilities:
A collective sense of rights and responsibilities is important in a
digital society for maintaining social harmony.

Digital Security:
Awareness of potential online risks, threats and attacks and the
ways and means of preventing them are important skills to have
in an interconnected world.

Digital Law:
At the core of digital citizenship are basic ethics, which are
reflected in national and international laws.

3 | Introduction
D I G I TA L A C C E S S
Digital technology is primarily used these days with new
physical communications media, such as satellite and fibre
optic transmission. A modem is used to convert the digital
information in the computer, mobile phone, and other such
devices to analog signals for the phone line and to convert
analog phone signals to digital information for the computer.
1.1 WHAT IS DIGITAL ACCESS?

Analog Signal
The telecom market is very competitive with various mobile
companies trying to offer the best and cheapest plans which
has led to the world’s cheapest mobile data packs being
offered in India. A study conducted across 230 countries over
a period of one month found that Indians pay an average of
Rs 18 for a gigabyte of data compared to the global average
of Rs 600. The internet usage in India has exceeded half a
billion people as of December 2018. The usage is equal for
both rural and urban India with mobile phones being the
primary source to access the internet.

1.2 NEWER VISTAS WITH DIGITAL


Digital Signal

DEVICES AND INTERNET

Technological innovations can be seen everywhere, in our


homes, classrooms and in our surroundings too. The
following categories of devices perform different but
interlinked functions.

a) Mobile phones, desktop and laptop computers, tablets


b) E-readers, e.g., Kindle.
c) Dongle and Wi-Fi router.
d) Internet connected printer.
e) Internet Of Things (IoT) Devices: Smartwatches, Smart TV,
Smart refrigerators, home assistants (e.g., Alexa, Google
Home and Siri).
f) Whiteboards and smart boards in smart classrooms.

These innovations have made lives easier than ever, but


misuse and exploitation can lead to unanticipated risks. The
Internet is an interconnection of networks that uses internet
protocol to link devices worldwide. With digital devices and
access to the internet, several functions can be performed
quickly and simultaneously. For instance: sending and
receiving email, using social media, watching movies and
television series, accessing large open information library
from millions of websites, and writing blogs.

4 | Digital Access
1.3 NAVIGATING THE CYBERSPACE Administration Of The Cyberspace

Internet And The World Wide Web The internet and world wide web do not respect territorial
boundaries, the role of the national laws and mechanisms is
The internet may be considered as a vast network that limited in the management of the cyberspace. The servers of
enables an individual to obtain any kind of information most internet service providers are in the United States and
available. “The world wide web, commonly known as www, is Western Europe which is beyond Indian law or any other
one of the most used legitimate platforms to navigate using national law. International law provides for some
search engines like Google, Yahoo, Bing and DuckDuckGo. mechanisms for negotiations on varied aspects of
This is just the tip of the iceberg.” cyberspace management and security. One example is the
global consensus of unacceptable child sexual abuse
A Minute on the Internet in 2019
material put online leading governments to cooperate to
Estimated data created on the internet in one minute
bring down the pages.
https://www.statista.com/chart/17518/internet-use-one-minute/

Digital technologies allow users to go beyond national and


geographic boundaries where the government could block
internet service providers. The government can also place
restrictions on internet service providers with regards to any
content deemed illegal or offensive.

The No Go Zone: Deep Web And Dark Net

Public Pakistan had banned YouTube for about three years following violent protests
Frequently used sites such as Facebook, Twitter, Amazon across major cities against the uploading of an anti-Islam film on the site in
September 2012. It permitted a new version of YouTube, which allowed the Pakistan
which makes up about 4 to 6 percent of internet usage. The Telecommunication Authority (PTA) to seek access to offending material to be
blocked within the country.
remaining 94 or 96 percent is the Deep web and the Dark
China has blocked Google, Facebook, Twitter and Instagram, as well as thousands
Net. of other foreign websites, including The New York Times and Chinese Wikipedia,
over the past decade. Nonetheless, it has not disrupted the access of Chinese
people to internet. A range of Chinese websites such as Baidu, WeChat/Weixin,
Sogou, So 360) perform the same functions even though with a strong dose of
censorship.
DEEP WEB
A network where data is stored in
inaccessible databases. It includes all web
pages, websites, networks, and online
communities that are intentionally and/or
unintentionally hidden that cannot be WATCH
accessed using Google or other regular
search engines. The deep web is used for
activities such as hacking and piracy.

DARK WEB
An encrypted network that is available to a selective group not
accessible by all which is accessible via authorization, specific
https://www.youtube.com/watch?
software, and configurations. This is a marketplace for illegal goods v=yABC7LzJLLg&t=5s
such as drugs, firearms, and stolen credit cards numbers. The dark
web is also used for human trafficking, exchanges of child
pornography due to anonymity.

5 | Digital Access
The idea of a network of computers was thought of in the early 1960s. It
was tried in different ways, and finally ARPANET was created. WIth time,
many more changes were made and finally the internet became what we
see it as today.

Source: Presentation by Dr Govind Former Senior Director, MeitY, and Ex CEO, National Internet Exchange of India and Advisor, Cyber Peace Foundation

1.4 BARRIERS TO DIGITAL ACCESS society to digital technologies. This is often due to biased
perception of women and girls not needing internet or for
Over the past few years digital access has become easier their safety they are restricted. Equal opportunities for all
with devices becoming cheaper and more widely available. A ages and gender needs to be established.
range of smartphones from expensive to inexpensive are
available with competitive packages offered by internet
service providers.

Some attributes that define the people who are more likely to
have digital access include:

* Working knowledge of English as most of the applications


are presented in English.

* The knowledge of how to use a computer and related WATCH


technologies.

* Easy access to digital devices and the internet.

* Ownership of the internet connected digital devices


this enables the individual to receive and send information
quickly compared to those who are not good at using
technology. https://www.youtube.com/watch?
v=JoxHL6EvPd8

Accessibility is uniform in that both urban and rural areas use


the internet to gain information. However, socio-cultural
barriers have restricted access to some important groups in

6 | Digital Access
ACTIVITY 1

THE FOLLOWING WORDS HAVE TO BE ENCRYPTED USING DIFFERENT ALGORITHMS.


For example, in the -2 series, every letter in the word gets replaced by the letter preceding two places in the alphabet. So 'apple'
will become "ynnjc", "tree"will become "rpcc" and so on. In the +1 series, every letter in the word is replaced by the next letter in the
alphabet. So "cat" becomes, "dbu", "sit" becomes "tju". Using similar algorithms, find the encrypted terms.

1. Deepweb (use -2 series) 2. Darknet (use 1st to last switch)


Bccmucz Accnvcz Tenkrad Dkarent
Bccnucz Accmvcz Tendark Tenkard

4. Bytes (use -1,+1 series) 3. Bits (use +5 series)


Zasfr Bxtim FNYX GNYX
Czsfr Azsfr FMXY GMYX

5. Analog (Replacing vowels with vowels and -1 for consonant)


Emikuf Arediq
Epunah Emikof
ACTIVITY 2

EVERY INDIAN SHOULD HAVE DIGITAL ACCESS.

Do you agree with this statement? Provide at least three reasons in support of your answer.

2 3

1
D I G I TA L L I T E R A C Y

2.1 WHAT IS DIGITAL LITERACY?


Digital Literacy is one of the important 21st Century Literacy
Skills. Digital literacy is the ability to use digital technology
safely while staying within the bounds of social responsibility.
It allows students, who are increasingly getting access to
digital devices and the internet, to learn how to minimise risks
and maximise benefits that come with using digital
technologies. For instance: many students enjoy playing
online games, however, they need to understand the potential
risks associated with online gaming and accordingly take the
necessary

2.2 EIGHT COMPONENTS OF DIGITAL


LITERACY
precautions. One such precaution includes installing a good 1. Functional skills .
antivirus software in order to protect personal information 2. Creativity.
that is stored on your digital devices. Therefore, in order to 3. Critical thinking and evaluation.
become a digitally literate individual it is important to 4. Cultural and social understanding.
understand the different components within digital literacy. 5. Collaboration.
6. Ability to find and select information .
POINTS When did you
TO last update the 7. Effective communication.
REMEMBER antivirus 8. E-safety.
software on your
digital devices? WATCH

Have your
digital devices
been installed
with antivirus
software? https://www.youtube.com/watch?
v=YQq3hTHw6TQ

9 | Digital Literacy
Functional Skills Oh
! T
ha
Wh t‛s g
ere rea
d t.
s rea id yo
Functional skills include the three Rs : reading, writing and nt
ist d t
his
u
S cie d n ?
d! n ca e
arithmetic. In order to be a digitally literate individual, any ou
Da e f that spac
v s
a
h he in
e
student must know how to complete basic internet searches, fis ath
e
br

work on spreadsheets etc. This allows you to access and use


the several technologies present in devices, creatively and .c
ws ve
om
es
ne emo ll dl
ng a han
critically. This not only provides students with a new ki to r m
t !
ai f a o ia
W w. ve fr ed
a
ww l h ost l m
l a
I‛ is p oci

approach to their learning content but also develops their th e s


th

professional skills. Other functional skills also include online


banking, for instance, many students use apps such a
Zomato, Amazon, Swiggy and so on, wherein they use online
payment methods. Everyone must know the safe way of
sharing financial and personal information so that the risks of
financial frauds, privacy breach, identity theft, unauthorised
access and siphoning of money are minimised.
IDENTIFYING FAKE NEWS
Cultural And Social Understanding
11
10
9

Children and young people are actively using digital media


8
7
6
5
4
3
2
1

to participate in social and cultural life outside school.


Making and sharing media has become an important part of
how children communicate with each other these days.
Children have to know how to negotiate information in text,
Creativity visual, audio and so on and how to represent meaning
effectively and creatively through these media. Children
Digital technologies facilitate self-expression, creativity and
create and edit their own cartoons, videos, animations,
learning by enabling users to use different tools present. For
music or other media and share these with friends. Many
instance: many young adults use social media platforms
children may be sharing videos, YouTube, jokes, photos etc
such as Youtube, Instagram, Tik Tok etc. To create content
with their friends with the aim of having fun or
and share it with their friends and other audiences. This has
communicating with them. Digital literacy will help to
become a new form of self-expression, wherein, individuals
expand and extend your creative use of technology actively
create an ‘online persona’. However, in many cases this can
in your social and cultural interactions.
lead to negative consequences as many social media
personalities tend to overshare information about their
Collaboration
personal lives, which may be used against them. Thus, they
must learn to review the content they share online and should Collaboration is working among and across personal and
only provide information that is essential and absolutely global networks to achieve common goals. Due to the
necessary. interconnected world, the effects of what is happening in
one place can have repercussions in other places, what is
Critical Thinking And Evaluation affecting a few can affect very many.

Critical thinking is essential to being digitally literate as you


learn not to take information available on the internet at its
face value. It is important to pause and reflect when surfing
online as careless decisions online could lead to
miscommunication or exposure to cybercrime.

10 | Digital Literacy
The following message was circulated through WhatsApp in
Ability To Find And Select Information
India in 2018. It seemed credible due to its style of
Online browsing has made research much easier but in presentation and language. But careful scrutiny and
many ways more challenging. Now one has easier access to investigations revealed that it was false. The United States
virtually endless information. The challenge is to check the has banned the import of Kinder Joy, due to their import
veracity of the sources as well as the information. laws banning all commodities containing anything inedible
inside, in this case the toy packed in Kinder Joy.
Is the author listed on the information/news?
However, this news was presented in a slightly modified
If yes, they are claiming personal responsibility manner, and the messages implored readers to ban the
for the information that is being conveyed. If the
information is inaccurate, their reputation and chocolate as it was claimed to be harmful to health.
01 probably career could suffer. Has the author
mentioned the resources used? If yes, this can
help verify the information. BFF BFF
last seen today at 13:25 last seen today at 13:25

A date shows if the information is current.

Information changes very fast, thanks to the


Internet and to verify if it is still valid, a date is
necessary. The information may not be relevant 02 5:18 PM

or credible if there is no date at all.


5:18 PM

Are you Serious???? 5:20 PM Are you Serious???? 5:20 PM

Is the domain credible?


Type a message Type a message
The domain names say a lot about websites,
.com, .edu, and .gov are among the most
credible domain endings for websites. Other
03 variations are much less credible. So check the
URL name. If any of those three options end a
URL, it indicates the website’s credibility. Online resources for digital education
Countless resources on the Internet provide information about digital
Is the website designed properly? technologies. Some are free while others seek payment for access to the
full range of information materials. For example:

Web design is surprisingly important in verifying E-Pathshala, initiated by the Ministry of Human Resource Development
a website’s credibility. If someone didn’t put work
into their website to make it look good, you can’t 04 (MHRD) and the National Council of Educational Research and Training
(NCERT), hosts resources for teachers, students, parents, researchers
trust that they’ve put the necessary effort into and educators that is available on the Web, Android, IOS and Windows
verifying their information. platforms. A wide variety of print and non-print materials, including
textbooks, audio, video and periodicals can be accessed online or
downloaded for offline use at
Are the spelling and grammar in the writing correct? https://en.unesco.org/covid19/educationresponse/solutions

The logic is simple - it reflects how seriously the Khan Academy makes available a range of online tools and short video
lessons on its YouTube™ channel and website www.khanacademy.org,
production and dissemination of information is
which students can use to understand various lessons and concepts
05 taken. If there was no attempt to check the
grammar and spelling, probably the accuracy of
easily.

the information was not checked carefully.


Various open source resources, video lectures on YouTube™, skillshare
and GitHub are available to enhance technological skills, including
Credibility of information. software development and coding. Your teachers can recommend other
useful websites and portals. And you can also do your own online
Everything on the internet or on a social network research.
should not be taken at face value. A lot of
motivated or misleading information and fake
news is circulated through networks. An 06
unbiased judgement based on critical thinking
can help determine if the information is
trustworthy. The recipient of information needs
to decide on the veracity of the message, if need
be cross-checking it from multiple sources.

11 | Digital Literacy
Effective Communication

WATCH

https://www.youtube.com/watch?
v=bXYi-b6tiV8&t=79s

Digital technologies now facilitate immediate


communication which may be one to one, one to many, or
among many. This can be through voice calls, video calls,
instant messaging platforms, SMSes, etc. To be digitally
literate, students must understand how to engage in this form
of communication safely and responsibly.
WATCH

WATCH

https://www.youtube.com/watch?
v=fcHtksYEt-Y

E-safety https://www.youtube.com/watch?
v=-nU07_041t4&t=5s

Put simply e-safety refers to staying safe online, and as


internet-accessible devices are given to people of younger
ages, it's important that we're able to protect them from
harmful content and services. This includes: cyber-bullying,
pornography, online exploitation, cyber crimes etc.

12 | Digital Literacy
ACTIVITY 1

State whether the following statements are true or false

a) The domain name of any website does not, in any


way, indicate the website’s credibility.

b) When reading offline, the resources may take


several seconds to open as the entire file is encrypted.
However, once that process is complete, pages open
rapidly.

c) Critical thinking is one of the components of digital


literacy that involves the process of evaluating
information, questioning it, and determining if it’s
worthwhile or not.

d) E- Pathshala, an initiative of Ministry of Electronics


and Telecommunication (MeitY) and the National
Council of Educational Research and Training
(NCERT), hosts resources for teachers, students,
parents, researchers and educators.

e) Critical thinking not only improves our functional


skills but also facilitates learning and provides new
avenues for professional advancement.

f) Digital literacy involves the ability to read,


understand and interpret digital processes whereas,
digital communication is the ability to communicate,
connect and interact with others.
ACTIVITY 2

Is the information given below reliable or not?


Give reasons to support your answer.
D I G I TA L
C O M M U N I C AT I O N
In a simple one-way communication, there is a sender who
uses a medium such as a phone to send a message to a
receiver. Verbal communication involves someone speaking
and someone listening. Interpersonal communication occurs
when the sender and receiver exchange their roles, and speak
3.1 WHAT IS DIGITAL and listen to each other through a process that facilitates

COMMUNICATION understanding, agreement or disagreement. Visual


communication involves someone showing a visual product
Digital communication is the ability to read, understand and (e.g., a picture, video, animation) and someone watching.
interpret digital processes to connect and interact with
others. It can help stimulate social relations in cyberspace. Digital communication in the virtual world can allow for
The users are able to stay in touch with friends or make new interaction between more than one person such as an email
friends. Those who are not good with social relations can use can be copied to many people. However, it requires a balance
it to compensate and build new positive relationships. between the real and the virtual world.

Mobile phones are the primary source of access to the Real versus virtual lives
internet in India. The world’s cheapest mobile data packs
have been offered in India as mobile companies in a
competitive telecom market have tried to offer the best and
cheapest plans. A study conducted across 230 countries Real lives Online lives
over a period of one month found that Indians were paying an
average of Rs 18 for a gigabyte of data compared to the
global average of Rs 600. Not surprisingly, the number of Offline activities Online activities
internet users in India was more than half a billion with the
usage being equal for both rural and urban areas. Direct socialising Social networking

Face-to-face communication Text messaging

Personal Interactions Internet connections

Life in local community Life in worldwide web

Relatively private existence Greater public interactions

Circuitry of digital
More engagement demands More escape opportunities
communication

Limited information Unlimited information

Careful communication Less inhibited communication

Greater responsibility for Evasion of responsibility possible


personal actions with perceived anonymity

History remembered History recorded (digital footprints)

Parents feel more in control Parents feel less in control

Box 3.1: Circuitry of digital communication

15 | Digital Communication
Everyone needs to be conscious of the differences between Social media has provided children with a platform to
real and virtual life and use technology in a way that it does express themselves to a limited audience - typically those
not become a substitute for real life communication but who are similar and have comparable values, beliefs and
remains a smart additional channel which is not allowed to attitudes. As a result, it has made communicating with
compromise basic good interpersonal communication skills different people more difficult.
essential for success in all aspects of our life.
There is a tendency to use internet as a substitute for real
In-the-moment communication through instant messaging, relationships and the content we encounter online can
texting, and posting comments online is common. It does not influence us by creating an artificial digital environment.
allow enough time to reflect, react and respond on the basis Moderate use of the internet and a balance between offline
of informed understanding of conversations that are getting and online lives is crucial for adding value to our life and work
rude or mean. But learning to exit such conversations is while minimising risks and harm. Being smart online means
essential. You may have to sign off instant messaging, not being aware of the potential threats, opportunities and risks
respond to a rude text, or stop yourself from posting a that might occur without losing sight of the things that are
comment on Facebook or Instagram. most important in our lives.

3.2 OPPORTUNITIES AND RISKS


Responsible Sharing
Online activities provide an opportunity for expressing our
opinions, testing attitudes, and exploring identity and social
relationships. But many of us are tempted to take risks, often
under the misperception that we are anonymous online.
Sometimes we show weak control over the time spent online
activities, and setting and focusing on priorities. Outdoor
activities are essential for good health and can also help to
prevent excessive use of digital devices and addiction to
online activities, such as gaming.

Take responsibility for your online


The expansion of the internet has led to a shift from communication.
face-to-face communication to digital communication. Even
people in close proximity can be found exchanging messages
on their mobile phones.

Forward information or posts only after verifying the source


and contents.

Avoid sharing posts that are


offensive or obscene.

16 | Digital Communication
Many parents overshare pictures of their
children online and in the process undermine
their right to privacy, cause embarrassment,
hurt and bullying, and damage online
reputation.
Personal information that you share can be used against
you. Review the content that you wish to share online and Sharenting reveals aspects of children’s life on
only provide information that is essential and absolutely social media without their consent. They may
necessary. be too young to fully understand but it is
important to consider the consequences from
their perspective. Posting of a picture of a child
with a funny caption, relating to their hair or
facial expression, could upset them when they
are older or make them a butt of bullying by
others. Every post contributes to a record of
photos, shared links and comments. This
record is hard to delete and can shape the
child’s online reputation.

Sharenting and its risks


Use trusted sources for downloading online. Downloading
songs and movies from untrusted sources may be illegal and
“Stranger Danger”
you should not be sharing these with your friends. Use
trusted websites or platforms, like Google Play Store, Apple
As in real life, there are strangers, acquaintances and friends
App Store etc.
online. How one communicates, how much and what kind of
information is shared depends on the equation and level of
Personal Responsibility For Information trust people have in one another.
Posted Online And Sent Via Text
It is important to choose online friends wisely. Be wary of
“Posting Photographs” new online friends. Do not trust them easily because who
knows who they are. There are many cases of people faking
Often family, friends, acquaintances and strangers post identities with not so good intentions. They may be people
photographs on social networking sites. Usually they do not known to you, who wish to dig out more information out of
seek consent of the person whose photograph they post. you. They may be strangers, who wish to gain and then betray
While their intention may not be bad, the photograph can be your trust.
misused by a wide variety of other people. It is a good idea to
convey your concerns if you do not want your photographs
posted.

17 | Digital Communication
“Grooming” child will respond to, they may try all of the above in an effort
to win the child’s attention and interest.
Sometimes strangers, or even people who are known, build an
emotional connection with children and young people online Inform and discuss with friends, family members, teachers or
or face-to-face to gain their trust for the purposes of sexual anyone you trust any annoying or uncomfortable occurrence
abuse or exploitation. Many children and young people begin or activity such as extra friendly behaviour, cyber stalking,
to feel that a special friendship or relationship is developing bullying and strange behavior online.
and do not understand that they are being groomed.
“Grooming” is subtle but has serious consequences.
Viewing Inappropriate Content

While accessing the internet you may come across content


that is not suitable for your age, the content may include
images or information adult in nature, maybe sexually explicit
or very violent. Accessing inappropriate content is possible
through websites, gaming apps or by clicking links which may
be intentional or unintentional. One way to avoid this is to use
apps and games that are suitable for your age.

I keep receiving unwanted vulgar


pictures and links to sexually explicit
content. I don’t like this.
Please make it stop!

Hi !

Recognize Ways That People Online May Seek


To Persuade You.

a) Bribing: This can range from offering money and gifts. The
gifts may even be in the form of points or lives and in-game
rewards in an online game. If you are going through something similar,
do not hesitate to report such profiles.
b) Flattery: Constant attention and praise can be a way of
winning the affection of the targeted child.
Gaming
c) Sexualized games and intimacy building: Gradual introduc-
Games can offer children a way to escape from the real world
tion of subtly sexual allusions in conversation or during play
and immerse themselves in a virtual world. Increasingly,
are used to test the child’s vulnerability. If the child positively
children play games on mobile phones, consoles, laptops,
responds to his overtures, he will attempt to build further
computers, portable gaming devices and social media. While
intimacy with the child.
playing you could interact with other gamers through a
microphone or a webcam. Cybercriminals can find a way to
d) Desensitization: They try to desensitize the child to sexual
victimise children through befriending them online,
acts by showing the child, pornography and child sexual
cyberbullying or sharing inappropriate content. Children
abuse imagery. Constant exposure to explicit content may
should be made aware of the risks and how to handle certain
‘normalize’ sexual behavior for the child and ‘desensitize’
situations.
her/him.

Potential Risks Associated With Online Gaming


e) Threats and blackmail: They employ forceful coercion to
gain access to the child. a) Some games let children play and chat with anyone in the
world. There are many aggressive players online who may
f) Scattergun approach: When they do not know what the bully you.
18 | Digital Communication
Some players play simply to bully or harass others. They may 3.3 SAFETY AND SECURITY DURING
use inappropriate language or cheat others. It is important for
you to be careful.
ONLINE GAMING
GOOD PRACTICES:
b) Some young people through online games are abusing the
fear around the challenge to encourage others to self-harm HOW YOU CAN PROTECT YOURSELF
and carry out various dares and post the results online under WHILE PLAYING GAMES ONLINE
the guise of some game challenge. Do not give in to such
Prudent Selection Of Games To Play

Good practices: How you can protect yourself while playing games online
provocation and/or challenge. Stop playing such games and
inform your parents/ elders. a) Check the age classification of the games you want to
play. Stick to the ones that have been indicated for your
c) Many adults and cyber criminals pretend to be children age group.
while playing online games. They may try to befriend you by
giving tips about the games, sharing points with you and b) Never install games downloaded from free online
trying to win your trust. They may use this opportunity to get gaming websites that are not reputed. Never download
your personal information or influencing you for a one-to-one games by clicking on links received on mail or text
meeting. message or through a pop up.

d) Some games may have content which might upset you. Protect Personal Information
This could include violence, horror, or sex or induce you to
self-harm. Do not play these games and talk to an adult if you a) Always install a good antivirus software on your

are upset. computer, smartphone or other handheld devices.


Regularly update the antivirus and other applications.

e) Online games are sedentary in nature and children can be


involved for long periods without moving around. It is good b) Do not share personal information like name, date of

advice to take breaks every hour or alternate online games birth, address or phone numbers while playing online

with outdoor activities. games.

f) Be aware of when you feel like you might be getting c) Never share your passwords with anyone. You should

addicted to online gaming. Check if your online games, use a complex password for your online gaming account

stop you from seeing your friends or family. and other online accounts. It is a good practice to change
your password at regular intervals.

i) Take the place of doing homework


ii) Make it hard to stop thinking about playing d) Never use voice chat or webcam while playing online

iii) Make you unable to stop playing, even when you need to games. This may share your identity with other players and
sleep. attract cyber bullies and other cyber criminals.

If you feel this is happening, it’s a good idea to get support.


Talking to someone you trust, preferably an adult or a e) Never share your or your parent's credit card/debit card

professional counsellor. Either they may be able to help or details with anyone when you are playing online games.

help you find someone who can help. They may ask credit or debit card details. Never share such
details with anyone.

Know the risks, exercise good judgment and seek advice.


What you do online has the potential to affect everyone – at
home, at school and around the world. Practicing responsible
WATCH
online habits benefits the digital community.

https://youtu.be/kvgJIFn_e04

19 | Digital Communication
Know How To Respond To Online Challenges
A class 8th girl’s Instagram account was hacked by one
a) Know the tools that are available to deal with aggressive of her classmates. He used her account to send obscene
or inappropriate conduct online. Learn how to block, mute, messages and videos to her friends and also to all the
delete and report on the games and consoles being used. people who were added in her account. Next day her
friends didn’t talk to her nicely and those who did were
b) If you face any challenge in online gaming world, rude in their behaviour. The girl did not understand the
immediately inform your parents or elders so that they can situation and this kept on happening for a week. The girl
support and guide you. was in despair and asked one of her friend as to why is
everybody avoiding her. She was surprised that all this
c) Never meet in person with someone from your online had happened. She spoke to her friends, clarified the
gaming world. In real life they may be very different. Cyber situation and sorted the problem. The problem that still
criminals may befriend you and try meeting you or getting remains is that her account is still being used by
your personal information. They may have wrong intentions. someone even though most of her friends have reported
that account.

Learnings: Always make sure that you use strong


passwords and do not reveal them to anybody, not even
your best friends. Make sure that if something like this
happens, you tell it to your parents, elders, and teachers.
Also in such cases report to cybercrime branch of the
police.

Revenge Pornography

“An act whereby the perpetrator satisfies his anger and


frustration for a broken relationship through publicising false,
sexually provocative portrayal of his/her victim, by misusing
the information that he may have known naturally and that he
may have stored in his personal computer, or may have been
conveyed to his electronic device by the victim herself, or may
Limits In Friendships
have been stored in the device with the consent of the victim
Set limits to your online friendships as well as online herself; and which may essentially have been done to defame
communication with real life friends. There has to be a limit to the victim.”
what you share or exchange in terms of written words,
Teenagers in the age-group of 14 to 18 years are the worst
photographs or videos. Remember, once online, you may not
victims of revenge porn as well as the perpetrators
be able to control who will actually see it, prevent breach of
themselves, which is a matter of concern. Some teenage
trust and misuse and potential risk and harm to your person
students who have been in a relationship and end it find their
and reputation.
explicit photographs circulated on social media platforms or
tags her in the pictures or sends her a link. When such
images go viral, students are often harassed and bullied by
their peers – branded with insult and in the end, isolated. A
teenager may be targeted by her jealous classmates, her
ex-boyfriend or even an unknown friend on social media who
20 | Digital Communication
may be victimising her because she stopped communicating However, teenagers need to understand gender relations.
with him when she realised the dangers of online Boys must learn to interact with girls on equal terms and
relationships. respect them and their desires as those of human beings, not
simply as objects of respect or desires. Consent must be an
important part of relationships. Pictures,
videos and other material shared in
confidence cannot be published on social
media without the permission of the person
just because the other person does not want
to continue in the relationship. Youngsters
must learn to cope with rejection as it is a
part of life but not the end of the world.

Revenge pornography can lead to students dropping out of


schools and preferring to stay home or change schools. This
may make students go into depression or feel isolated. WATCH
Students often do not report such cases to teachers or
parents due to the fear of the problem becoming bigger.
While some teenagers may know the dangers of sexting, peer
pressure forces them to indulge in this as due to peer
pressure and not wanting to be left out of the group. Children
should not succumb to peer pressure, especially to take risks
of this kind which can be extremely embarrassing and
damage their reputation. In extreme cases children have been https://www.youtube.com/
driven to suicide. Do not give in to pressure. If you lose your watch?v=0AxfdpuyHS4&t=148s
inhibitions you also lose control. Once you have pressed the
enter key you cannot retrieve your message and may make
yourself vulnerable to potential harm and exploitation.
21 | Digital Communication
ACTIVITY 1

Classify the following statements as legitimate or illegitimate


while chatting with online friends or while surfing
online websites/gaming.

Statement 1 – If you disclose your age and address of your residence,


you shall be getting 350 bonus point for the current session of the game.

Statement 2 – I like the way, this conversation has been continuing,


I wonder what it would be like to catch up with you in real life.

Statement 3 – I have all the details of all our conversation in this chat box,
if you do not send me pictures that I ask you for, I would make these
conversations public, without hiding our identity.

Statement 4 – I am sending you some video attachments,


and after watching the same, you have to send me similar videos.

Statement 5 - Hey tell me the sizes of your chest and waist,


so that accordingly, we can design a costume for you, before entering
into the next level of this gaming session.

ACTIVITY 2

Substitute one word for the following statements

A way of communication where a sender who sends a message


through a medium to a receiver is known as
A
involves an act of giving constant attention and praise
in order to win the affection of the targeted child.
B
offers young people a sense of escape from the reality

C
of the world and, at times, it can make them feel that they are a part of a
community.

An act of posting, or distributing, or sharing of any sexually explicit images or

D
videos of the victim on the social media websites to take revenge against a
broken relationship is known as

ACTIVITY 3

What steps should be taken while playing an online game,


which involve interactions with strangers?
D I G I TA L
COMMERCE
through an electronic medium, without the use of checks or
cash. It’s also called an electronic payment system or online
payment system. The electronic payment system has grown
increasingly over the last decades due to the growing spread
of internet-based banking and shopping. As these increase,
4.1 WHAT IS DIGITAL COMMERCE? improve, and provide ever more secure online payment
Digital commerce is about the users undertaking legitimate transactions the percentage of check and cash transactions
and legal exchanges using digital technologies. The new will decrease. But you are also susceptible to financial frauds,
digital economy has improved the choices of goods and involving privacy breach, identity theft, unauthorised access
services to the consumers. They can choose what they want and siphoning of money.
from a wide array of products offered by an ever expanding
market of online vendors. The virtual market place is assisted Individuals also face a form of fraud called phishing or
by a growing network of financial and other service providers. vishing. Malvertising and piracy are also common risks of
Websites provide outlets for sales of goods and services. A engaging in digital commerce.
growing number of brands are available online to consumers
https://securionpay.com/blog/e-payment-system/

directly through their own platforms or through aggregators.

PAY
ONLINE

E
24/7 SAV%
50

a) Buy and sell (e.g., Amazon, Flipkart, eBay, Facebook What Is Phishing Or Vishing?
“marketplace”,...).
b) Book travel (e.g., IRCTC, MakemyTrip, RedBus.in, A target or targets are contacted by email, telephone or text
booking.com). message by someone posing as a legitimate institution to
c) Book hotels (e.g., Trivago). lure individuals into providing sensitive data such as
d) Order food (e.g., Zomato, Swiggy). personally identifiable information, banking and credit card
e) Sell used products (e.g. Olx, Quikr, ebay). details, and passwords. For instance: A student’s grandfather
f) Make payments (Paytm, Google Pay, Bhim, UPI, credit and recently told her about a credit card scam that happened to
debit cards, and netbanking). many of the residents in the old-age home where he lived. He
g) Advertise goods and services. told her that they were called by an anonymous number
h) Pay taxes (e-payment portals). posing to be a bank manager and asked for their credit card
details including the pin number. As a result, the scammers
4.2 OPPORTUNITIES AND RISKS wiped out all the cash from their accounts. They lodged a
WATCH
E-commerce has both risks and an abundance of
opportunities. One risk that individuals encounter is
e-payment methods. An e-payment system is a way of
making transactions or paying for goods and services
https://www.youtube.com/
watch?v=yjU8i66yQCM

24 | Digital Commerce
complaint regarding the situation which led to the scammers
g) Secure your digital devices linked with bank accounts with
being caught but most of them have not got their money
strong passwords and good antivirus software. Choose
back.
unique, non-guessable and meaningless passwords.

What Is Malvertising?
h) Computers in cyber cafes may not have updated antivirus
Malvertising It is the process of using advertisements to or may be infected with malware, which may compromise
infect your devices and systems with malware. These ads your bank details and other sensitive information such as
look legitimate and trustworthy, by one simple click will cause card number, expiry date, CVV, etc. Thus, avoid making
your phones and computers to be compromised. online financial transactions using a public Wi-Fi or a
computer in a cyber cafe.
What Is Piracy?
i) Disconnect the phone after receiving any call from anyone
Production and consumption of pirated music, software, claiming to be a service provider, who seeks sensitive
games and videos is common but illegal. information to avoid deactivation of your number or making
a just too generous offer. Immediately call customer care to
4.3.1 How To Avoid These Risks? check if such a call is genuine.

KaGyaa
Aaj

n
Keep your personal information
like birthdate, location etc.
personal. Sharing it publically
can put you in a vulnerable
situation. Do connect to secure public network whenever possible. In
the event that you are unable to connect to a secure
network, try to login only if it asks for registration.

Safety Measures:

a) Install a robust anti-malware and antivirus solution .

b) Be extra careful while visiting websites that ask for


personal and financial information . Check the website URL. HTTPS encrypts your data in the
your confidential information such as online account pass
c) Never click on suspicious email messages, especially
those offering loans and too good to be true deals.
which does not start with HTTPS.

d) Shop only at websites you trust. Check the security


features of new websites and the authenticity and customer Protect Your Device While Traveling
Update any software, including antivirus Protection, to make
reviews of the business. sure you are running the most secure version available

e) Keep the receipt, order confirmation number, and postal


tracking number safe.

f) Report if you do not receive merchandise of the promised


quality.

25 | Digital Commerce
Hazards Of Providing Sensitive Information
Online (Credit/debit Card Info, Sharing Otps,
Account Numbers, Etc)

Some of you may be using banking services such as debit


card, credit card, net banking, etc. at this stage but as you
grow up many more may start using these services. As a
smart citizen you must understand how online transaction
frauds can happen so that you can be safe yourself, teach
others in your family and friend circle.

Cyber Criminals Cheat People Online In


Many Ways

They may send an email to a bank account or credit card


holder from a fake account, which appears to be from their
bank or credit card service provider. The unsuspecting user
4.3.2 Cautious Browsing
who clicks on the link provided in the email is taken to a page
where he or she is asked to share details of the bank account
If the website looks strange, the address in the address bar
or card, card verification value and expiry date. Once such
looks off, or the site starts asking for information that it
sensitive information is shared, their bank or credit card
normally doesn't, check to ensure there is a lock icon in the
account is seriously compromised.
address bar, denoting a secure website, and click on the lock
to ensure that the website has a trusted, up-to-date
Posing as a bank employee, they may try to obtain credit card
certificate.
or bank details such as account number, personal
4.3.3 Online Purchases And Sales identification number (PIN), CVV, expiry date and date of
birth. Once such details have been provided, the account is
seriously compromised. As mobile numbers are usually
linked with bank accounts, posing as an employee of the
mobile service provider they may call and inform the user that
Download only from verified and secure sources like his or her mobile number will be disconnected if they do not
PlayStore and AppStore. Downloading from other update their Subscriber Identification Module (SIM).
sources may lead to your devices being infected by
malware. They attempt to make the user to click on a link or send an
SMS to a number shared by them. They claim that the link and

Resist the temptation to open emails and attachments number will connect the user with the service provider but are

from unknown sources, especially those offering actually trying to establish a connection with a duplicate SIM

special deals or surprises. For example: legitimate obtained fraudulently from service provider. If the

websites will send emails that are grammatically unsuspecting user falls in the trap, they use the duplicate SIM

incorrect. to transact online using the victim’s mobile number and


banking app.

Some offers may be too good to be true. Beware of WATCH


such offers as they may be fraudulent.

Compare the prices of the product at different sites to


https://www.youtube.com/
avoid being overcharged. Make payment only after watch?v=KpFMVHMhlfE&t=30s

you have verified the buyer and the products.

26 | Digital Commerce
The victims of such financial frauds experience serious Scams Using Ids Of Army Officials
problems. They end up being saddled with debts for monetary
transactions they have not done. In order to avoid liability for
debt repayment, they have to provide proof that they have
indeed been duped. The process can be difficult and Messages claiming you have won prizes
time-consuming.

Check The Website URL. Https Encrypts Your


Data In The Website And Protects It From Any
Kind Of Tampering. Do Not Share Your
Confidential Information Such As Online
Account Password, Card Number, CVV, Expiry
Date, Pin And OTP On The Website Which
Does Not Start With https.

Many scams are being operated using stolen/fake identities


of army officials.

WATCH WATCH

https://www.youtube.com/ https://www.youtube.com/
watch?v=UHzgYY7tgkk watch?v=6cXXsYBwrHQ

WATCH WATCH

https://www.youtube.com/ https://www.youtube.com/watch?

Scams using IDs of Army officials.


watch?v=gQtY4pua5eM&t=6s v=4dsFKIY-tYw&feature=youtu.be

WATCH

WATCH WATCH

https://www.youtube.com/
watch?v=0sAFjBFTf3c&t=29s

https://www.youtube.com/watch? https://www.youtube.com/watch?
v=TmgqNe_KjBg v=tO22q6ejk8w&t=8s

27 | Digital Commerce
ACTIVITY 1

Match the following terms with their definitions

Terms Definition

Phishing A Production and consumption of pirated music, software,


games and video.

Vishing A specific kind of software that blocks the user


B from accessing their devices/systems until a ransom is paid.

Malware C A phishing scam that infects multiple users at once.

An act of using the telephone in an attempt to scam


Ransomware D the user into surrendering private information
that will be used for identity theft.

Pharming A cybercrime in which a website's traffic is manipulated


E and confidential information is stolen.

Piracy Process of using advertisements to infect devices


F and systems with malware.

Substitute one word for the following statements


Malvertising Software designed with the intent to disrupt, damage, or gain
G unauthorized access to a computer system.

A
D I G I TA L
ETIQUETTE
c) Using mobile phones in classrooms, meetings and social
gatherings. Using cell phones to text while attending a class
is not appropriate.

d) Ping others late at night. There is a time for everything. Do


5.1 WHAT IS DIGITAL ETIQUETTE not disturb others at night. You may also not like to be
disturbed when you are trying to rest.
Digital etiquette is about being aware of and behaving in an
appropriate, responsible and ethical manner while using
e) Playing audios and videos loudly in public. It is rude and
digital devices and technology. This includes shaping your
inconsiderate to others.
digital reputation and being a responsible citizen of the
communities in which you participate, from school groups,
to games, to social networks.
Agree To Disagree

Make respectfully disagreeing the norm. Respect the


• Be positive in your online
Go behaviour opinions of your classmates. If you feel the need to disagree,
lde
rule n do so respectfully and acknowledge the valid points in your
s classmate’s argument. Acknowledge that others are entitled
• Treat others online the way you
wish to be treated to have their own perspective on the issue.

• Learn to say and accept “No”


Avoid Digital Drama
• Do not post anything that you
would not like to last forever
“Digital drama” in the form of hurtful comments,
mean-spirited rumours, and embarrassing photos, is a pretty
common online occurrence. Such posts spread quickly and
cause immense harm to someone. Perception of anonymity
may give a false sense of complacency and false bravado.
Lack of sensitivity or thought can impact friendships and
creates unnecessary and avoidable tension in the network
and community. Just think how you would feel if the same
happened to you.

5.2 OFFLINE ETIQUETTES ARE ALSO


ONLINE ETIQUETTES
Sometimes children use digital devices and technology in the
wrong context. For example:

a) Using mobile phones while talking to someone constitutes WATCH

a social faux pas or even an insult to the other person.

b) Texting while carrying on a conversation with someone is https://www.youtube.com


/watch?v=yv5H5jlATqg

very rude and shows disrespect.


29 | Digital Etiquette
Treat others online the way you wish to be treated. Before
5.3 BEING POSITIVE ONLINE
posting, ask yourself:
Students are encouraged to take an active role in building
- Would you say that to someone’s face? positive, supportive online communities. Here are some
- How would it make the person feel? things you can do to contribute to a positive online
- Could someone take your message the wrong way? environment.
- Will this hurt someone’s reputation?
- How would you feel if someone said that to you or wrote that
5.3.1 Posting Positive
about you?
As a responsible digital citizen, always review your
- Would you want your friends, parents or teachers to read this
messages and posts to be sure that they are not untruthful,
about you?
negative, sarcastic or rude.

5.3.2 Being Responsible, Honest And Truthful

Misleading others is a major breach of online etiquette. This


is true even if it is unintentional.

Check facts before providing information or giving advice


online. Misinformation will just add to the clutter of the
internet and waste people's time.

Avoid posting anything that is not true such as rumours or


gossip.

So do not be naive and forward that message hoping it will


bring you good luck. Many viruses are spread via chain
messages and invitations. If you wish to forward information,

It is easier to say hurtful or disrespectful things without make sure it is verified and shared with people you know.

standing face-to-face with someone, however, it is important


to remember that your classmates and teachers are real
people who are affected by the words you say and write. It is
essential to keep in mind the feelings and opinions of others,
even if they differ from your own. If you wouldn’t say it to
someone’s face, don’t say it online either.

If you feel hurt after reading a post from a friend or a stranger,


do not react with an aggressive reply. If hurtful post or
message is from a friend, request him not to do it again. If you
are repeatedly getting such messages/ posts, please inform
your parents or elders immediately so that they can support
you.

Also, please remember that as a good digital citizen you


should not share mean comments or hurtful messages or
embarrassing pictures/videos online. Please be careful and WATCH

check if your post/comment /videos can be embarrassing for


your friend or anyone else. If so, please don't post.

https://www.youtube.com/
watch?v=kuR0DK6O7_I&t=40s

30 | Digital Etiquette
Always ask permission before uploading someone’s pictures
Check The Accuracy Of Your Messages and posting personal details. It constitutes a violation of the
privacy of the person whose pictures or personal details have
Forwarding messages without checking their accuracy:
been posted.
This may contribute to the phenomenon of “fake news” and
rumour mongering.
Cluttering other peoples’ inboxes, which annoys most people.
Tagging your friends may seem harmless but it is important
Double check messages before hitting the send key. Pause
to get their consent. Everyone does not see things the same
and think about your posts, comments and e-mails before
way and you may strain your relationship.
you send it. Once you press the send key, there is no way to
take back the messages. Sometimes a message that is
5.3.4 Posting Positive
meant to be funny, may not come off that way at all because
the person on the other end cannot see your facial Do not post anything that you do not want to last forever.
expressions or hear the tone of your voice. Read your Before you say or post anything online, ask yourself, “Am I ok
messages again to see if they can be misunderstood. It is if this is never deleted? Once something is posted online, it is
best to discuss sensitive or difficult issues with the person likely to be there forever. As of now, there is no delete button
directly rather than posting something online or sending a or eraser for the Internet.
hurtful e-mail.
Avoid inappropriate use of technology. Users have a
5.3.3 Respecting People’s Confidence responsibility to use technology appropriately without
harming or inconveniencing others. Many users often use
The ability to keep information shared by someone in
technology inappropriately without understanding the
confidence reflects a strong character. Do not reveal the
consequences.
information online (or off-line) if the answers to the
following questions was “yes”.
For example, Spamming is the sending of unwanted bulk
messages indiscriminately through emails, internet forums,
- Was this information supposed to instant messaging, social networks, mobile text messaging,
be confidential? fax transmission, advertisements, and other networks.
- Will it embarrass the source of
information?
- Will sharing this information
compromise someone’s privacy or
create drama?

If the answer to these questions is “yes”, do not reveal the


information. That is what a good friend would do.

WATCH

https://www.youtube.com/
watch?v=0AxfdpuyHS4&feature=youtu.be

31 | Digital Etiquette
5.4 CYBERBULLYING AND
CYBERSTALKING VARIOUS FORMS OF CYBERBULLYING
• Making fun of another user in internet chat rooms.
A fine line separates bullying from teasing. Different people • Harassing a user over instant messaging sessions.
have a different threshold of tolerance for being able to take • Posting derogatory messages on a user's social
teasing or cyberbullying. Know and understand what networking pages.
cyberbullying is and never engage in that kind of behaviour. • Circulating rumours about another on social
networking sites.
• Publishing lewd comments about another person on
personal blogs.
• Posting unflattering pictures of another user on the
web.
• Sending unsolicited and unwanted email messages
(also known as spamming).
• Sending threatening or provocative emails.
• Repeatedly calling another person's cell phone.

WATCH

https://www.youtube.com/watch?
v=YzZjY3jjx5Q&feature=youtu.be

Teasing Versus Bullying “Trolling is also a type of cyberbullying, where repeatedly


harassing or intimidating comments are made.
a) Teasing typically happens among friends or kids trying to
fit in with their peers. The cyberbullies can be known people, known people hiding
their identities, or strangers who use digital technologies to
b) When it goes back and forth equally between kids, it’s send nasty text messages or emails, or set up hate groups
usually playful. If one person asks for it to stop, the other on social networking sites. The victim is often targeted
does so. constantly or periodically even when they are in the comfort
of their own home. The technologies enable them to
c) For adolescent boys, teasing is a “rite of passage”. circulate messages or images very quickly and widely on
Teasing can get rough, but it’s not meant to hurt the other the internet, which makes it very hard to combat
person. cyberbullying. Cyberbullying takes place between two
young people.
d) A bully fully intends to harm his or her victim and has the
power and the means to do so. This person might be more How To Deal With Cyberbullying?
popular or physically stronger, and the victim may have a
hard time defending himself. Prevent cyberbullying
a) Do not accept friend requests from unknown people on
e) Children who are seen as different or don’t “fit in” are social media platforms. A cyberbully can even create a fake
typical targets of bullying. This includes children who have a account to befriend children. As a rule of thumb, only add
disability, are overweight, or are thought to be homosexual. people online who you know offline.

Unacceptable Use Of Technology To Bully Others b) Remember what you post online remains there, so do not
share your personal information like date of birth, address,
Being at the receiving end of offline or online bullying can be and phone number on social media or other online
very distressing for anyone. Under no circumstances can platforms. You can go to privacy settings on social media
such behavior be considered acceptable. platforms to select who can access your posts online. Try to
restrict access of your profile to your friends only.
32 | Digital Etiquette
f) Block and if need be report using the site’s reporting
Think
Before you post function as soon as possible if someone makes you
uncomfortable on a social networking site.

Is it..... TRUE?
Is it..... HURTFUL? Cyberstalking is when an individual is repeatedly or

Is it..... ILLEGAL? constantly followed, watched or contacted through any

Is it..... NECESSARY? electronic means. The movement of the child is tracked and

Is it..... KIND? privacy is invaded or persistent efforts are made to contact


someone against their will through text, email, social media,
or other digital platforms.

How to stop Cyberstalking a child may be directed at sexually harassing a


child or for other malafide motives. It could be done by an
CYBERBULLYING
adult or an older child.

1
LOG OFF
the site where bullying is happening

2
BLOCK EMAILS OR MESSAGES.
Dont respond to them.

3
SAVE THE MESSAGE OR EMAIL Causing harm to somebody unintentionally through the
and show it to an adult.
use of technology.
4
TELL SOMEONE Unintentional Harm:
you trust
Cyberbullying has an adverse effect on the victim and can
cause emotional and psychological problems. Victims can
experience stigmas, shame and humiliation from peers.

STOP THE HATE Often they may report headaches, stomach aches that often
Always respect each other online, accompany nervousness and anxiety. They may also turn to
even when you disagree with them. self-harm in different ways. Being bullied can lead to low
#EndCyberBullying self-esteem and poor performance in school. In some cases
it can lead to depression with some children feeling hopeless
c) Do not install unwanted software and apps like dating App, and helpless about their lives. In extreme cases it can lead to
online games, etc. from unknown sources. Be careful of suicide by the victim.
revealing personal details or identity details if using common
spaces for online interactions. Just think. Would you like to be at the receiving end for these
possible consequences, even if these are unintentional?
d) If you feel upset after reading a post from a friend or a Consider the possible impact of your online actions. You may
stranger, do not react with an aggressive reply. Resist the cause a lot of harm to the child which can have a long term
urge to retaliate or respond immediately. It may encourage impact on personal well being as well as school
the bully to keep posting such messages. Take a break and performance. Will you be comfortable being responsible for
do something you enjoy doing to distract yourself. any of this?
WATCH
e) Convey your discomfort to friends and acquaintances
about hurtful posts or messages they may have shared or
sent with unequivocal request to not to do it again. If such
posts and messages persist, inform your parents or trusted https://www.youtube.com/

elders immediately so that they can support you. watch?v=5ubyLUgBEF4

33 | Digital Etiquette
What To Do When You Realise You Are A girl of class 9th was abused and threatened by a
Experiencing The Impact Of Cyberbullying / relative. She was tortured and sometimes even
Cyberstalking? drugged. The relative used to send her abusive
messages and threaten her that he will tell her parents
If a child has been the victim of cyberbullying or cyberstalking
that she has a boyfriend. She was scared to confide in
and/or is experiencing any of the signs of harm described
her parents because of the fear that her parents would
above, the child must immediately inform a trusted adult,
not believe her.
either parent, teacher, counsellor or relative. They will initiate
the actions required for addressing the offender as well as
Lesson: Keeping silent is not a solution to such a
take measures to provide help for coping with the ill effects.
problem. Never be scared of telling your parents the
This is in your interest; do not remain quiet about it.
truth. Make sure to complain about such problems to
Remaining quiet will give the offender confidence to trouble
the police and seek help from authorities whenever
other children as well. At the same time you will ignore your
needed. There are people willing to listen to you and
need for help and assistance to cope with the situation.
help in addressing your problems.

A class 10th girl was getting lewd phone calls and


messages from some anonymous number. She was
afraid to tell it to her parents because she knew her dad
was hot tempered and would try to harm the
anonymous caller by tracking him down. With this fear
this fear in her mind she didn’t bother to complain. The
phone calls and messages didn’t stop. She started
A 7th standard girl was blackmailed by an adult who kept
fearing that the boy can follow her too and sooner did
on asking the girl for her nude pictures. She explicitly
this happen. Wherever she went, he started following
refused every time he asked and blocked the person. The
her, be it her tuition classes, be it some outing spot. The
blackmailer hacked one of her social media accounts
situation became worse when he started clicking her
and took her photos and just to take revenge he morphed
pictures. The girl was frightened and she dared to
her photos and posted them online. The girl was
complain to the cybercrime branch.
embarrassed, agitated and even thought of committing
suicide.
Lesson: Always tell your parents or a trusted adult if
someone is troubling you. They would be able to help
Lesson: Be strong and face the situation wisely. Do not
you. Take the screenshots of such chats as proof, which
be afraid of such offenders. Report such crimes on the
can be shared with the police authorities.
social media platforms, cybercrime branches,
authorities who work for child development, child
helpline. Do not think of yourself as a victim.

Are you being


bullied, harassed or stalked online?

WATCH

5.5 TEACHER ABUSE BY CHILDREN


A recent trend observed is that some children are taking to
Reach out
To your parents, friends , school counselor or a trusted adult.
https://www.youtube.com/ online platforms to take revenge on their teachers either by
watch?v=YzZjY3jjx5Q&feature
=youtu.be posting derogatory comments with the name of the teacher in
a group, starting a discussion about them which attracts

34 | Digital Etiquette
other negative comments, posting explicit pictures or University Case
stalking either by impersonating someone or through
unauthorized access to teachers devices. All these activities Kyle Kashuv, a recent graduate of a high school in Parkland,
are unethical and against digital etiquette and at the same Florida in the US gained initial notoriety as an outspoken
time, several of these may attract legal consequences. advocate against gun control in the wake of the 2018
Parkland attack that left 17 dead. He had survived the
If students have issues concerning their teachers, which are incident but unlike many of his classmates who demanded
bothering them, they should approach the school stricter gun control measures, he argued for maintaining
administration rather than resort to such measures that can strong Second Amendment rights and successfully lobbied
get them into serious trouble. for the federal STOP School Violence Act, which included
several school safety measures in lieu of stricter gun control
5.6 ONLINE REPUTATION AND measures. According to his classmates, he was prone to

DIGITAL FOOTPRINTS expressing vile, blatantly sexist and racist views in person,
texts and shared google document. Not only did Kashuv
Internet users leave behind “digital footprints”, which can become something of a celebrity, he also was very
influence their reputation. It is made up of the content academically accomplished and won admission to Harvard.
created, posted and shared by the user, as well as the content
posted and shared by others with and about the user. It is But in May, the Huffington Post released a series of vile,
made up of information on websites they visit, emails they blatantly racist slurs made by Kashuv after receiving them
send, any information they submit online, and posts on social from Parkland students. Although Kashuv attempted to
media platforms. It can be positive or negative and affects delete the document, it was too late. He posted a Twitter
how people see the user now or in the future. So it is explanation for what he called “callous comments I made a
important that you know what kind of trail you are leaving, few years ago,” claiming “we were 16-year olds making idiotic
and what the possible effects of this trail can be. comments, using callous and inflammatory language in an
effort to be as extreme and shocking as possible. I’m
Make a positive footprint: The best way to keep your online embarrassed by it, but I want to be clear that the comments I
reputation in check is to use your time online to get creative made are not indicative of who I am or who I’ve become in the
and create a positive footprint. For example, why not write a years since.”
blog to promote all the great things you are doing, fundraise
for a charity using an online sponsorship page or create a Almost immediately, Harvard launched an investigation,
video to teach others something new. including contacting Kashuv for an explanation and
informing him that it reserved the right to withdraw offers of
Many social media platforms offer insights into the admission in situations where students behave in ways that
personality traits to the users. Their interest is expressed “brings into question your honesty, maturity or moral
once they accept the offer or take a related quiz. They give character.” Kashuv sent a letter of formal apology to Harvard,
their consent in this process or their consent is deemed. The but the university decided to rescind his admission and
social media platform and/or the app developer are able to rejected his appeal against its decision on the basis of
use the information trail left by the user to offer them the reports and his written sentiments.
results. This is indicative of the amount of information about
the users that the social media platforms possess. The reaction to Harvard’s decision to withdraw its offer of
admission to Kashuv was strong and loud. One perspective
was that a liberal institution treating a conservative youth
unfairly. After all, he was only 16 when he stated his racist
views and had subsequently apologized. The other
perspective defended Harvard’s decision as a proper and
necessary institutional rejection of racism. College
admissions are premised on the behaviour of young people.
As a private university, Harvard has every right to decide
which students will be admitted.
Source: Various media reports. See: Adam Harris “Harvard’s Drastic Decision” in The Atlantic. June 17, 2019.
Retrieved from: https://www.theatlantic.com/education/archive/2019/06/har-
vard-rescinds-admissions-offer-kyle-kashuv-racist-remarks/591847/

35 | Digital Etiquette
Protect Your Online Reputation scrutiny when it was revealed that it was selling
psychological data to candidates in the US Presidential
Use the simple checklist to help manage and maintain your election. The revelations have placed the practices and
online reputation. responsibilities of Facebook and other companies under
intense scrutiny, and raise questions regarding the
Search Yourself Online: Do you know what information about responsibility of the Internet industry.
you is available online? Do a simple web search of your name
and see what you can find. If you find something you are not
happy with, take the necessary steps to get that content Cambridge Analytica case and its
removed. Remember if your Facebook or Twitter pages implications for data privacy
appear you can change this by adjusting your privacy
settings. Political data firm Cambridge Analytica obtained the data
of 50 million Facebook users, constructed 30 million

Check Privacy Settings: Make sure you know what personality profiles, and sold the data to US politicians

information you are sharing on the websites you use, in seeking election to influence voters, without the users’

particular on social networking sites. Most social networking consent. The following are some facts of the case.

sites have privacy settings to help you manage the content


you share and who you share it with; you can decide if you A Cambridge University researcher developed an app

want your posts to be shared with your online friends and called ‘thisismydigitallife’ in 2014. The users had to

followers only or with the public. Keep in mind that your consent to give the app access to their Facebook profiles

friend’s content and their settings can also affect your digital and those of their friends in order to take the quiz. They

footprint. were to receive $1-$2 to take the quiz, which was


advertised to remote freelance workers on Mechanical
Turk, a crowdsourcing online marketplace controlled by
Think before you post Amazon.
Before you post that funny picture of your
friend, or make that joke about someone on Over 270,000 users took the quiz. But the app was able to
Twitter, ask yourself do you want everyone to access the full profile of over 50 million friends’ accounts
see it; friends, family, grandparents, future which, at the time, Facebook’s API (application
employers? Would you be happy for others to programme interface, i.e., the platform for building
post that type of content about you? You applications) allowed by default. The researcher obtained
should be proud of everything you post online, a licence from Facebook to harvest such data through its
remember once it is online it could potentially API ‘for research purposes only’. But he violated this
be there forever! agreement by giving the data to political data firm
Cambridge Analytica, which was co-founded by a donor to
the Republican Party in the US, and which reportedly paid
him $7 million for his efforts.

Cambridge Analytica matched the data of 30 million users


(out of the original 50 million) with other records to
construct personality profiles on millions of American
voters. It classified voters using five personality traits -
openness, conscientiousness, extraversion,
Deactivate and delete: when you stop using a social agreeableness, and neuroticism (OCEAN) to identify the
networking profile or website, it’s a good idea to deactivate personalities of American voters and influence their
or delete your account. This will mean the content is no behaviour, using psychographic modelling techniques.
longer live and should not be searchable online; it will also
remove the risk of these accounts being hacked without you In December 2015, the media found out that Cambridge
knowing. Analytica had sold psychological data to a candidate in
the US presidential campaign. It was reported that
Cambridge Analytica came under media glare and public
36 | Digital Etiquette
facebook claimed that it had removed the app once it
learned of the violation of platform policies. But did not
clarify what it did with the information that had already
been gathered. The researcher, Cambridge Analytica, and https://dig.watch/trends/cambridge-analytica
one of its former employees certified to Facebook that
they had deleted the data. But Cambridge Analytica WATCH
continued to sell the data to another candidate.

The investigations are going on with allegations of


Russian interference in the US election and ties with the
group behind the UK’s Leave EU campaign (Brexit) in 2016.
It has been reported that a large amount of the data is still
on the company’s servers even though it is not clear how
much the data actually contributed to influencing voters. https://www.youtube.com/
watch?v=q6xzoWCJJ44

WATCH

https://www.youtube.com
/watch?v=rCjrmg7nOzM

37 | Digital Etiquette
ACTIVITY 1

There is a fine line between cyberbullying and cyberstalking.

Cyberbullying Cyberstalking
ACTIVITY 2

What all should not be posted online?

DOB Location
Verified news Personal Details
Private Photos Mean/Hurtful comments
Mobile Number Forwarded spam messages

What precautions must be taken while sharing information


for legitimate purposes with known and trusted persons,
which should otherwise not be posted online.
ACTIVITY 3

Write down at least seven digital etiquettes.

ACTIVITY 4

List various forms of cyberbullying.


ACTIVITY 5

How can you protect your online reputation?


D I G I T A L H E A LT H
AND WELLNESS
6.2 OPPORTUNITIES AND RISKS
Mild use of digital technology is beneficial while excessive
use can have a negative impact.

6.1 WHAT IS DIGITAL HEALTH AND


Physical Health Problems And Obesity: As time spent on
WELLNESS? digital technology increases, time spent on physical activity
Digital health and wellness is the ability to use technology like is reduced, which might be a contributing factor to child and
mobile phones, laptops, desktops and tablets and not using adolescent physical health problems. Lack of physical
too much till the point where it hurts. Excessive and improper activity could be detrimental to the health and well-being.
use of technology could lead to lifestyle changes that affect
everyday life negatively. Limited Movement Of Limbs: When people spend
countless hours daily hunched over numerous types of
handheld devices with their heads bent forward, they are at
risk of developing “text neck.” Complaints associated with
text neck are neck, back, arm, finger, hand, wrist and elbow
pain, as well as headaches and numbness and tingling of
Seek help if you are neglecting Golden rules the upper extremities. There is a chance of developing
your routine activities, such as shoulder complaints.
personal hygiene, food and

water, time spent with your Eye Strain: Eye redness or irritation from staring at the
family and friends, physical bright backlight of screens for long periods, dry eyes due to
activities and offline hobbies. reduced blinking, blurred vision and general fatigue from
staring at screens and straining to see small fonts and
images are all symptoms of digital eye strain.

Hearing Loss: Prolonged exposure to high volume sounds,


Use technology with a
especially with ear plugs and phones, can contribute to
positive attitude and follow
Do not eat and surf the net hearing impairment. You can keep your hearing intact by
good practices to safeguard
at the same time. following the 60/60 rule.
your devices and their usage,

and your personal security.


Listen to any device at a maximum of only 60 percent of its
full volume for a total of 60 minutes a day. By taking this
advice as an early warning, we can protect the hearing that
Avoid excess of we have now, and carry on enjoying the wonders that sound
anything, including the brings to life.
time spent online. Set

screen time. Accidents: Avoid use of online activities like selfie, social
media use or any other online activities to avoid accidents
while you are on the move. Traffic rules also have made this
a punishable offence and invite fines. While it is good fun to
get good pictures to capture the moment, do not allow the
social media obsession for the ‘perfect’ selfie, or the
number of likes you get, influence your judgement or affect
42 | Digital Health and Wellness
your self-esteem or force yourself to compare yourself with • Do you seek new friendships with people met on the Web?
others. • Does the number of friends, likes and views on social media
affect you?
Abuse And Addiction: Excessive use may not be addiction. If • Is your academic performance in school getting affected?
the user is using digital technologies for genuine purposes, • Are you learning something related to your goals in life
e.g., home work, research, essential communication and through your online activities?
moderate leisure, and does not hamper other routine • Is your online time contributing to your school assignments,
activities, the time spent online may be justified. career goals, and entertainment?
• Is your online time contributing to your hobbies or special
WATCH
interests?

By answering these questions you

https://www.youtube.com/
should consider whether you need
to be conscious you are getting too
watch?v=4dsFKIY-tYw

absorbed in the technology and it is


affecting your normal activities,
Evaluate Your Own Online Use By Asking relationships and life and career
These Questions: goals and you need to regulate your
online time and activities.
• Do you check the phone first thing upon waking in the
morning?
• Do you check your phone frequently throughout each day? Discussion and negotiation with adults, e.g., parents,
• Do you have a hard time unplugging at night? guardians and teachers, do help in identifying if the quantum
• Do you look at the phone while in conversation with friends of use is excessive. But over a period of time, increasingly
or family? excessive use of digital technologies can lead to addiction.
• Do you picking up the phone whenever you are bored?
• When offline, are you preoccupied with getting back online?
• Do you forget doing homework or other household tasks for
being on the Internet?
• Have you lost all interest in the activities you used to enjoy
and spend a lot of time online?
• Are your online activities stopping you from spending time
with friends and family?
• Do you prefer being online than being around real, live
friends and family?

Nomophobia
“No Mobile Phone Phobia”, is the irrational fear of being
without your mobile phone or being unable to use your phone
and the services that the phone provides (especially phone
calls and Internet connection) for some reason, such as the
absence of a signal or running out of minutes or battery power.
A phobia is by definition an irrational fear.”

43 | Digital Health and Wellness


The WHO has recognised "gaming disorder" or a "pattern of 6.3 GOOD PRACTICES
persistent or recurrent gaming behaviour" in which people
lose control of their gaming behaviour, give priority to gaming 6.3.1 Everything In Moderation
over other interests and activities, and continue gaming
despite negative consequences, such as impairments in their Anything used in excess is harmful therefore it is essential
family relationships, social lives, studies or work or other that a balance between online usage and other tasks such as
areas as a mental health condition. school assignments, social interactions and outdoor
activities is maintained.
Real versus virtual life: Appreciate the distinction between
real life and virtual life. How many “likes” and “shares” a social Time limit for the use of digital devices. Setting limits for the
media post receives is not an indicator of popularity, or time spent with mobiles, laptops, desktops and tablets
personal worth, which should influence self-esteem. The enables the user to do other important things and lead a
“fear of missing out” or FOMO can be a strong driver, balanced and fulfilling life.
especially when others in school or friends circle share
images on social networks and can create a strong pull to be Setting screen time. Are you in the habit of constantly
part of the ‘in’ crowd. The principle of YOLO or “you only live checking notifications? Do you constantly wonder whether
once” reinforces the hedonistic idea that the one life one has your contacts have read your messages?
is meant to be enjoyed. But there is a very fine line between
trying new things and endangering yourself. With new online
challenges and trends coming up every day, make sure you
keep in mind your safety first.

Cyberbullying is known to cause depression, social anxiety,


and diminished quality of family and social relationships. It
may also lower academic performance and push the victim to
risky behaviour. It can be prevented with some help,
motivation and courage. Cyberstalking causes stress, anxiety
disorders, fear and psychological trauma regardless of the
fact whether the victim actually meets the harasser or not and
experiences a feeling of helplessness and maybe lack of
6.3.2 Periodical Digital Detox
support.Change in eating and sleeping patterns may also be
observed.It is advisable to immediately inform a trusted adult Find certain moments to disconnect yourself from a mobile
if such an incident occurs and seek help and not keep quiet phone. Switching off while having meals and sleeping, and
about it. setting “no mobile” or “silent mobile” time slots are not only
good but necessary. Place your phone at least 15 feet away
from you when you sleep at night. Keep it silent and resist the
temptation to check it before the morning. Turn off the mobile
phone while having conversations and interactions with
people.

Aerobic exercise will help to sustain strength, improve


cardiovascular conditioning, and counteract the strain of
sedentary computer use.

6.3.3 Sound Ergonomic Practices

Simple ways can prevent possible harms resulting from the


continuous use of mobile phones, laptops, desktops and
tablets.

44 | Digital Health and Wellness


Alternate tasks to make changes in your working position to Elbows: Avoid resting your elbows on the hard surface or
avoid making the same movements for prolonged periods of edge of your table. Use pads to protect your elbows if
time. Prolonged use of a computer keyboard and/or mouse necessary. Elbows positioned at 100 to 110 degrees when
can cause muscle aches and nerve pain. Customize your working help with a relaxed position at the keyboard.
computer to maximise comfort and efficiency by using your Elbows should be positioned at 100 to 110 degrees when
software. Adjust the screen font, contrast, pointer size, speed, working in order to keep a relaxed position at the keyboard.
and colour of the digital devices. This could require a slight negative tilt (front of keyboard
higher than back) when working in upright positions. If
(A) Posture reclined in your chair, the keyboard could be at a positive
angle to maintain this relaxed position.
Maintain good posture when working at the keyboard.
Sitting on a chair with back support is helpful. Wrists: Your wrists should be in a neutral or straight
position when keying or using a pointing device or
Neck and trunk: Avoid twisting or bending them. Avoid
calculator. Wrist rests can assist you in maintaining a
excessive reaching. Position frequently used items directly
neutral position when used properly during pauses. Float
in front of you and angled upward on a copyholder when
your arms above the keyboard and wrist rest when keying.
working.
Avoid planting your wrists on the table or wrist rest. This can
result in bending the wrists either up and down or side to
Shoulders: Keep your shoulders relaxed with your elbows
side.
close to your sides.

Hands: Your hand should be relaxed. Keep your fingers and


Feet: Keep your feet supported on the floor or on a footrest
knuckles relaxed when working at the keyboard. Avoid
when you work to reduce pressure on your lower back.
holding your pointing device tightly. Never hold a pen or
pencil in your hand when keying. Avoid hitting the keyboard
with excessive force. Studies have shown that the average
user hits the keyboard with four times the required force
when keying.

Eyes: Blink your eyes frequently while focusing on the


screen. Rest your eyes by refocusing on distant objects
intermittently when working. Take a one or two-minute
break every 15 to 20 minutes, or a five-minute break every
hour to stretch your limbs. Every few hours, get up, move

404
around, and do an alternative activity.

ERROR

RELOAD HOME

WATCH

https://www.youtube.com/
watch?v=9LgsWRacnuk&t=3s

45 | Digital Health and Wellness


(B) Positioning Use Only The Apps That You Really Need.

a) When writing at the computer, avoid excessive reaching a) Installing an endless number of apps (especially social
over the keyboard or work materials. Your keyboard, pointing networks) on your mobile phone can be a total trap. While
device, files and telephone should be within easy reach. A communication options multiply, a person suffering from
sturdy in-line copyholder can double as a writing surface if nomophobia needs to feed their addiction even more.
appropriately positioned. Therefore, not installing that many applications can be a
good way to avoid the temptation.
b) Use a keyboard tray to properly position your keyboard and
pointing device. b) In order to feel liberated, try a technology fast every
month where you actually go for a day or more without a
c) Use a copyholder positioned in line with your monitor and computer, tablet or phone.
keyboard.
Technology should improve lives and not enslave the users.
d) Position the monitor so that the viewed part of the screen That is why, using technology in a reasonable way will
allows you to keep your neck in a neutral or straight position. always be the smart choice. And if you are not able to do it
The monitor should be centred directly in front of you. The top by yourself, do not hesitate to ask for help.
of the computer screen should be slightly below the top of
your head, so that you are looking at it with a slightly 6.4 SHARING PROBLEMS TO
downward gaze. SEEK SOLUTIONS
Talking about the problem can be the first step to solving it.
e) Position your monitor to eliminate excessive glare or
If something upsets you online or you are worried about a
reflections from windows and lighting.
friend it can really help to talk to someone. There are lots of
people who can help you, such as friends, family members
and teachers. Talk to an adult who you trust. Talking about
a problem can often make you feel better. If you keep your
worries to yourself they can grow. It is a lot easier to solve a
problem when there are two heads working together on it.

Often we do not talk to our friends or parents about the


things we would like to because we feel embarrassed, shy
or ashamed. The thing to remember is that whatever it is
you are embarrassed about; a good friend is not going to
laugh at you or put you down. They will listen, try to
understand and try to help you feel better or find a solution.
And that’s why people find that talking to a good friend
about a problem usually does help.

https://www.ehs.pitt.edu/workplace/ergo-tips.html

You can also reduce strain by using features like swiftkey


which will help you type faster and more easily by simply
sliding your finger on you phone keyboard. You can also use
the option of “Sticky keys” on PCs to create shortcuts and
make your work easier.

46 | Digital Health and Wellness


The services that you use online should also offer a reporting School counsellors or teachers.
service, such as being able to talk to a moderator or report If your school has a counsellor, discuss your problem with
other players. It is important that you talk to an adult you trust them. They are there to answer your questions and provide
if anything has upset you or made you feel uncomfortable guidance and assistance. You may even approach a teacher
whilst online. Remember you can always call ChildLine on or school staff who you trust and feel comfortable speaking
1098. with.

Peers: Communicate with your trusted friends, especially Seeking help from experts.
those who know more about the problems or have had similar Professional expertise is available, although not everywhere,
experiences, without the fear of being judged. However, a to assist with various problems related with misuse or
certain level of knowledge and sensitivity is required for excessive use of digital devices and technologies.
solutions so do approach an adult who has your trust for
advice and support. The following institutions are well-known for their
expertise on digital health and wellness.
Parents: Speak with and seek help from parents if some kind
of “family agreement” has been arrived at through dialogue a) SHUT clinic (Service for Healthy Use of Technology),
within the family. National Institute of Mental Health and Neurosciences
(NIMHANS), Bengaluru, Karnataka.

b) Department of Psychiatry, the All India Institute of


Medical Sciences, New Delhi.

Open discussions and family agreements

Although the risk of abuse online is clearly serious, the capacity of most
children (and their parents) to protect themselves is often under-estimat-
ed. Open and informed discussions among parents and children about the
internet from an early stage can be the best defence against online
grooming and bullying.

Parents often seek the security of their children but they should not be
snooping, which can leave children feeling untrusted and increase the risk
WATCH
of self-harm. Ideally, a family agreement is a good way to start a
conversation with the whole family about how everyone will use the
internet and discuss together how to behave in a positive way when online
at home, at school or at a friends house.

https://www.youtube.com/
watch?v=5Htk0AmZkbg

47 | Digital Health and Wellness


ACTIVITY 1

Research online or offline to make a list of good practices to prevent and


reduce the following problems associated with excessive use of digital devices.

I. Eye strain :

II. Backache :

III. Carpal tunnel syndrome :


D I G I TA L R I G H T S ,
FREEDOMS AND
RESPONSIBILITIES
If any activity violates the community guidelines of a
social media platform, the post, comment, photo, video or
7.1 WHAT ARE DIGITAL RIGHTS? even the account can be deleted.

Digital rights are basically human rights in the digital era,


Snapchat Community Guidelines :
when internet is increasingly being regarded as a right rather https://www.snap.com/en-US/community-guidelines

than a luxury. The rights to online privacy and freedom of


expression are really extensions of the equal rights laid out in
the United Nations Universal Declaration of Human Rights. Instagram Community Guidelines:
https://help.instagram.com/477434105621119

According to the United Nations, disconnecting people from


the internet violates these rights and goes against
international law. Digital rights include access and Facebook Community Guidelines:

participation, free speech, community, privacy, physical and https://www.facebook.com/communitystandards/

psychological safety, safety of identity and of material and


intellectual property. But as Uncle Ben said in the Spider
Man, “with great power comes great responsibility.” The WhatsApp Community Guidelines:
https://www.whatsapp.com/legal/
responsibilities include knowing and respecting the
community standards and guidelines of all social media,
video platforms and online groups being used and staying Twitter Community Guidelines:

within the parameters of these guidelines. https://help.twitter.com/en/rules-and-policies


#general-policies

Children’s rights
Children’s rights Issues and modified for the
challenges digital age

Right to protection: * Differential access to technology by gender, * Dignity must be respected, protected and
rural/urban and geographic area, language, fulfilled online.
* From all kinds of discrimination (Art. 2). disability, etc.
* Creation and distribution of child sexual * Privacy, freedom from surveillance and
* From information and materials injurious to abuse imagery. censorship and right to online anonymity
the child’s wellbeing (Art.17e). * Exposure to violence. to be safeguarded.
* Grooming for abuse, exploitation and
* From arbitrary or unlawful interference with trafficking. * Control over personal data collection,
his or her privacy, family or correspondence * Cyberbullying, trolling and harassment . retention, processing, disposal and
and unlawful attacks on his or her honour * Blackmail and extortion. disclosure.
and reputation (Art.16). * Invasion of privacy and stalking.
* Misuse or exploitation of personal data. * Protection against harassment, hate,
* Against all forms of abuse and neglect * Misinformation and defamation defamation, crime and sexual exploitation.
(Art. 19), including sexual exploitation and hostility, hate.
sexual abuse (Art. 34), and other forms of * Persuasion and manipulation - suicide, * Children should be free to use the
exploitation prejudicial to child’s welfare (Art. self-harm, pro-anorexia, drugs. internet and protected from its risks and
36). threats based on evolving capacities.
(Source: International Convention on the Rights of the Child, 1989)

49 | Digital Rights, Freedoms and Responsibilities


Children’s rights
Children's RIghts Issues and modified for the
Challenges digital age

PROVISION:
* Life, liberty and security.
To support children’s right to life and development * Formal and informal learning resources and
(Art. 6) curriculam. * Access and use of a secure and open
To preserve his or her identity (Art.8) to education * Wealth of accessible and specialised internet, including addressing special needs of
to support development of his or her full potential information. disabled children.
(Art.28) and prepare them for a responsible role in * Opportunities for creativity exploration and
a free society (Art.29) to recreation and leisure expression. * Cultural and linguistic diversity on the
appropriate to their age (Art.31) to diverse * Digital skills and literacy. internet must be promoted and innovation
material of social and cultural benefit to the child * Ways to counter inequalities. should be encouraged to facilitate plurality of
(including minorities) to promote children’s * Expanded entertainment choices. expression.
well-being (Art. 17) to all measures for recovery * Access to cultural and heritage content online
from neglect, exploitation and abuse (Art. 39). in an equitable way. * Education through the internet, to culture
and knowledge online.

PARTICIPATION: * Enhanced networking opportunities. * The internet is a space for promotion,


* Ways of consulting children in diverse protection and fulfilment of human rights and
In all actions concerning children… the best situations and processes including consulting advancing social justice, including for all
interests of the child shall be a primary consider- them on education, research and online issues. children.
ation (Art. 3), including the right of children to be * Platform for children’s voices.
consulted in all matters affecting them (Art. 12); Child-led initiatives for local and global exchange * Seek, receive and impart information freely
see also child’s freedom of expression (Art. 13) * Peer to peer connections for sharing and and to associate freely with others for social,
and freedom of association and assembly collaboration. political and cultural purposes.
(Art.14) to information (Art.17) and to participate * Recognition of rights and responsibilities.
fully in cultural life (Art.31).

Table adapted from UNICEF and Child Rights in the Digital Age by Sonia Livingstone

The UN Committee on the Rights of the Child is in the process DO YOU KNOW YOUR RIGHTS?
of finalising a General Comment on Children’s Rights in
Right To Education
relation to the Digital Environment, which will provide global
guidance to all countries on how different stakeholders can
The right to education has been recognized as a human right
take measures to protect children’s rights.This will become
in a number of international conventions, including the
available shortly on the following website:
International Covenant on Economic, Social and Cultural
Rights which recognizes a right to free, compulsory primary
https://www.ohchr.org/EN/HRBodies/CRC/Pag education for all, an obligation to develop secondary
es/CRCIndex.aspx education accessible to all, on particular by the progressive
introduction of free secondary education, as well as an
obligation to develop equitable access to higher education,
ideally by the progressive introduction of free higher
education.

• Use technology in a
manner that respects
• Do not breach the community
• A right is the right the rights of others,
• Act within the law, follow • Read the fine print standards. If you do, the service
thing to do. Every including the right to
the norms of decency, and when you first use provider or administrator may
right comes with a privacy and free
pose no serious risk of an online service. intervene to take corrective measures,
corresponding speech.
harm to yourself and which can affect your digital footprints.
responsibility.
others.

50 | Digital Rights, Freedoms and Responsibilities


The Right To Privacy Right To Be Safeguarded From Violence,
Abuse And Exploitation
As discussed Article 21 of the Constitution of India states
that “No person shall be deprived of his life or personal liberty Children have a legal right in international and most domestic
except according to procedure established by law”. The right law to be safeguarded from abuse, including sexual abuse.
to life enshrined in Article 21 has been liberally interpreted so The legal responsibility is on the government to prevent
as to mean something more than mere survival and mere abusers from contacting children. The government needs to
existence or animal existence. It therefore includes all those take all measures to make the internet as safe as possible an
aspects of life which makes a man’s life more meaningful, environment through measures to prevent the creation and
complete and worth living and right to privacy is one such distribution of online child abuse imagery, sexual grooming,
right. and online dimension of child trafficking.

Right To Freedom Of Expression And The


Right To Be Heard

The freedom of speech and expression is regarded as first


condition of liberty. It occupies a preferred and important
position in the hierarchy of the liberty, it is truly said about the
freedom of speech that it is the mother of all the other
liberties. In modern time it is widely accepted that the right to
freedom of speech is the essence in the society and it must
be safeguarded all the time. The first principle of a free
society is an untrammeled flow of words in a open forum.
Liberty to express opinions and ideas without hindrance, and
especially without fear of punishment plays significant role in
the development of the particular society and ultimately for
the state. It is one of the most important fundamental
liberties guaranteed against state suppression or regulation.

Right To Be Forgotten

The right to have data about oneself erased or withdrawn by


service providers is the right to erase the past unwanted
history of a user by the social media and search engines, is an
Children’s Rights To Leisure And Age Appropriate
evolving concept which is being discussed in several fora.
Recreation
While legal experts are advocating the right to be forgotten
strongly in the context of privacy rights, it would take quite Children have a right to recreation and leisure as appropriate
some time before an agreement is reached globally on its to their age, an education that will support the development
scope and modalities. of their full potential and prepare them for responsible life in
a free society. To ensure this right, the government and
Personal information that you share can be used against educational authorities have to take measures to provide
you. Review the content that you wish to share online and educational technology, online information and creative
only provide information that is essential and absolutely resources and promote digital skills equitably, factoring in
necessary. differences in languages, access or conditions of disability or
disadvantage.

51 | Digital Rights, Freedoms and Responsibilities


The Right To Intellectual Property

In principle, children have the right to intellectual property.


The Indian Contract Act prevents minors from entering into a
contract but permits the claim of intellectual property rights
for their original creations through the legal process of
claiming copyright.

Most social media websites, including YouTube allow


children above the age of 13 to register. However, parental
guidance and monitoring is a must because the norms and
policies of websites need to be vetted carefully.

Children’s Right To Participation

This right includes the right of children to be consulted in all


matters affecting them, which is seen in conjunction with the
child’s freedom of expression, and freedom of association.
The government and its agencies, service providers,
educationists and school administrations and civil society
organisations are expected to provide children and young
people for their inclusion in diverse societal processes,
including consulting them on matters related to their
education, research and ICT governance when it affects
them.

Have you ever participated in any discussions in your


family and school about responsible use of digital devices
and internet?

The Right Of Access To Redress And Justice


https://www.youtube.com/
watch?v=5ubyLUgBEF4
Children have a right to justice. Ensure that children have
avenues for formal, including legal complaint in cases where WATCH
their online rights have been breached and the support to
make effective use of these complaints procedures. Children
have to be made aware of all these provisions and how to use
them if required. They also need to know who to go to for
guidance and support.
52 | Digital Rights, Freedoms and Responsibilities
ACTIVITY 1

If you find yourself in the following situations, which right would you exercise.
Match the following :

Situations Rights

A family friend is blackmailing you


The right of access to redress
into sending inappropriate images A
and justice
to him.

Your friend posts a picture of you without


Children’s right to leisure and age
consulting you. When asked
B appropriate recreation
to remove the picture they refuse.

On social media you have someone


The right to education and access
who stalks you and you want C
to information
to make a complaint.

A sport organisation does not let you


apply for its online cricket training
D Children’s right to participation
programme because you belong
to a lower socio-economic background.

Your school library bans an educational


book that is appropriate for your The right to be safeguarded from
E violence, abuse and exploitation
age group.
ACTIVITY 2

Think of real life examples, which illustrate realisation or


violation of your specific rights.
D I G I TA L
SECURITY
Malware

Malware is a type of malicious software designed to gain


unauthorized access or to cause damage to a computer
without the knowledge of the owner, stealing and even
8.1 WHAT IS DIGITAL SECURITY? deleting sensitive data, altering or hijacking computer
Tools such as anti-virus software, biometrics and personal functions to monitor users’ computer activity.
devices, e.g., the secure chip in a credit card or an ePassport
are digital security devices because they offer freedom to Ransomware
communicate, work, travel and shop using your digital
identity in a way that is secure. Ransomware is a type of malicious software designed to
extort money from the user. The attacker locks the victim’s
Digital security is an all-encompassing term, which includes computer system files or blocks access to files or the
the tools to secure technology, assets and personal identity in computer system typically through encryption until the
the online and mobile world. ransom is paid. Paying the ransom is no guarantee that the
files will be recovered or the system will be restored.

Your One-Up about Hackers

A hacker is someone who will gain entry into a computer


8.2 SECURITY OF DEVICES without permission, with the intention to use or exploit
technology to cause harm, steal or destroy the data
Smartphones, laptops and tablets are all open to wireless security
contained in it.
risks. Protect them against cyberattacks.

Usually hackers are well versed with computer technologies


8.2.1 Common Threats
threats to
Todevices
Devices by using various applications or programmes that penetrate
the defence mechanism employed by the target computer
Viruses on digital devices are malicious programme codes that
and send back the sensitive information like usernames,
can corrupt the system and destroy the data within the computer.
passwords, IP addresses and using them to gain access into
the computer itself.
These applications or programmes can be in the form of
Trojans, worms, malware and viruses, which will install in the
system and compromise its security. After all, if the hacker
can gain administrative rights, they’re free to do anything
with the data contained in the compromised computer
system.

55 | Digital Security
Several public locations like shopping malls and airports
among others offer their customers free access to public
Wi-Fi. But public Wi-Fi networks also enable cyber criminals
to spy on unwary customers, take advantage of this
convenience and intercept their data. They can access
sensitive information of users’ banking credentials, account
https://www.youtube.com/
passwords and other valuable information. watch?v=LSoFbqYr4ew

WATCH
8.2.2 Preventing And Countering Threats
And Risks

Install anti-virus software and ensure that is updated as f) Download apps from trusted sources like Google play,

regularly as possible. Some computers have built-in AppStore

anti-virus software too.


g) Keep webcams private
a) Regularly update software and operating systems
Web browsers, plugins (Java and Adobe Products) and even These devices can sometimes be hacked and used to take
Office Suites. It is the most common way hackers and pictures or videos of you without your consent. Put a sticker
malware try to gain access to devices and your information. over your webcam, laptop camera, or phone camera when
they are not in use.
b) Use privacy settings on mobile phones, apps and browsers
h) USB Storage Device Use
Privacy settings on social media platforms enable you to
select who can access your posts online. Try to restrict
• Always eject the device clearly to clear the content from
access of your profile to your friends only. Remember what
your computer and to avoid damaging your data.
you post online remains there almost forever.

c) Verify if the Wi-Fi link is legitimate and safe • Always scan the USB device with latest antivirus before
accessing.
Treat all Wi-Fi links with suspicion. Public Wi-Fi is inherently
insecure — so be cautious. The Wi-Fi link could also be a • Protect your USB device with a password.
bogus link set up by a cybercriminal trying to capture
valuable, personal information from unsuspecting users. • Encrypt the files/folders stored on the device.
Don’t connect to an unknown or unrecognised wireless
access point. Try to use known Wi-Fi links, which are • Use USB security products to access or copy data on your
password protected. USB.

d) Learn to create VPN to avoid downloading of data through • Do not accept a promotional USB from unknown persons.
public Wi-Fi.
• Do not keep sensitive information like username and
Use your mobile phone to create VPN If you need to access
passwords on the USB.
any websites that store or require the input of any sensitive
information consider accessing them via your mobile phone
g) Disable Bluetooth and Airdrop when not in use
network, instead of the public Wi-Fi connection.

Monitor your Bluetooth connectivity. Bluetooth is an amazing


e) Verify if the website is legitimate/authentic
feature on many smart devices. However, leaving Bluetooth
on while in public places can compromise your privacy.
Avoid logging into websites where there’s a chance that your
Bluetooth connectivity allows various devices to
identity, passwords or personal information may be
communicate with each other, and a hacker can look for open
compromised — for example, online banking services or any
Bluetooth signals to gain access to your devices. Keep this
websites that store your credit card information.
function on your phone and other devices locked down when
you leave your home, school, or similar secured area.
56 | Digital Security
AirDrop feature allows you to send any kind of content like Go for an extra layer of security by opting for two-factor
photos, videos, documents from one Apple device to another authentication (2FA), also known as two-step verification or
wirelessly. It doesn’t impose any restrictions or limits on the dual factor authentication. This security process requires the
file size. AirDrop makes use of the Bluetooth technology to user to provide two different authentication factors to verify
detect and pair with other Apple devices which are located themselves to better protect both the user's credentials and
within the range of Wi-Fi and Bluetooth. It is highly the resources the user can access.
recommended to turn on AirDrop only during file transfer.
Log out of your account when you plan to be inactive even for

8.3 OPERATIONAL SECURITY a short while. Always keep your system locked whenever it is
not in use.

8.3.1 Passwords

Strong, unique but easy to remember, and private passwords


are essential for dealing with unauthorised access to online
accounts. The passwords, when shared with other person(s),
can be misused. They may be stolen by unauthorized users to
collect and misuse your personal information.

Learn how to create strong passwords and passphrases. A


password must be difficult to guess. But you should be able
to remember it. Writing passwords somewhere is not
advisable. Memorise it. Your password is given to you to
maintain your privacy.
https://www.youtube.com/
watch?v=AYz1Gv0n8RI

Strong WATCH

Use at least 8 characters or more


to create a password. The more
number of characters one uses,
the more secure is the password.
8.3.2 Emails And Messages
Use various combinations of
characters. For example, create a
password consisting of a
combination of lowercase, Most email providers offer filtering services.
uppercase, numbers and special
characters.

The use of Rich Text Format instead of the standard .DOC


format will retain the formatting but not any macros. This

Unique
may prevent you from sending virus to others if you are

Avoid using the words from the


already infected by it.
dictionary as they can be
cracked easily. Do not use the
name of things located around DO DON’T
you. Do not use a password that
was used earlier.
• Use email filtering software to • Send personal information
avoid spam so that only through emails.
Do not use a password that uses messages from authorized • Click on the emails received
your personal information like users are received. from untrusted users and the
nicknames, phone numbers, date
of birth etc.
links that come via email.The
• Scan the attachment with act of clicking may execute
received messages with some malicious code and
updated antivirus software spread into your system.
before saving it. • Open attachments with emails
from strangers. They may
• Be very careful while contain a virus along with the
Secret
downloading attachments from message.
Do not share passwords with emails into your hard disk. • Send messages with
anyone, not even your friends. attachments that contain
executable code like Word
Be careful while entering a
password when someone is
documents with macros, .EXE
sitting beside you. files and ZIPPED files.
• Fill forms that come via email
Change the password periodically asking for your personal
or when you suspect someone to
know the password.
information.

57 | Digital Security
8.3.3 Security Settings On The Browser Data Accessibility And Privacy

• Update anti-virus software regularly. Certain online activities compromise the privacy of children.

• Adjust the settings in the web-browser. It may limit some


functionality but can provide the best protection from
malicious content.

• Enable email accounts for multi-factor authentication. Email


is the gateway to almost every other account a user may
have. When someone loses or forgets an account password,
the reset is sent to his or her email.

• Gauge the credibility of the website by checking the URL,


lock.

Filling online forms for surveys, contests, downloading


• Look out for warning signals given by web browsers about
games on commercial or free websites. Some websites
exposure to a malicious website or content. Such warnings
prompt the users fill-up their form for participating in
can protect the user from malware, phishing and identity
games, surveys and contests. The name, email id, age and
theft. These warnings given by most of the commonly used
gender, and at times the telephone number and postal
browsers like Chrome, Internet Explorer, etc. Remember to
address, obtained in this manner can be used to access
update your browsers regularly to avoid missing out on such
information.
updates.

Some requests are legitimate: much depends on the nature


• Exercise caution while giving details about personal
of the website requesting the information. Providing
information when registering for access to email accounts,
personal information online can result in a student being
social networks and chat rooms, and free game downloads.
targeted for spam (unsolicited email), advertising materials
and/or viruses.

Privacy issues also apply to students developing personal


websites and publishing online. Personal details, including
photographs of themselves or other students, may lead to
the information being captured and reused by others for
illegal purposes.

DO NOT OPEN OR DOWNLOAD ANY Use the following advice when browsing the web to reduce
FILES SENT BY UNKOWN SENDERS. your risk of being a victim of cybercrime. Settings and
THEY MAY CONTAIN MALWARE security models are different for each browser. Visit the
THAT CAN following vendor websites to learn more about the security

CORRUPT YOUR DEVICE AND settings in your browser.

STEAL YOUR DATA

https://www.youtube.com/
watch?v=1p2-YtsRcUg

WATCH

58 | Digital Securityt
INTERNET EXPLORER

APPLE SAFARI

59 | Digital Security
MOZILLA FIREFOX

GOOGLE CHROME

60 | Digital Security
Securing Browsers

Click on the three vertical dot top right side corner in the Chrome and select Settings. Or simply
type chrome://settings/ in the address bar.

People section

Click on Sync and Google services .


Google Chrome
Check if the Safe Browsing option, which offers protection from dangerous sites, is enabled.

Autofill section

Click on Passwords and disable Offer to save passwords.


Click Payment methods and disable Save and fill payment methods.
Click on Addresses and more and disable Save and fill addresses.

Advanced Section

In Privacy and security turn off the Allow sites to check if you have payment methods saved.
Click on Site Settings then Cookies and it is recommended to disable Allow sites to save and read
cookie data (recommended) and enable Block third-party cookies. Click on Location and make
sure that Ask before accessing (recommended) is set or you can block the location access by
simply toggling the button.

Click on Camera and make sure that Ask before accessing (recommended) is set or you can
block the camera access by simply toggling the button.

Click on Microphone and make sure that Ask before accessing (recommended) is set or you can
block the microphone access by simply toggling the button.

Click on Motion sensors and Block sites from using motion sensors by simply toggling the
button.

It is highly recommended to disable JavaScript for Security purposes but on disabling JavaScript
some webpages may not load properly. To disable JavaScript click on JavaScript and then block
it.

It also recommended to turn off Flash in Chrome. To check it click on Flash and make sure it
showing Block sites from running Flash (recommended).

Click on Pop-ups and redirects and make sure it is Blocked, if not block it.

Click on Ads check it is showing Blocked on sites that show intrusive or misleading ads
(recommended).

Click on Clipboard and make sure Ask when a site wants to see text and images copied to the
clipboard (recommended) is checked.

61 | Digital Security
Make sure your Safari is up-to-date to the latest version. To check for updates just go to the Apple
menu and click on Software Update.

Now it's time to secure Safari Preferences. Just go to the Safari Menu and click on Preferences.

Apple Safari
In General section uncheck Open “safe” files after downloading.

Select Remove history items as After one day.

In the AutoFill section uncheck the AutoFill web forms options.

On the Passwords section and remove any stored passwords.

In the Security section Check Fraudulent sites option.

In the Web content check Block pop-up windows.

It is recommended to disable JavaScript for security, but some sites may not load properly.

In the bInternet plug-ins uncheck Allow Java and also uncheck Allow all other plug-ins.

In the Privacy section-- Select Block cookies as From third parties and advertisers.

Select Limit website access to location as Deny without prompting.

First of all, click on the Tools icon in the top right corner in Internet Explorer and click Internet
options.
First of all it is recommended to Update Your Windows to necessary security patches.

In General section:
 It is recommended to change the Home page first. Change it to something reputed search
Internet Explorer
engine.
 Check the Delete browsing history on exit.

In Medium-high section:
 Set the Security level to High or at least Medium-high.
 Check the box Enable Protected Mode.
 Click on Apply.

In Privacy Section:
 Set the Settings to High or at least Medium High.
 Check the boxNever allow websites to request your physical location.
 Check Turn on Pop-up Blocker.
 Check the box forDisable toolbars and extensions when InPrivate Browsing starts.
 Click onApply.

62 | Digital Security
In Connection Section:
 Click on settings under theAutoComplete.
 Uncheck Box for Forms and also for User names and passwords on forms.
 Check Ask me before saving passwords.

Internet Explorer In Advanced Section:


Go for the Security section and select Check for publisher’s certificate revocation.
Select Check for server certificate revocation.
Select Check for signatures on downloaded programs.
Enable Integrated Windows Authentication.
Enable native XMLHTTP support.
Check the box of Use SSL 2.0.
Check the box Use SSL 3.0.
Check the box for Use SSL 1.0.
Click on Apply .
Click on Ok.
Finally restart the Browser.

To harden firefox security go fore the three vertical lines located in the top right corner in
Firefox browser and select Options.
OR, Just type about: preferences in the browser address bar also.

First thing Keep your Firefox Up to date for best performance, stability and security and also
make sure Automatically install updates (recommended) is selected in the General section.
Mozilla Firefox

In the Search section make sure you have selected a trusted search engine in the Default
Search Engine.

In the Content Blocking area of Privacy & Security section make sure the Standard protection
or Strict protection is selected. Strict protection may cause some sites to break but Standard
protection will be good enough.

In Cookies and Site Data check the option Delete cookies and site data when Firefox is closed.
It will delete all of your cookies after you close the Firefox browser.

Check the Ask to save logins and passwords for websites option in the Login and Passwords
area.

Check Use a master password. It will pop up a window where you can set a master password. A
master Password is used to protect sensitive information like site password. If you create a
Master Password you will be asked to enter it once per session when Firefox retrieves saved
information protected by the password.

In History select Use custom settings for history and uncheck Remember browsing and
download history and Remember search and form history and also check Clear history when
Firefox closes.

63 | Digital Security
In Permissions Click the Settings right beside Location and add the trusted sites which can
access the Location.

Click the Settings right beside Camera and add the trusted sites which can access the Camera.

Click the Settings right beside Microphone and add the trusted sites which can access the Mozilla Firefox
Microphone.

Check Block websites from automatically playing sound and also you can set exception for the
sites which trust.

Check Block pop-up windows and also you can set exception for the sites which trust.

Check Warn you when websites try to install add-ons to prevent anty third party website to
install add-ons in the browser.

In the Firefox Data Collection and Use uncheck Allow Firefox to send technical and interaction
data to Mozilla.

Uncheck Allow Firefox to make personalized extension recommendations.

Uncheck Allow Firefox to send backlogged crash reports on your behalf.

In the Security make sure that Block dangerous and deceptive content is checked.

Check Block dangerous downloads option.

Check Warn you about unwanted and uncommon software.

Select Ask you every time when a server requests your personal certificate.

Check Query OCSP responder servers to confirm the current validity of certificates.

Always install Plugins and Extensions from official Mozilla foundation. To install add-ons in
Firefox go to Add-ons by going that three vertical lines mentioned earlier and install as per your
requirements.

https://www.youtube.com/
watch?v=uoMfcvDxlKQ

WATCH

64 | Digital Security
8.3.4 Beware Of Strangers And Suspicious Links

Taking regular data backups is an important strategy for securing all your important data. A backup is the only way to restore
the original data.

Why you must have Data Backup

Data on a hard disk can be lost for a variety of reasons, such as:-

- Hardware failure;
- Operating system failure, e.g., file system crash.
-Files or volumes modified or deleted accidentally by yourself.
-Files or volumes modified or deleted intentionally by intruder.
-Files or volumes modified or deleted by virus or malicious
codes.

Back Ups

You can also take a backup of your data to keep it safe.


Many companies like Apple, Xiaomi, Samsung have inbuilt
backup features in their phones.

You Can Find The Option In The Settings, As Shown Below.

Step 1: Step 2: Step 3: Step 4:


Go to Settings Go to additional settings Go to Backup and Reset Choose the relevant options

65 | Digital Security
You Can Also Use Google Drive To Take A Backup Of Your Data.

Step 1: Open Google Drive. Step 3: Turn on the option. Your


Click on the three lines on the Step 2: Click on Backup and data will now be stored on
left top corner to open Settings Reset Google drive as well.

Backup On iPhones

Step 3: Take backup of all the


Step 1: Go to Settings Step 2: Click on iCloud. applications that you wish to.

https://www.youtube.com/
watch?v=RGJ1oiNOxBI

WATCH

66 | Digital Security
8.4 PERSONAL SECURITY
a) Protect your online reputation: Use the services
provided to manage your digital footprints and ‘think
If you wouldn’t accept this offline, why would before you post’. Even if offensive posts and pictures
you accept this behaviour online? are removed by appealing to the service providers, the
possibility of someone taking screenshots or
If there are people offline who you would be uncomfortable downloading the content cannot be ruled out.
talking to about your physical / sexual experiences, chances
are, you’d be uncomfortable doing this with strangers online b) Do not go to meet a person whom you met online
too. Cyber Groomers who create fake accounts to befriend alone.
people, for the purpose of harming them whether physically,
sexually or emotionally.

What you CAN DO with continued harassment:

a) Coming across cyber groomers, your first instinct should


be to block and report them on the platform.

b) Don’t stay silent, speak to someone you trust who will be


able to help. It can be a parent, a teacher, a friend, anyone who
you think can give you the support you need to see it through
that you are no longer affected by the cyber attacker online. If
they’re digitally savvy, they’ll help you implement security
measures to stay safe online!

8.4.1 Abide By The Law

Be cautious when your chat partner gives you many Use reliable services and know how to legally access the

compliments regarding your appearance within a short span music, film and TV you want.

of your acquaintance.
Do not talk to people who ask you to share your sexually Acknowledge your sources: use trustworthy content and

explicit photographs or videos. Never accept a friend request remember to give credit when using others’ work/ideas.

from someone you have never met in person. If you share Think about something you have worked hard for, and

your sexually explicit photos or videos with someone, the imagine that someone online would want to receive the same

person can share those photos with others or post them on consideration and receive credit for their work.

social media. They can also blackmail you.


This point was made previously, but we stress it: never turn 8.4.2 Seek Help
on your webcam if your chat partner does not connect to the
webcam. Keep your webcam private. Put a sticker over your Know where to find help: Understand how to report to service
webcam, laptop camera, or phone camera when they aren’t in providers and use blocking and deleting tools. If something
use. These devices can sometimes be hacked and used to happens that upsets you online, it is never too late to tell
take pictures or videos of you without your consent. someone.
People are not always who they say they are. Learn more
about protecting yourself when using social media. You Talk to your elders or parents, if your chat partner suggests to
should be very careful in the chat rooms. Never share keep your conversation with them a secret. You can also
personal details and limit your identity. report these to Childline at 1098.
67 | Digital Security
Sharing the device’s location: Always allow those app with
device location permission which actually required.

Via GPS:

Via Geotagging: Link your location with your posts, only


when you are sharing it with people that you know and trust.
sharing your location with strangers or merely making it
public may compromise your security.

Certain characteristics of the digital environment magnify the


risk that children will be exploited or abused by other users. In
particular, online abusers can easily operate anonymously
and bypass gatekeepers such as parents or teachers. When
You can protect yourself from becoming a victim of
children are bullied online, such as through ‘revenge porn’,
grooming:
their humiliation can be very public.

a) Take all precautions about sharing personal information


Online grooming: deceiving a child for sexual purposes – is
and identity details during chats or in public spaces.
on the rise, although its extent remains unknown. The sexual
abuse that follows may be online, such as by ‘sexting’ –
b) If groomer is using social media platforms to groom you,
sending or eliciting explicit sexual images – or offline, if the
you can block him/her. All the social media apps or services
victim is lured into a meeting.
have the option to block a user.

Cyber-bullying which takes several forms is becoming more


c) Save messages, pictures or videos shared with you by the
common and can have a profound impact on mental health,
groomer. Such messages, pictures or videos can be used as
well-being, and educational attainment. When children go
an evidence to initiate legal action.
online they are more likely to bully others, and to be bullied,
than when they are offline.
d) Your parents/elders can contact local police station to
lodge a complaint against the groomer.
Consent Empower children to decide for themselves how
others collect and use their information by requiring their
Do check with your parents before downloading apps or
consent. As of now, there is no minimum age of digital
sharing personal information.
consent in India.

This is mandatory for anyone below the age of 14. Some apps
are malicious in nature. Therefore, to prevent malpractices, it
is important to share the information with parents.

Also, Facebook policy does not allow any student below the
age of 14 to use the app. Even Netflix, YouTube and Amazon
Prime mandates ‘Kids mode’ for all children below the age of
14.

Dealing With Unauthorized Access

Giving Permissions to apps: While installing apps, give only


those permissions that are absolutely essential for the
https://www.youtube.com/
functioning of the apps. Of any application does not function watch?v=u1LjeVyQydQ&t=10s

without all permissions, it is best to not install it. WATCH

68 | Digital Security
ACTIVITY 1

Internet safety crossword.

DOWN ACROSS

1. Software programs designed to corrupt 2. Protection for your computer


computers
4. Being troubled or embarrassed online
3. Software protecting incoming and outgoing 5. Trying to steal other people’s
network connections from unwanted access sensitive information

4
ACTIVITY 2

Word search:
Find the maximum number of words related to cyber security.

ACTIVITY 3

Multiple choice questions ( )

1. Which of the following do you 2. Which of the below mentioned


think is a strong password? links are suspicious?

An$#yOuM@n!071 https://www.faceb00k.com
9570000066@pass http://www.amazone.com
Loveyou3000 htps:/www.google.com
All of the above All of the above
ACTIVITY 4

List three ways by which you protect yourself from threats and
risks on digital devices.

01

02

03

ACTIVITY 5

What is stalkerware?
D I G I TA L L AW
9.2 ILLEGAL ACTIVITIES USING
DIGITAL TECHNOLOGIES
Plagiarism is an act of using or closely rewording the
language and thoughts of another author without seeking
their permission or representing another author’s work as

9.1 WHAT IS DIGITAL LAW? yours without giving credit to the author. Stealing other
people’s work in the form of words, ideas, images or data
Digital law can be defined as the legal rights and restrictions with permission is both illegal and unethical. When using
governing technology use. Most users are unaware of the online resources for school projects, assignments, essays,
possible consequences of their online activities thereby need give credit or acknowledge the author(s) of the resource.
to be made aware of the rules and legal implications of using Copyright infringement: Involves using someone else’s work
the internet. but not paying them for it. For example, using a photograph
found online without seeking the photographer’s
The following are some actions that are unethical or illegal: permission or not paying for using it is a copyright violation.

a) Software or systems piracy. Plagiarism can affect academic and professional


reputations while copyright infringement is a violation of the
b) Downloading music and films without authorisation or law and penalties can be imposed.
payment.
Fair use is an exception to the restrictions imposed by
c) Stealing other people’s work (plagiarism and copyright copyright law. Quoting a few lines from a copyrighted work
infringement), personal data (identity theft) . in an academic paper with proper citation generally
qualifies as “fair use”.
d) Illegal file sharing.
Do remember
e) Hacking into others’ systems or networks.
• The purpose of the work should be academic, not-for-profit,
and educational.
f) Creating destructive viruses or worms that causes damage
• The piece is not copied in its entirety. A few lines from the
to other people’s data and devices.
original are quoted.
• The reference does not have any impact on the value of the
g) Sending spam.
original work.

• Think before you act. You may


9.2.1 Sexting
be violating the law of the land.

• Ignorance of the law is not a Sexting is sharing of sexually explicit texts, photos or videos

valid defence in legal fora. of naked or semi-naked pictures of themselves or others


through mobile or social media platforms.
Ru lden
les
Go

The growing number of such reported cases of sexting and


• What is ethical is generally legal.
self-exposure highlight the vulnerability of children and young
people to blackmail and extortion (including “sextortion”) and
“revenge porn”.
Victimizing by way of revenge porn is often practiced by
children below 18 years of age. It may be described as “an act
whereby a perpetrator satisfies his anger and frustration for a

72 | Digital Law
broken relationship through publicizing false, sexually
provocative portrayal of his/her victim, by misusing
information that he may have known naturally and that he
may have stored on his computer, or phone, or may have been
conveyed to his electronic device by the victim herself, or may
have been stored in the device with the consent of the victim
herself; and which may essentially have been done to publicly
defame the victim.

9.2.2 Online Child Abuse And Exploitation

There is global consensus that child sexual abuse and


exploitation is unacceptable offline or online. Under no
circumstances is the production, distribution and
viewership of sexually explicit images of children is
permitted. The law imposes strict penalty and punishment Being Smart Online Checklists
on anyone found to be taking, sharing and viewing such Checklist: How to keep the devices safe?
pictures. I. Be alert
Keep the devices clean
a) Ensure you keep your internet-connected devices, like
9.2.3 Defamation
laptops, phones and tablets, safe from malware.
b) Make sure software of operating systems is
Social media, email groups, bulletin boards and other digital
up-to-date. Also make sure security software that
spaces enable widespread offensive content against a
updates automatically is installed on devices.
person to be posted. Offensive messages such as body
shaming, name calling on social media especially can be
II. Keep devices safe
very hurtful. As the messages spread around so quickly it
Mobile phones
can cause a lot of distress to the person targeted. Although
a) Use a screen lock to lock your smartphone.
defamation is not a criminal offence it is unethical and
b) Protect sensitive data by taking regular backups either
should be avoided.
on Dropbox, OneDrive or iCloud.
c) Always switch off your wireless connections e.g.
Bluetooth,Wi-Fi, NFC, etc. when not in use.
d) Use genuine web browsers and never save your login
credentials, banking details.
e) Install an antivirus on your smartphone.

III. Be smart
Manage mobile apps:
a) Keep apps on your mobile devices updated. Updates
often have security fixes in them.
b) Delete apps you no longer use. It would also entail
clearing of the cache.

9.3 LEGAL PENALTIES FOR ONLINE


OFFENCES
Indian laws deal with many of the core issues related to
digital technologies. You need to understand that some of
your online actions may be on the borderline of an offence
and some may actually be infringing the law.

73 | Digital Law
Illegal online Laws covering
Penalty
activity offense

Posting or sharing of inappropriate


Protection of Children Against Sexual A term of up to 3-5 years imprison-
images and comments online or
Offences Indian Penal Code, ment and also a fine.
through WhatsApp.
Information Technology Act, 2000.
Revenge porn A term of up to 7 years imprisonment
If an inappropriate picture or POCSO, 2012 with a fine
6explicit selfie has been shared by a Indian Penal Code.
friend, for taking revenge threaten- In case of extreme effect of the said
ing to circulate this to a wider group act like committing suicide or attempt
or demanding a favour for not doing to commit suicide, the punishment
so. may go upto life term as well.
Violation of privacy IT Act 2000
Uses any electronic device and/or A term of upto 7 years imprison-
POCSO Act, 2012. ment or a fine or both.
online medium to record, circulate,
transmit, publish or bring into the
public domain any image, photo-
graph, film, videotape, MMS etc.
that has private parts of a child
captured in violation of his privacy
commits the offence of ‘Violation of
privacy of a child’.
A term of up to 3 years imprison-
Impersonation Information Technology Act, 2000. ment and also a fine.
Sending someone messages by
assuming a false identity.
A term of up to 2-3 years imprison-
Unauthorised access Information Technology Act, 2000. ment or fine or both.
Hacking someone’s computer, email
or social networking account.
Punishment of a term up to 6
Online piracy Copyright Act, 1957. months to 3 years of imprisonment
Downloading movies and music for and fine.
free.

Illegally copying or distributing


software using the internet without
the consent of the rights owner.

Plagiarism Copyright Act, 1957. A term of imprisonment from 6


Using words, ideas, images or data months to 3 years and fine.
of another person without attribut-
ing the source.

Misrepresentation Indian Contracts Act together with A term of imprisonment up to three


Falsification of age for the purpose IPC. years, or fine, or both.
of creating accounts or accessing
certain websites. It amounts to
entering under a contract with the
service provider based on misrep-
resentation of facts and real A term of upto 2-3 years imprison-
identity. Indian Penal Code. ment , or fine, or both.
Defamation
Posting defamatory statements,
images or videos, about a person
on social media, chats, bulletin
boards or any digital space.

74 | Digital Law
9.4 GOOD PRACTICES
What you write is clearly your prerogative. But do remember that any production, consumption and distribution of content
which involves sexual imagery of children is illegal.

Choose friends wisely. Everything is not about the number of friends Consider the whole image. Ask yourself if the image or the
you have. Select your friends wisely as they can access your background giving an indication where you were or what you were
information. Learn to delete/block unwanted friends. doing at the time of taking the picture. If yes, then reconsider posting
it.
Think before saying anything. Be mindful of what you post/update
on Facebook. Ask if you will regret it five years later. Do not become Manage your visibility. Photos you are tagged in are visible to
a part of hate-groups. everyone. To make it secure you can make your account private by
Manage privacy settings. Your posts are publicly shared unless you going to the menu on the (top right side) on your profile.
go to settings and change your Security and Privacy to Only Friends.
Accepting followers. If your account is private you can approve who
Keep in mind the dangers of sharing. Be careful of what information follows you. Do not accept requests from strangers. Also be mindful
you put out on Facebook. Check your posts and images for of who you are following.
indicators of your whereabouts or anything that may invite unwanted
users. Block/report unwanted contacts. Go to their profile and tap menu
(top right side) to report and block. You can also report images by
Create friends lists to manage your posts. Create separate lists for going to menu option at the top of each image.
your acquaintances, friends, family etc. This will make it easy to
regulate or control who can see your posts. “Untag” yourself. You can untag yourself by tapping on your
username in the post, provided the post is public or you follow the
Look out for suspicious activities. Do not click on suspicious links. person who tagged you.
Beware of fake Facebook pages that steal your password. If your
account is hacked, change your password or report to Facebook. Other tips. Switch off geotagging and location feature. Delete your
post if you are not sure about it. Posts are easy to embed in other
websites. It may go viral.

Being safe on
social media platforms
Other instant messaging applications
Screen capture is possible even on Snapchat, which does not save
images. Screen shots are an easy way to save images, and many Do not open, accept, or download a file in Instant Messenger from
third party apps auto-save images. someone you do not know or if you do not know what is in the file.

Notification is not guaranteed. Snapchat tells you when your snap Contact the sender by email, phone, or some other method to confirm
was viewed or screenshot. But this function is not always reliable. that what they sent was not a virus.

Manage your privacy settings. Tap on the ghost icon on the top of Visit Microsoft Update to scan your windows computer and install any
your camera screen-> Settings (gear icon)-> ’who can’ section-> high-priority updates that are offered to your PC. If you have Automatic
change settings from Everyone to My Friends. Updates enabled, you have to make sure you install them when
received.
Threat of unknown users. Tap and hold the user and select gear icon
Use up-to-date version of your Instant Messenger software for better
to Block unwanted users.’ Add Nearby’ may seem cool but keep in
protection of your computer against viruses and spyware.
mind it can be risky.
Upgrade from MSN Messenger to Windows Live Messenger in order to
Sexting concern. Avoid sharing snap stories that you do not want
block attachments that may contain malware and allow scanning of
others to access. Do not share sexually explicit pictures as these
attachments for viruses.
may easily go viral.
“Spim” (a short form of spam over instant messaging) uses IM
Keep your User ID Private. Do not post your username on social platforms to send spam messages over IM. Like email spam
media as it may attract unwanted attention. Also do not share your messages, a spim message may contain advertisements or weblinks,
password with anyone. by clicking on those links malicious code enters into your PC.

Anti-spyware software can protects the digital device and helps in


removing any spyware you may already have. Windows Defender may
be downloaded in the absence of anti-spyware software.

Source: www.aarambhindia.org; https://infose-


cawareness.in/home/index.php

75 | Digital Law
9.5 AVAILABLE REDRESSAL
MECHANISMS
Step 1: If you come across any
9.5.1 Social Media Platforms content that you wish to report, or
get removed, go to the top right
corner of the post and you will find
three dots.

Step 1: If you wish to report any account/post/comment, go


to the 3 dots on the right top corner of the
account/post/comment. When you click on the dots, you will
find the option "Give Feedback or Report”. Click on it.

Step 2: When you click on the


dots, you will find the option to
“Report”.

Step 3: Choose “Spam” of


you are reporting commer-
cial content (like advertis-
ments). if what you are
Step 2: You will be presented with a list of reasons to reporting is not an ad,
ascertain why you wish to report that content. choose “It’s inappropriate”.

Step 4: Once you click on


“Report”, you will be
presented with a list of
reasons to ascertain why
you wish to report that
content.

Step 3: Choose the appropriate reason and click on “Done”.

Facebook will remove the account/post/comment if it


violates the community guidelines of the platform.

Step 5: Choose the appropri-


ate reason and click on
“Next”.

Instagram will remove the


content if it violates the
community
guidelines of the platform.

https://www.youtube.com/watch?
v=YuTlFfV1gdg&feature=youtu.be

WATCH

76 | Digital Law
Step 1: If you wish to report any comment you see on
Step 1: If you wish to YouTube, go to the comment section.
report any number on
WhatsApp, go to the 3
dots on the right-top
corner of the chat.

Step 2: Next to the comment you wish to report, you will


find 3 dots on the right top corner.

Step 2: When you click


on the dots, you will
find the option "More”.
Click on it.
Step 3: When you click on the dots, you will find the
option to “Report”

Step 4: Once you click on “Report”, you will be presented with a


Step 3: You will then list of reasons to ascertain why you wish to report that content.
see the option to
“Report”. Click on it.

Step 4: You can


block the person as
well when you report Step 5: Choose the appropriate reason and click on
their account. Once “Done”.
reported the account
may be deleted if it
violates the
community
guidelines of the
platform.

YouTube will remove the content if it violates the


community guidelines of the platform.

Social media platforms have similar processes for reporting objectionable photos, videos, accounts and comments or any
other content. Click on the three dots on the corner of the post to go to the “report” option. Report objectionable content by
choosing the appropriate reason.

Twitter: For Facebook: Instagram: Youtube:


https://help.twitter.com/en/contact-us https://m.facebook.com/help/ https://help.instagram.com/ https://www.youtube.com/t/contact_us

77 | Digital Law
9.5.2 Police

Reporting on
cybercrime.gov.in
Portal run and maintained by
Ministry of Home Affairs,
Government of India

Reporting to the police cyber cell


Log into the cybercrime portal of the Ministry of Home Affairs
www.cybercrime.gov.in Children, parents or other concerned adults on their
behalf, can approach the cyber cells of the State police to
The Ministry of Home Affairs, Government of India, has set up report any online offence. Unlike other crimes,
a portal to facilitate online complaints of cybercrimes, cyber-crimes are not limited by jurisdiction. You can report
including online child pornography, child sexual abuse to the cyber-cell of any city, even if the offense was
materials, and sexually explicit content (e.g., sexual committed when you were in a different city.
harassment, abuse, rape and gang rape). Police authorities of
relevant states and union territories initiate investigations Filing an FIR with the local police
and legal processes based on the information provided by the
complainants. The portal also has the option for anonymous In case you are unable to file a complaint in the cyber cell,
reporting of child pornography and sexually explicit content. you can file an FIR with the local police station. It is not
necessary to know the name of the person responsible for
the crime to lodge an FIR. Tell the police whatever you
know. The local police is expected to coordinate with the
cyber cell in the investigation and legal processes.

78 | Digital Law
9.5.3 Childline 1098 9.6 REPORTING
· Social- Talk to parents, teachers , counsellors .
CHILDLINE 1098 is India’s first 24-hour, free, emergency
· Legal- Approach the police.
phone service for children in need of aid and assistance. A
· Platform - in app reporting, as discussed above.
child or any adult on his or her behalf can dial 1098, the toll
free number to seek help for emergency needs and to avail
Content Removal from Websites
of long-term care and rehabilitation services.

If ever any photo or video of yours (that you clicked or appear


9.5.4 Ncpcr in), is shared online onto a website without your consent, it
can be removed by following the process given below:
Log into the POCSO E-box .
The National Commission for the Protection of Child Rights 1. Find the relevant page or email address for initiating the
(NCPCR) set up this online portal to receive complaints DMCA request. For example: Search ‘Platform/Service name’
regarding sexual abuse and related offences. A child or an DMCA on Google. (For eg. Search for "FacebookDMCA" on
adult on his or her behalf can locate the POCSO e-box at the Google).
NCPCR site.
2. Carefully open the links suggested on the search page and
http://www.ncpcr.gov or find either the email address or a form that can be filled.
http://www.ncpcr.gov.in/index2.php. It will navigate to a
page with the window having a short animation film. 3. Complete the form to send a DMCA takedown request.

4. If you find an email address, (like [email protected],


[email protected]), send an email with Subject ‘DMCA
Takedown Request’ and write clearly about the content and
its location (URL or the link to the photo/video) on the
platform that you want to remove.

https://www.youtube.com/watch?
v=YuTlFfV1gdg&feature=youtu.be

WATCH

Aarambh India Infosec Awareness, CDAC, MEITY

79 | Digital Law
ACTIVITY 1

Which of the following is illegal? If illegal, what is the penalty?

Plagiarism:

Impersonation:

Revenge Porn:

Unauthorised access:

Defamation:

ACTIVITY 2

What are the good practices that should be followed on social media
platforms for personal safety and digital security?
ACTIVITY 3

What is the process for lodging a complaint if a cybercrime is committed?


ANSWERS
D I G I TA L A C C E S S

ACTIVITY 1

(i) (b) Bccnucz (-2 series).


(ii) (a) Tenkrad (1st to last switch).
(iii) (c) GYNX (+5 series).
(iv) (d) Azsfr ( -1, +1 series).
(v) (d) Emikof (Replacing vowels with vowels and -1 for constant).

ACTIVITY 2

In a debate, take a stance for or against the motion and frame your arguments
on the basis of your research.

D I G I TA L L I T E R A C Y
ACTIVITY 1

1. False.

The domain names say a lot about websites, .com, .edu, and .gov are among the
most credible domain endings for websites. Other variations are much less
credible. If any of those three options end a URL, it indicates the website’s
credibility).
2. False.

When reading online, the resource opens quickly but the pages open one at a
time. There may be some brief load times when flipping pages. But when reading
offline, the resources may take several seconds to open as the entire file is
decrypted.
3. True.

4. False.

E-Pathshala is a joint initiative of the Ministry of Human Resource Development


(MHRD) and the National Council of Educational Research and Training d
Windows platforms) .

5.True.

Digital literacy involves the ability to read, understand and interpret digital
processes whereas, digital communication is the ability to communicate,
connect and interact with others.

ACTIVITY 2
D I G I TA L C O M M U N I C AT I O N

ACTIVITY 1

These statements are not legitimate for the following reasons:

1. The sender seeks to bribe by offering bonus points.


2. The sender uses flattery to seek greater access to the recipient of the
message.
3. The sender threatens to gain further access the recipient of message.
4. It reflects coercion of the recipient by a desensitised sender, which may
increase in intensity.
5. The sender introduces subtle sexual allusions and sexualised game in the
conversation to build intimacy, which may be manipulated further.

ACTIVITY 2

1. One -way communication.


2. Flattery.
3. Gaming.
4. Revenge Pornography.

ACTIVITY 3

The following preventive measures reduce the possibility of online risks and
threats:

1. Always install a good antivirus software on your computer, smartphone and


other handheld devices. Regularly update the antivirus and other applications.

2. Do not share personal information like name, date of birth, address or phone
numbers while playing online games. Never share your passwords with anyone.
Use a complex password for online gaming and other online accounts. Change
your password at regular intervals.

3. Never use voice chat or webcam while playing online games. This may reveal
your identity to other players and attract cyber bullies and cyber criminals.

4. Never share your or your parent's credit card/debit card details with anyone
while playing online games. You may be asked credit or debit card details but
never share such details with anyone.

D I G I TA L C O M M E R C E

ACTIVITY 1

Phishing E Vishing D Malware G Ransomware B

Pharming C Piracy A Malvertising F

D I G I TA L E T I Q U E T T E

ACTIVITY 1

Cyberbullying takes place between two people. The cyberbullies, known people,
known people hiding their identities, or strangers, send nasty text messages or
emails, or set up hate groups on social networking sites. The victim is often
targeted constantly, or periodically, even when they are in the comfort of their
own home. The technologies enable the cyberbullies to circulate messages or
images very quickly and widely on the internet.

Cyberstalking is when an individual is repeatedly or constantly followed, watched


or contacted through any electronic means, without his or her consent for sexual
harassment or other mala fide motives. It involves tracking of the movement,
invasion of privacy, or persistent efforts to establish contact through text, email,
social media, or other digital platforms.

ACTIVITY 2

1. Personal or private photos.


2. Location.
3. Mean or hurtful comments .
4. Date of birth.
5. Forwarded spam messages.
6. Mobile number.
7. Personal Details.

ACTIVITY 3

1. Agree to disagree.
2. Avoid digital drama.
3. Be positive online.
4. Be responsible, honest and truthful.
5. Respect people’s confidence.
6. Appreciate boundaries – your own and of others.
7. Learn to seek consent.

ACTIVITY 4

1. Making fun of another user in internet chat rooms.


2. Harassing a user over instant messaging sessions.
3. Posting derogatory messages on a user's social networking pages.
4. Circulating rumours about someone on social networks.
5. Publishing lewd comments about another person on personal blogs.
6. Posting unflattering pictures of another user on the web.
7. Sending unsolicited and unwanted email messages (also known as
spamming).
8. Sending threatening or provocative emails.
9. Repeatedly phoning another person.

ACTIVITY 5

1. Search yourself online to see how you appear to others.


2. Check privacy settings to ensure that only people authorised by you are able
to access your posts.
3. Deactivate and delete - WHAT.

D I G I TA L R I G H T S
ACTIVITY 1

A family friend is blackmailing you


E into sending inappropriate images
to him.

Your friend posts a picture of you without

D consulting you. When asked


to remove the picture they refuse.

On social media you have someone


A who stalks you and you want
to make a complaint.

A sport organisation does not let you

B apply for its online cricket training


programme because you belong
to a lower socio-economic background.

Your school library bans an educational


C book that is appropriate for your
age group.
D I G I TA L S E C U R I T Y

ACTIVITY 1

Internet safety crossword:


1. VIRUS
2. ANTIVIRUS
3. FIREWALL
4. CYBERBULLYING
5. PHISHING

ACTIVITY 2

Word search
1. Phishing
2. Virus
3. Malware
4. Cloud
5. WAF
6. Firewall

ACTIVITY 3

1. (a) An$#yOuM@n!071
2. (d) All of the above

ACTIVITY 4

1. Keep webcams private.


2. USB Storage Device Use.
3. Regularly update software and operating systems.
ACTIVITY 5

Stalkerware refers to software applications that are designed to track or spy on


individuals without their knowledge and consent.

D I G I TA L L AW

ACTIVITY 1

1. Plagiarism: Imprisonment for a term ranging between 6 months and 3 years,


and fine.
2. Impersonation: Imprisonment up to 3 years and a fine.
3. Revenge porn: Imprisonment up to 7 years with a fine. In case the act has
serious consequences, e.g., suicide or attempted suicide, it may even attract a
life term.
4. Unauthorised access: Imprisonment up to 2-3 years, or fine, or both.
5. Defamation: Imprisonment up to 2-3 years, or fine, or both.

ACTIVITY 2

1. Choose your friends wisely.


2. Think before you say or post anything.
3. Be aware of the dangers of sharing.
4. Be alert to suspicious activities.
5. Manage how you appear to others. Being positive online also secures your
digital footprints.
6. Block or report unwanted contacts.
7 “Untag” yourself from posts and pictures that you do not .
8. Be cautious while accepting followers.
9. tManage your privacy settings.

63 | Digital Law
ACTIVITY 3

The complaint may be lodged on the social media platform, the Ministry of Home
Affairs portal, with the local police and police cybercell, and e-Raksha portal at the
NCPCR website.
U S E F U L C O N TA C T S

Lodge complaints in person, by post, by messenger, or by any means to the following address:

National Commission for the Protection of Child Rights (NCPCR),


5th Floor, Chandralok Building, 36 Janpath,
New Delhi 110 001

Complaints can be lodged through E-Raksha, or delivered in by post or in person at the above address.

Nodal CyberCrime Portal


Name Rank Landline Email
Ms. D Mary Prasanthi SP 0863-2340063 [email protected]
Sh. Jimmy Chiram SP 0360-2212471 [email protected], [email protected]
Sh. Debajit Hazarike DIGP 0361-2529840 [email protected]
Sh. D.Amarcase ASP 0612-2216236 [email protected]
Manisha Thakur R AIGP 0771-2511606 [email protected]
Sh. Karthik Kashyap SP 0832-2443082 [email protected] [email protected]

Sh. Rajesh GadhiyaSI SPDSI 079-23255545 [email protected]


Sh. Ashwin Shenvi SP 01733-253023 [email protected]
Sh. Narveer Rathore DSP 0177-2621331 [email protected]
Sh. Syed Ahfadul-ul-l IGP 0191-2572475 [email protected] [email protected]
Sh. Sunil BhaskarSh. SPDSI 0651-22100580651-22 [email protected]
Sh. Chandra GuptaSh SPDSI 080-22094436 [email protected] [email protected]

Sh. Sreejith IGP 0471-2319787 [email protected] [email protected]


Sh. Niranjan B Vayanrg DIGPA 755-2443483 [email protected] [email protected] [email protected]
Sh. Balsing Rajput SP 022-22160080 [email protected] [email protected] [email protected]
Ms. Joyce Lalremmaw SP 0385-2451501 [email protected] [email protected]
Sh. R. Muthu SP 0364-2504416 [email protected] [email protected]
Sh. Zosangliana SP 0389-2334082 [email protected]
Ms. Sonia Singh IGP 0370-2242712 [email protected]
Sh Anil Kumar Dash ASP 0671-2974401 [email protected] [email protected]
Sh. Dhruman Harshar AIG 0172-2226258 [email protected]
Sh. Pankaj Chaudhary SP 0141-2740169 [email protected]
Sh. Prathap Pradhan DIGP 03592-20208703592 [email protected]
Ms. B Shamoondeswa SP 044-28512527 [email protected] [email protected]
Sh. Govind SinqhSh. I ADGP 040-23242424 [email protected] [email protected]
Ms.Sarswati R IPS IPS 0381-2304344 [email protected]
Sh. Barinderjit Singh SSP 0135-2651689 [email protected] [email protected]
Sh. Vivek Ranjan DSP 0522-2721690 [email protected]
Sh. Rajesh Kumar Yao DIGP 033-24792955 [email protected] [email protected]
Sh. Sanjay Kumar IGP (A) 03192-232334 [email protected]
Ms. Rashmi Sharma Y DSP 0172-2710046 [email protected] [email protected]
Sh. Anyesh Roy DCP 011-23746615 [email protected] [email protected]
Sh. Vipul Anekant ASP 0260-2254101 [email protected] [email protected]
Sh. Manasvi Jain Dy. SP 0260-2632888 [email protected] / For correspondence - [email protected]
Sh. Mahesh kumar Ba SSP 0413-2224083 [email protected] [email protected]
Sh. Mayank Bansal DSP 04896-262367
Grievance Officer Details
Name Rank Landline Email
Sh. J Prabhakar Ra DIGP 0863-2340152 [email protected]
Sh. Take Ringu DIGP 0360-2215518 [email protected]
Sh. Surendra kuma IGP 0361-2524494 [email protected]
Sh. Shiv Kumar Jha DIG 0612-2238098 [email protected]
Sh. R K Vij SPL DGP 0771-2511623 [email protected]
Sh. Paramaditya DIGP 0832-2420883 [email protected]
Sh. Ajay Tomar ADGP 079-23250798 [email protected]
Sh. Kuldip Sinqh Si. ADGP 01733-253230 [email protected]
Sh. Sandeep Dhaw SP 0177-2627955 [email protected]
Sh. B Srinivas ADGP 0191-2582996 [email protected]
Sh. Ranjit Prasad IGP 0651-2490046 [email protected]
Sh. T D Pawar DIGP 080-22251817 [email protected]
Sh. Dr. Shaik Darve ADGP 0471-2722215 [email protected]
Smt. Aruna Mohan SPL DGP 0755-2770248 [email protected]
Sh. Brijesh Singh SPL IGPA 022-22026672 [email protected]
Sh. Themthing Nga DIGP 0385-2450573 [email protected]
Sh. F G Kharshiing DIGP 0364-2550141 [email protected]
Sh. Balaji Srivastav DGP 0389-2334682 [email protected]
Sh. Renchamo P. K ADGP 0370-2223897 [email protected]
Sh. Madkar Sandee SP 0671-2306071 [email protected]
Sh. Hardial Singh M DIGP 0172-2226258 [email protected] [email protected]
Sh. Sharat Kaviraj DIGP 0141-2740898 [email protected]
Sh. Sonam Detchu DySP 03592-204297 [email protected]
Sh. C Sridhar IGP 022-28512503 cbcyber@nic in
Smt. Swathi Lakra IGP 040-23147604 [email protected]
Sh. Subrata Chakra AIGP 0381-2304344 [email protected]
Sh. Deepam Seth IGP 0135-2712563 [email protected]
Dr. Kalluri SP Kuma ADGP 0522-2208598 [email protected]
Sh. Ashok Kumar P IGP 033-24791830 [email protected]
Smti. Shalini Singh IGP (L&O) 03192-232244 [email protected]
Ms. Nilambari Jagao SSP 0172-2760001 [email protected]
Sh. Prem Nath ACP 011-23490236 [email protected]
Sh. Vikramjit Singh SP 0260-2250942 [email protected]
Sh. Sharad B. Dara SP 0260-2643022 [email protected]
Sh. Dr. VJ Chandra DIGP 0413-2231386 [email protected]
Sh. Shibesh Singh SSP 04896-262258 [email protected]

USEFUL RESOURCES
* https://www.cyberpeacecorps.in/CPCRC/ * Being Safe Online: Guidelines for raising Awareness
among children, parents, educators and the general
public
https://ncpcr.gov.in/showfile.php?lang=1&level=1&&su
blinkid=1637&lid=1661
* Government of India, Ministry of Home Affairs. A
Handbook for Adolescents/Students on Cyber Security.
https://mha.gov.in/sites/default/files/CyberSafety_Eng-
lish_Web_03122018_0.pdf
CBSEIndia cbseindia29 cbse_hq_1929

Cyberpeacecorps

You might also like