Cyber Safety Manual
Cyber Safety Manual
Safety
HANDBOOK FOR STUDENTS OF SECONDARY & SENIOR SECONDARY SCHOOLS
BE S LET
MAR S
T ON
LINE
Year of Publication: 2020
CBSE in collaboration with Cyber Peace Foundation
ACKNOWLEDGMENT
Patrons:
Sh. Ramesh Pokhriyal 'Nishank', Minister of Human Resource Development, Government of India.
Sh. Sanjay Dhotre, Minister of State for Human Resource Development, Government of India.
Ms. Anita Karwal, IAS, Secretary, Department of School Education and Literacy, Ministry of Human Resource Development,
Government of India.
Our gratitude to Ms. Anita Karwal, IAS, for her advisory, editorial and creative inputs for this Manual during her tenure as
Chairperson, Central Board of Secondary Education (CBSE).
Mr. SN Pradhan, IPS, Director General, National Disaster Response Force (NDRF).
Sh. Anurag Tripathi, IRPS, Secretary, Central Board of Secondary Education (CBSE).
Dr. Antriksh Johri, Director( Information Technology),Central Board of Secondary Education (CBSE).
Dr. Biswajit Saha, Director( Skill Education& Training),Central Board of Secondary Education (CBSE).
Sh. Rakesh Maheshwari, Group Coordinator, Cyber Laws and e-Security, Ministry of Electronics and Information Technology (MeitY).
Dr. Manoj Sharma, National Institute of Mental Health and Neurosciences (NIMHANS).
Dr. Rachna Bhargava and Dr. Rajesh Sagar, All India Institute of Medical Sciences (AIIMS).
Dr. Praggya M. Singh, Joint Secretary (Academics), Central Board of Secondary Education (CBSE).
Ms. Neelam Singh | Ms. Karuna Bishnoi | Ms. Janice Verghese | Ms. Akanksha Kapur | Mr. Kumar Vikram | Ms. Aditi Pradhan
Ms. Dhruvi Shah | Ms. Jemisha Bhalsod | Ms. Ayushi Shukla
CONTENTS
INTRODUCTION 1
01 DIGITAL ACCESS 4
02 DIGITAL LITERACY 9
03 DIGITAL COMMUNICATION 15
04 DIGITAL COMMERCE 24
05 DIGITAL ETIQUETTE 29
08 DIGITAL SECURITY 55
DIGITAL LAW 72
USEFUL CONTACTS 82
USEFUL RESOURCES 83
ANSWERS 84
INTRODUCTION
T
Social norms have impeded girls’ access to opportunities,
echnological advances are changing the world in ways including the access and use of digital devices and the
that could not have been imagined. The emergence of internet. Many of them belonging to socially or economically
advanced digital innovations are providing new opportunities marginalised families in rural, semi-urban and urban areas
to connect and learn, and have begun influencing every aspect have either no access, or limited, or supervised access to
of human life. digital technologies, which could enable them to exercise their
agency, autonomy and rights in an increasingly
Children and young people have shown greater ability to adapt interconnected world.
and adopt digital devices and innovations, which augurs well
for the future. They use the devices and apps for a variety of The exploration of new vistas and acquisition of rich
functions, including self-expression, communication, experiences online require a strong element of caution. After
networking, research, entertainment, and much more. The all, every light has its shadow. The technologies can be
internet has enabled children to become active social agents misused or overused in ways that are detrimental to the users
and to mobilise for social, ecological and other causes. They and even non-users.
are increasingly able to project their voices with
unprecedented reach. UNICEF in its Child Online Protection in India report in 2016
had presented the following typology of risks and threats
However, an assumption is often made that young people
have superior skills with digital technology, which surpass
those of their parents and teachers.
GROOMING
Social
Malvertising
exclusion
Producing and
consuming pirated
music and videos
Financial fraud
Enticement to
drug trafficking
The above classification presents a birds’ eye view of the risks and threats which contribute to the vulnerability of
children and young people in the digital age. The other side of the coin is resilience among them, which needs to be
3 | Cyber Safety Booklet for Children
nurtured and strengthened in order to empower them for the challenges and opportunities introduced by digital
technologies.
The optimal safeguard for children is to facilitate their access to the internet, protect their privacy, encourage
self-expression, and ensure that they can recognise potential dangers and know what to do about them. The concept of
digital citizenship has emerged as a useful framework of various facets that need to be developed and strengthened.
2 | Introduction
Basically, there are nine elements of digital citizenship
Digital Access:
Equitable distribution of technology and online resources is an
important issue from the perspective of human rights and social
justice.
Digital Literacy:
Understanding technology and its use is the basic condition for
optimising its benefits.
Digital Communication:
The electronic exchange of information with other people, through
emails, cell-phones and instant messaging, constantly and
without delay.
Digital Commerce:
Increasing buying and selling of goods and services has opened
vistas for the sellers, service providers, and consumers.
Digital Etiquette:
Digital etiquette describes the norms or appropriate and
responsible behaviours while using technology devices.
Digital Security:
Awareness of potential online risks, threats and attacks and the
ways and means of preventing them are important skills to have
in an interconnected world.
Digital Law:
At the core of digital citizenship are basic ethics, which are
reflected in national and international laws.
3 | Introduction
D I G I TA L A C C E S S
Digital technology is primarily used these days with new
physical communications media, such as satellite and fibre
optic transmission. A modem is used to convert the digital
information in the computer, mobile phone, and other such
devices to analog signals for the phone line and to convert
analog phone signals to digital information for the computer.
1.1 WHAT IS DIGITAL ACCESS?
Analog Signal
The telecom market is very competitive with various mobile
companies trying to offer the best and cheapest plans which
has led to the world’s cheapest mobile data packs being
offered in India. A study conducted across 230 countries over
a period of one month found that Indians pay an average of
Rs 18 for a gigabyte of data compared to the global average
of Rs 600. The internet usage in India has exceeded half a
billion people as of December 2018. The usage is equal for
both rural and urban India with mobile phones being the
primary source to access the internet.
4 | Digital Access
1.3 NAVIGATING THE CYBERSPACE Administration Of The Cyberspace
Internet And The World Wide Web The internet and world wide web do not respect territorial
boundaries, the role of the national laws and mechanisms is
The internet may be considered as a vast network that limited in the management of the cyberspace. The servers of
enables an individual to obtain any kind of information most internet service providers are in the United States and
available. “The world wide web, commonly known as www, is Western Europe which is beyond Indian law or any other
one of the most used legitimate platforms to navigate using national law. International law provides for some
search engines like Google, Yahoo, Bing and DuckDuckGo. mechanisms for negotiations on varied aspects of
This is just the tip of the iceberg.” cyberspace management and security. One example is the
global consensus of unacceptable child sexual abuse
A Minute on the Internet in 2019
material put online leading governments to cooperate to
Estimated data created on the internet in one minute
bring down the pages.
https://www.statista.com/chart/17518/internet-use-one-minute/
Public Pakistan had banned YouTube for about three years following violent protests
Frequently used sites such as Facebook, Twitter, Amazon across major cities against the uploading of an anti-Islam film on the site in
September 2012. It permitted a new version of YouTube, which allowed the Pakistan
which makes up about 4 to 6 percent of internet usage. The Telecommunication Authority (PTA) to seek access to offending material to be
blocked within the country.
remaining 94 or 96 percent is the Deep web and the Dark
China has blocked Google, Facebook, Twitter and Instagram, as well as thousands
Net. of other foreign websites, including The New York Times and Chinese Wikipedia,
over the past decade. Nonetheless, it has not disrupted the access of Chinese
people to internet. A range of Chinese websites such as Baidu, WeChat/Weixin,
Sogou, So 360) perform the same functions even though with a strong dose of
censorship.
DEEP WEB
A network where data is stored in
inaccessible databases. It includes all web
pages, websites, networks, and online
communities that are intentionally and/or
unintentionally hidden that cannot be WATCH
accessed using Google or other regular
search engines. The deep web is used for
activities such as hacking and piracy.
DARK WEB
An encrypted network that is available to a selective group not
accessible by all which is accessible via authorization, specific
https://www.youtube.com/watch?
software, and configurations. This is a marketplace for illegal goods v=yABC7LzJLLg&t=5s
such as drugs, firearms, and stolen credit cards numbers. The dark
web is also used for human trafficking, exchanges of child
pornography due to anonymity.
5 | Digital Access
The idea of a network of computers was thought of in the early 1960s. It
was tried in different ways, and finally ARPANET was created. WIth time,
many more changes were made and finally the internet became what we
see it as today.
Source: Presentation by Dr Govind Former Senior Director, MeitY, and Ex CEO, National Internet Exchange of India and Advisor, Cyber Peace Foundation
1.4 BARRIERS TO DIGITAL ACCESS society to digital technologies. This is often due to biased
perception of women and girls not needing internet or for
Over the past few years digital access has become easier their safety they are restricted. Equal opportunities for all
with devices becoming cheaper and more widely available. A ages and gender needs to be established.
range of smartphones from expensive to inexpensive are
available with competitive packages offered by internet
service providers.
Some attributes that define the people who are more likely to
have digital access include:
6 | Digital Access
ACTIVITY 1
Do you agree with this statement? Provide at least three reasons in support of your answer.
2 3
1
D I G I TA L L I T E R A C Y
Have your
digital devices
been installed
with antivirus
software? https://www.youtube.com/watch?
v=YQq3hTHw6TQ
9 | Digital Literacy
Functional Skills Oh
! T
ha
Wh t‛s g
ere rea
d t.
s rea id yo
Functional skills include the three Rs : reading, writing and nt
ist d t
his
u
S cie d n ?
d! n ca e
arithmetic. In order to be a digitally literate individual, any ou
Da e f that spac
v s
a
h he in
e
student must know how to complete basic internet searches, fis ath
e
br
10 | Digital Literacy
The following message was circulated through WhatsApp in
Ability To Find And Select Information
India in 2018. It seemed credible due to its style of
Online browsing has made research much easier but in presentation and language. But careful scrutiny and
many ways more challenging. Now one has easier access to investigations revealed that it was false. The United States
virtually endless information. The challenge is to check the has banned the import of Kinder Joy, due to their import
veracity of the sources as well as the information. laws banning all commodities containing anything inedible
inside, in this case the toy packed in Kinder Joy.
Is the author listed on the information/news?
However, this news was presented in a slightly modified
If yes, they are claiming personal responsibility manner, and the messages implored readers to ban the
for the information that is being conveyed. If the
information is inaccurate, their reputation and chocolate as it was claimed to be harmful to health.
01 probably career could suffer. Has the author
mentioned the resources used? If yes, this can
help verify the information. BFF BFF
last seen today at 13:25 last seen today at 13:25
Web design is surprisingly important in verifying E-Pathshala, initiated by the Ministry of Human Resource Development
a website’s credibility. If someone didn’t put work
into their website to make it look good, you can’t 04 (MHRD) and the National Council of Educational Research and Training
(NCERT), hosts resources for teachers, students, parents, researchers
trust that they’ve put the necessary effort into and educators that is available on the Web, Android, IOS and Windows
verifying their information. platforms. A wide variety of print and non-print materials, including
textbooks, audio, video and periodicals can be accessed online or
downloaded for offline use at
Are the spelling and grammar in the writing correct? https://en.unesco.org/covid19/educationresponse/solutions
The logic is simple - it reflects how seriously the Khan Academy makes available a range of online tools and short video
lessons on its YouTube™ channel and website www.khanacademy.org,
production and dissemination of information is
which students can use to understand various lessons and concepts
05 taken. If there was no attempt to check the
grammar and spelling, probably the accuracy of
easily.
11 | Digital Literacy
Effective Communication
WATCH
https://www.youtube.com/watch?
v=bXYi-b6tiV8&t=79s
WATCH
https://www.youtube.com/watch?
v=fcHtksYEt-Y
E-safety https://www.youtube.com/watch?
v=-nU07_041t4&t=5s
12 | Digital Literacy
ACTIVITY 1
Mobile phones are the primary source of access to the Real versus virtual lives
internet in India. The world’s cheapest mobile data packs
have been offered in India as mobile companies in a
competitive telecom market have tried to offer the best and
cheapest plans. A study conducted across 230 countries Real lives Online lives
over a period of one month found that Indians were paying an
average of Rs 18 for a gigabyte of data compared to the
global average of Rs 600. Not surprisingly, the number of Offline activities Online activities
internet users in India was more than half a billion with the
usage being equal for both rural and urban areas. Direct socialising Social networking
Circuitry of digital
More engagement demands More escape opportunities
communication
15 | Digital Communication
Everyone needs to be conscious of the differences between Social media has provided children with a platform to
real and virtual life and use technology in a way that it does express themselves to a limited audience - typically those
not become a substitute for real life communication but who are similar and have comparable values, beliefs and
remains a smart additional channel which is not allowed to attitudes. As a result, it has made communicating with
compromise basic good interpersonal communication skills different people more difficult.
essential for success in all aspects of our life.
There is a tendency to use internet as a substitute for real
In-the-moment communication through instant messaging, relationships and the content we encounter online can
texting, and posting comments online is common. It does not influence us by creating an artificial digital environment.
allow enough time to reflect, react and respond on the basis Moderate use of the internet and a balance between offline
of informed understanding of conversations that are getting and online lives is crucial for adding value to our life and work
rude or mean. But learning to exit such conversations is while minimising risks and harm. Being smart online means
essential. You may have to sign off instant messaging, not being aware of the potential threats, opportunities and risks
respond to a rude text, or stop yourself from posting a that might occur without losing sight of the things that are
comment on Facebook or Instagram. most important in our lives.
16 | Digital Communication
Many parents overshare pictures of their
children online and in the process undermine
their right to privacy, cause embarrassment,
hurt and bullying, and damage online
reputation.
Personal information that you share can be used against
you. Review the content that you wish to share online and Sharenting reveals aspects of children’s life on
only provide information that is essential and absolutely social media without their consent. They may
necessary. be too young to fully understand but it is
important to consider the consequences from
their perspective. Posting of a picture of a child
with a funny caption, relating to their hair or
facial expression, could upset them when they
are older or make them a butt of bullying by
others. Every post contributes to a record of
photos, shared links and comments. This
record is hard to delete and can shape the
child’s online reputation.
17 | Digital Communication
“Grooming” child will respond to, they may try all of the above in an effort
to win the child’s attention and interest.
Sometimes strangers, or even people who are known, build an
emotional connection with children and young people online Inform and discuss with friends, family members, teachers or
or face-to-face to gain their trust for the purposes of sexual anyone you trust any annoying or uncomfortable occurrence
abuse or exploitation. Many children and young people begin or activity such as extra friendly behaviour, cyber stalking,
to feel that a special friendship or relationship is developing bullying and strange behavior online.
and do not understand that they are being groomed.
“Grooming” is subtle but has serious consequences.
Viewing Inappropriate Content
Hi !
a) Bribing: This can range from offering money and gifts. The
gifts may even be in the form of points or lives and in-game
rewards in an online game. If you are going through something similar,
do not hesitate to report such profiles.
b) Flattery: Constant attention and praise can be a way of
winning the affection of the targeted child.
Gaming
c) Sexualized games and intimacy building: Gradual introduc-
Games can offer children a way to escape from the real world
tion of subtly sexual allusions in conversation or during play
and immerse themselves in a virtual world. Increasingly,
are used to test the child’s vulnerability. If the child positively
children play games on mobile phones, consoles, laptops,
responds to his overtures, he will attempt to build further
computers, portable gaming devices and social media. While
intimacy with the child.
playing you could interact with other gamers through a
microphone or a webcam. Cybercriminals can find a way to
d) Desensitization: They try to desensitize the child to sexual
victimise children through befriending them online,
acts by showing the child, pornography and child sexual
cyberbullying or sharing inappropriate content. Children
abuse imagery. Constant exposure to explicit content may
should be made aware of the risks and how to handle certain
‘normalize’ sexual behavior for the child and ‘desensitize’
situations.
her/him.
Good practices: How you can protect yourself while playing games online
provocation and/or challenge. Stop playing such games and
inform your parents/ elders. a) Check the age classification of the games you want to
play. Stick to the ones that have been indicated for your
c) Many adults and cyber criminals pretend to be children age group.
while playing online games. They may try to befriend you by
giving tips about the games, sharing points with you and b) Never install games downloaded from free online
trying to win your trust. They may use this opportunity to get gaming websites that are not reputed. Never download
your personal information or influencing you for a one-to-one games by clicking on links received on mail or text
meeting. message or through a pop up.
d) Some games may have content which might upset you. Protect Personal Information
This could include violence, horror, or sex or induce you to
self-harm. Do not play these games and talk to an adult if you a) Always install a good antivirus software on your
advice to take breaks every hour or alternate online games birth, address or phone numbers while playing online
f) Be aware of when you feel like you might be getting c) Never share your passwords with anyone. You should
addicted to online gaming. Check if your online games, use a complex password for your online gaming account
stop you from seeing your friends or family. and other online accounts. It is a good practice to change
your password at regular intervals.
iii) Make you unable to stop playing, even when you need to games. This may share your identity with other players and
sleep. attract cyber bullies and other cyber criminals.
professional counsellor. Either they may be able to help or details with anyone when you are playing online games.
help you find someone who can help. They may ask credit or debit card details. Never share such
details with anyone.
https://youtu.be/kvgJIFn_e04
19 | Digital Communication
Know How To Respond To Online Challenges
A class 8th girl’s Instagram account was hacked by one
a) Know the tools that are available to deal with aggressive of her classmates. He used her account to send obscene
or inappropriate conduct online. Learn how to block, mute, messages and videos to her friends and also to all the
delete and report on the games and consoles being used. people who were added in her account. Next day her
friends didn’t talk to her nicely and those who did were
b) If you face any challenge in online gaming world, rude in their behaviour. The girl did not understand the
immediately inform your parents or elders so that they can situation and this kept on happening for a week. The girl
support and guide you. was in despair and asked one of her friend as to why is
everybody avoiding her. She was surprised that all this
c) Never meet in person with someone from your online had happened. She spoke to her friends, clarified the
gaming world. In real life they may be very different. Cyber situation and sorted the problem. The problem that still
criminals may befriend you and try meeting you or getting remains is that her account is still being used by
your personal information. They may have wrong intentions. someone even though most of her friends have reported
that account.
Revenge Pornography
Statement 3 – I have all the details of all our conversation in this chat box,
if you do not send me pictures that I ask you for, I would make these
conversations public, without hiding our identity.
ACTIVITY 2
C
of the world and, at times, it can make them feel that they are a part of a
community.
D
videos of the victim on the social media websites to take revenge against a
broken relationship is known as
ACTIVITY 3
PAY
ONLINE
E
24/7 SAV%
50
a) Buy and sell (e.g., Amazon, Flipkart, eBay, Facebook What Is Phishing Or Vishing?
“marketplace”,...).
b) Book travel (e.g., IRCTC, MakemyTrip, RedBus.in, A target or targets are contacted by email, telephone or text
booking.com). message by someone posing as a legitimate institution to
c) Book hotels (e.g., Trivago). lure individuals into providing sensitive data such as
d) Order food (e.g., Zomato, Swiggy). personally identifiable information, banking and credit card
e) Sell used products (e.g. Olx, Quikr, ebay). details, and passwords. For instance: A student’s grandfather
f) Make payments (Paytm, Google Pay, Bhim, UPI, credit and recently told her about a credit card scam that happened to
debit cards, and netbanking). many of the residents in the old-age home where he lived. He
g) Advertise goods and services. told her that they were called by an anonymous number
h) Pay taxes (e-payment portals). posing to be a bank manager and asked for their credit card
details including the pin number. As a result, the scammers
4.2 OPPORTUNITIES AND RISKS wiped out all the cash from their accounts. They lodged a
WATCH
E-commerce has both risks and an abundance of
opportunities. One risk that individuals encounter is
e-payment methods. An e-payment system is a way of
making transactions or paying for goods and services
https://www.youtube.com/
watch?v=yjU8i66yQCM
24 | Digital Commerce
complaint regarding the situation which led to the scammers
g) Secure your digital devices linked with bank accounts with
being caught but most of them have not got their money
strong passwords and good antivirus software. Choose
back.
unique, non-guessable and meaningless passwords.
What Is Malvertising?
h) Computers in cyber cafes may not have updated antivirus
Malvertising It is the process of using advertisements to or may be infected with malware, which may compromise
infect your devices and systems with malware. These ads your bank details and other sensitive information such as
look legitimate and trustworthy, by one simple click will cause card number, expiry date, CVV, etc. Thus, avoid making
your phones and computers to be compromised. online financial transactions using a public Wi-Fi or a
computer in a cyber cafe.
What Is Piracy?
i) Disconnect the phone after receiving any call from anyone
Production and consumption of pirated music, software, claiming to be a service provider, who seeks sensitive
games and videos is common but illegal. information to avoid deactivation of your number or making
a just too generous offer. Immediately call customer care to
4.3.1 How To Avoid These Risks? check if such a call is genuine.
KaGyaa
Aaj
n
Keep your personal information
like birthdate, location etc.
personal. Sharing it publically
can put you in a vulnerable
situation. Do connect to secure public network whenever possible. In
the event that you are unable to connect to a secure
network, try to login only if it asks for registration.
Safety Measures:
25 | Digital Commerce
Hazards Of Providing Sensitive Information
Online (Credit/debit Card Info, Sharing Otps,
Account Numbers, Etc)
Resist the temptation to open emails and attachments number will connect the user with the service provider but are
from unknown sources, especially those offering actually trying to establish a connection with a duplicate SIM
special deals or surprises. For example: legitimate obtained fraudulently from service provider. If the
websites will send emails that are grammatically unsuspecting user falls in the trap, they use the duplicate SIM
26 | Digital Commerce
The victims of such financial frauds experience serious Scams Using Ids Of Army Officials
problems. They end up being saddled with debts for monetary
transactions they have not done. In order to avoid liability for
debt repayment, they have to provide proof that they have
indeed been duped. The process can be difficult and Messages claiming you have won prizes
time-consuming.
WATCH WATCH
https://www.youtube.com/ https://www.youtube.com/
watch?v=UHzgYY7tgkk watch?v=6cXXsYBwrHQ
WATCH WATCH
https://www.youtube.com/ https://www.youtube.com/watch?
WATCH
WATCH WATCH
https://www.youtube.com/
watch?v=0sAFjBFTf3c&t=29s
https://www.youtube.com/watch? https://www.youtube.com/watch?
v=TmgqNe_KjBg v=tO22q6ejk8w&t=8s
27 | Digital Commerce
ACTIVITY 1
Terms Definition
A
D I G I TA L
ETIQUETTE
c) Using mobile phones in classrooms, meetings and social
gatherings. Using cell phones to text while attending a class
is not appropriate.
It is easier to say hurtful or disrespectful things without make sure it is verified and shared with people you know.
https://www.youtube.com/
watch?v=kuR0DK6O7_I&t=40s
30 | Digital Etiquette
Always ask permission before uploading someone’s pictures
Check The Accuracy Of Your Messages and posting personal details. It constitutes a violation of the
privacy of the person whose pictures or personal details have
Forwarding messages without checking their accuracy:
been posted.
This may contribute to the phenomenon of “fake news” and
rumour mongering.
Cluttering other peoples’ inboxes, which annoys most people.
Tagging your friends may seem harmless but it is important
Double check messages before hitting the send key. Pause
to get their consent. Everyone does not see things the same
and think about your posts, comments and e-mails before
way and you may strain your relationship.
you send it. Once you press the send key, there is no way to
take back the messages. Sometimes a message that is
5.3.4 Posting Positive
meant to be funny, may not come off that way at all because
the person on the other end cannot see your facial Do not post anything that you do not want to last forever.
expressions or hear the tone of your voice. Read your Before you say or post anything online, ask yourself, “Am I ok
messages again to see if they can be misunderstood. It is if this is never deleted? Once something is posted online, it is
best to discuss sensitive or difficult issues with the person likely to be there forever. As of now, there is no delete button
directly rather than posting something online or sending a or eraser for the Internet.
hurtful e-mail.
Avoid inappropriate use of technology. Users have a
5.3.3 Respecting People’s Confidence responsibility to use technology appropriately without
harming or inconveniencing others. Many users often use
The ability to keep information shared by someone in
technology inappropriately without understanding the
confidence reflects a strong character. Do not reveal the
consequences.
information online (or off-line) if the answers to the
following questions was “yes”.
For example, Spamming is the sending of unwanted bulk
messages indiscriminately through emails, internet forums,
- Was this information supposed to instant messaging, social networks, mobile text messaging,
be confidential? fax transmission, advertisements, and other networks.
- Will it embarrass the source of
information?
- Will sharing this information
compromise someone’s privacy or
create drama?
WATCH
https://www.youtube.com/
watch?v=0AxfdpuyHS4&feature=youtu.be
31 | Digital Etiquette
5.4 CYBERBULLYING AND
CYBERSTALKING VARIOUS FORMS OF CYBERBULLYING
• Making fun of another user in internet chat rooms.
A fine line separates bullying from teasing. Different people • Harassing a user over instant messaging sessions.
have a different threshold of tolerance for being able to take • Posting derogatory messages on a user's social
teasing or cyberbullying. Know and understand what networking pages.
cyberbullying is and never engage in that kind of behaviour. • Circulating rumours about another on social
networking sites.
• Publishing lewd comments about another person on
personal blogs.
• Posting unflattering pictures of another user on the
web.
• Sending unsolicited and unwanted email messages
(also known as spamming).
• Sending threatening or provocative emails.
• Repeatedly calling another person's cell phone.
WATCH
https://www.youtube.com/watch?
v=YzZjY3jjx5Q&feature=youtu.be
Unacceptable Use Of Technology To Bully Others b) Remember what you post online remains there, so do not
share your personal information like date of birth, address,
Being at the receiving end of offline or online bullying can be and phone number on social media or other online
very distressing for anyone. Under no circumstances can platforms. You can go to privacy settings on social media
such behavior be considered acceptable. platforms to select who can access your posts online. Try to
restrict access of your profile to your friends only.
32 | Digital Etiquette
f) Block and if need be report using the site’s reporting
Think
Before you post function as soon as possible if someone makes you
uncomfortable on a social networking site.
Is it..... TRUE?
Is it..... HURTFUL? Cyberstalking is when an individual is repeatedly or
Is it..... NECESSARY? electronic means. The movement of the child is tracked and
1
LOG OFF
the site where bullying is happening
2
BLOCK EMAILS OR MESSAGES.
Dont respond to them.
3
SAVE THE MESSAGE OR EMAIL Causing harm to somebody unintentionally through the
and show it to an adult.
use of technology.
4
TELL SOMEONE Unintentional Harm:
you trust
Cyberbullying has an adverse effect on the victim and can
cause emotional and psychological problems. Victims can
experience stigmas, shame and humiliation from peers.
STOP THE HATE Often they may report headaches, stomach aches that often
Always respect each other online, accompany nervousness and anxiety. They may also turn to
even when you disagree with them. self-harm in different ways. Being bullied can lead to low
#EndCyberBullying self-esteem and poor performance in school. In some cases
it can lead to depression with some children feeling hopeless
c) Do not install unwanted software and apps like dating App, and helpless about their lives. In extreme cases it can lead to
online games, etc. from unknown sources. Be careful of suicide by the victim.
revealing personal details or identity details if using common
spaces for online interactions. Just think. Would you like to be at the receiving end for these
possible consequences, even if these are unintentional?
d) If you feel upset after reading a post from a friend or a Consider the possible impact of your online actions. You may
stranger, do not react with an aggressive reply. Resist the cause a lot of harm to the child which can have a long term
urge to retaliate or respond immediately. It may encourage impact on personal well being as well as school
the bully to keep posting such messages. Take a break and performance. Will you be comfortable being responsible for
do something you enjoy doing to distract yourself. any of this?
WATCH
e) Convey your discomfort to friends and acquaintances
about hurtful posts or messages they may have shared or
sent with unequivocal request to not to do it again. If such
posts and messages persist, inform your parents or trusted https://www.youtube.com/
33 | Digital Etiquette
What To Do When You Realise You Are A girl of class 9th was abused and threatened by a
Experiencing The Impact Of Cyberbullying / relative. She was tortured and sometimes even
Cyberstalking? drugged. The relative used to send her abusive
messages and threaten her that he will tell her parents
If a child has been the victim of cyberbullying or cyberstalking
that she has a boyfriend. She was scared to confide in
and/or is experiencing any of the signs of harm described
her parents because of the fear that her parents would
above, the child must immediately inform a trusted adult,
not believe her.
either parent, teacher, counsellor or relative. They will initiate
the actions required for addressing the offender as well as
Lesson: Keeping silent is not a solution to such a
take measures to provide help for coping with the ill effects.
problem. Never be scared of telling your parents the
This is in your interest; do not remain quiet about it.
truth. Make sure to complain about such problems to
Remaining quiet will give the offender confidence to trouble
the police and seek help from authorities whenever
other children as well. At the same time you will ignore your
needed. There are people willing to listen to you and
need for help and assistance to cope with the situation.
help in addressing your problems.
WATCH
34 | Digital Etiquette
other negative comments, posting explicit pictures or University Case
stalking either by impersonating someone or through
unauthorized access to teachers devices. All these activities Kyle Kashuv, a recent graduate of a high school in Parkland,
are unethical and against digital etiquette and at the same Florida in the US gained initial notoriety as an outspoken
time, several of these may attract legal consequences. advocate against gun control in the wake of the 2018
Parkland attack that left 17 dead. He had survived the
If students have issues concerning their teachers, which are incident but unlike many of his classmates who demanded
bothering them, they should approach the school stricter gun control measures, he argued for maintaining
administration rather than resort to such measures that can strong Second Amendment rights and successfully lobbied
get them into serious trouble. for the federal STOP School Violence Act, which included
several school safety measures in lieu of stricter gun control
5.6 ONLINE REPUTATION AND measures. According to his classmates, he was prone to
DIGITAL FOOTPRINTS expressing vile, blatantly sexist and racist views in person,
texts and shared google document. Not only did Kashuv
Internet users leave behind “digital footprints”, which can become something of a celebrity, he also was very
influence their reputation. It is made up of the content academically accomplished and won admission to Harvard.
created, posted and shared by the user, as well as the content
posted and shared by others with and about the user. It is But in May, the Huffington Post released a series of vile,
made up of information on websites they visit, emails they blatantly racist slurs made by Kashuv after receiving them
send, any information they submit online, and posts on social from Parkland students. Although Kashuv attempted to
media platforms. It can be positive or negative and affects delete the document, it was too late. He posted a Twitter
how people see the user now or in the future. So it is explanation for what he called “callous comments I made a
important that you know what kind of trail you are leaving, few years ago,” claiming “we were 16-year olds making idiotic
and what the possible effects of this trail can be. comments, using callous and inflammatory language in an
effort to be as extreme and shocking as possible. I’m
Make a positive footprint: The best way to keep your online embarrassed by it, but I want to be clear that the comments I
reputation in check is to use your time online to get creative made are not indicative of who I am or who I’ve become in the
and create a positive footprint. For example, why not write a years since.”
blog to promote all the great things you are doing, fundraise
for a charity using an online sponsorship page or create a Almost immediately, Harvard launched an investigation,
video to teach others something new. including contacting Kashuv for an explanation and
informing him that it reserved the right to withdraw offers of
Many social media platforms offer insights into the admission in situations where students behave in ways that
personality traits to the users. Their interest is expressed “brings into question your honesty, maturity or moral
once they accept the offer or take a related quiz. They give character.” Kashuv sent a letter of formal apology to Harvard,
their consent in this process or their consent is deemed. The but the university decided to rescind his admission and
social media platform and/or the app developer are able to rejected his appeal against its decision on the basis of
use the information trail left by the user to offer them the reports and his written sentiments.
results. This is indicative of the amount of information about
the users that the social media platforms possess. The reaction to Harvard’s decision to withdraw its offer of
admission to Kashuv was strong and loud. One perspective
was that a liberal institution treating a conservative youth
unfairly. After all, he was only 16 when he stated his racist
views and had subsequently apologized. The other
perspective defended Harvard’s decision as a proper and
necessary institutional rejection of racism. College
admissions are premised on the behaviour of young people.
As a private university, Harvard has every right to decide
which students will be admitted.
Source: Various media reports. See: Adam Harris “Harvard’s Drastic Decision” in The Atlantic. June 17, 2019.
Retrieved from: https://www.theatlantic.com/education/archive/2019/06/har-
vard-rescinds-admissions-offer-kyle-kashuv-racist-remarks/591847/
35 | Digital Etiquette
Protect Your Online Reputation scrutiny when it was revealed that it was selling
psychological data to candidates in the US Presidential
Use the simple checklist to help manage and maintain your election. The revelations have placed the practices and
online reputation. responsibilities of Facebook and other companies under
intense scrutiny, and raise questions regarding the
Search Yourself Online: Do you know what information about responsibility of the Internet industry.
you is available online? Do a simple web search of your name
and see what you can find. If you find something you are not
happy with, take the necessary steps to get that content Cambridge Analytica case and its
removed. Remember if your Facebook or Twitter pages implications for data privacy
appear you can change this by adjusting your privacy
settings. Political data firm Cambridge Analytica obtained the data
of 50 million Facebook users, constructed 30 million
Check Privacy Settings: Make sure you know what personality profiles, and sold the data to US politicians
information you are sharing on the websites you use, in seeking election to influence voters, without the users’
particular on social networking sites. Most social networking consent. The following are some facts of the case.
want your posts to be shared with your online friends and called ‘thisismydigitallife’ in 2014. The users had to
followers only or with the public. Keep in mind that your consent to give the app access to their Facebook profiles
friend’s content and their settings can also affect your digital and those of their friends in order to take the quiz. They
WATCH
https://www.youtube.com
/watch?v=rCjrmg7nOzM
37 | Digital Etiquette
ACTIVITY 1
Cyberbullying Cyberstalking
ACTIVITY 2
DOB Location
Verified news Personal Details
Private Photos Mean/Hurtful comments
Mobile Number Forwarded spam messages
ACTIVITY 4
water, time spent with your Eye Strain: Eye redness or irritation from staring at the
family and friends, physical bright backlight of screens for long periods, dry eyes due to
activities and offline hobbies. reduced blinking, blurred vision and general fatigue from
staring at screens and straining to see small fonts and
images are all symptoms of digital eye strain.
screen time. Accidents: Avoid use of online activities like selfie, social
media use or any other online activities to avoid accidents
while you are on the move. Traffic rules also have made this
a punishable offence and invite fines. While it is good fun to
get good pictures to capture the moment, do not allow the
social media obsession for the ‘perfect’ selfie, or the
number of likes you get, influence your judgement or affect
42 | Digital Health and Wellness
your self-esteem or force yourself to compare yourself with • Do you seek new friendships with people met on the Web?
others. • Does the number of friends, likes and views on social media
affect you?
Abuse And Addiction: Excessive use may not be addiction. If • Is your academic performance in school getting affected?
the user is using digital technologies for genuine purposes, • Are you learning something related to your goals in life
e.g., home work, research, essential communication and through your online activities?
moderate leisure, and does not hamper other routine • Is your online time contributing to your school assignments,
activities, the time spent online may be justified. career goals, and entertainment?
• Is your online time contributing to your hobbies or special
WATCH
interests?
https://www.youtube.com/
should consider whether you need
to be conscious you are getting too
watch?v=4dsFKIY-tYw
Nomophobia
“No Mobile Phone Phobia”, is the irrational fear of being
without your mobile phone or being unable to use your phone
and the services that the phone provides (especially phone
calls and Internet connection) for some reason, such as the
absence of a signal or running out of minutes or battery power.
A phobia is by definition an irrational fear.”
404
around, and do an alternative activity.
ERROR
RELOAD HOME
WATCH
https://www.youtube.com/
watch?v=9LgsWRacnuk&t=3s
a) When writing at the computer, avoid excessive reaching a) Installing an endless number of apps (especially social
over the keyboard or work materials. Your keyboard, pointing networks) on your mobile phone can be a total trap. While
device, files and telephone should be within easy reach. A communication options multiply, a person suffering from
sturdy in-line copyholder can double as a writing surface if nomophobia needs to feed their addiction even more.
appropriately positioned. Therefore, not installing that many applications can be a
good way to avoid the temptation.
b) Use a keyboard tray to properly position your keyboard and
pointing device. b) In order to feel liberated, try a technology fast every
month where you actually go for a day or more without a
c) Use a copyholder positioned in line with your monitor and computer, tablet or phone.
keyboard.
Technology should improve lives and not enslave the users.
d) Position the monitor so that the viewed part of the screen That is why, using technology in a reasonable way will
allows you to keep your neck in a neutral or straight position. always be the smart choice. And if you are not able to do it
The monitor should be centred directly in front of you. The top by yourself, do not hesitate to ask for help.
of the computer screen should be slightly below the top of
your head, so that you are looking at it with a slightly 6.4 SHARING PROBLEMS TO
downward gaze. SEEK SOLUTIONS
Talking about the problem can be the first step to solving it.
e) Position your monitor to eliminate excessive glare or
If something upsets you online or you are worried about a
reflections from windows and lighting.
friend it can really help to talk to someone. There are lots of
people who can help you, such as friends, family members
and teachers. Talk to an adult who you trust. Talking about
a problem can often make you feel better. If you keep your
worries to yourself they can grow. It is a lot easier to solve a
problem when there are two heads working together on it.
https://www.ehs.pitt.edu/workplace/ergo-tips.html
Peers: Communicate with your trusted friends, especially Seeking help from experts.
those who know more about the problems or have had similar Professional expertise is available, although not everywhere,
experiences, without the fear of being judged. However, a to assist with various problems related with misuse or
certain level of knowledge and sensitivity is required for excessive use of digital devices and technologies.
solutions so do approach an adult who has your trust for
advice and support. The following institutions are well-known for their
expertise on digital health and wellness.
Parents: Speak with and seek help from parents if some kind
of “family agreement” has been arrived at through dialogue a) SHUT clinic (Service for Healthy Use of Technology),
within the family. National Institute of Mental Health and Neurosciences
(NIMHANS), Bengaluru, Karnataka.
Although the risk of abuse online is clearly serious, the capacity of most
children (and their parents) to protect themselves is often under-estimat-
ed. Open and informed discussions among parents and children about the
internet from an early stage can be the best defence against online
grooming and bullying.
Parents often seek the security of their children but they should not be
snooping, which can leave children feeling untrusted and increase the risk
WATCH
of self-harm. Ideally, a family agreement is a good way to start a
conversation with the whole family about how everyone will use the
internet and discuss together how to behave in a positive way when online
at home, at school or at a friends house.
https://www.youtube.com/
watch?v=5Htk0AmZkbg
I. Eye strain :
II. Backache :
Children’s rights
Children’s rights Issues and modified for the
challenges digital age
Right to protection: * Differential access to technology by gender, * Dignity must be respected, protected and
rural/urban and geographic area, language, fulfilled online.
* From all kinds of discrimination (Art. 2). disability, etc.
* Creation and distribution of child sexual * Privacy, freedom from surveillance and
* From information and materials injurious to abuse imagery. censorship and right to online anonymity
the child’s wellbeing (Art.17e). * Exposure to violence. to be safeguarded.
* Grooming for abuse, exploitation and
* From arbitrary or unlawful interference with trafficking. * Control over personal data collection,
his or her privacy, family or correspondence * Cyberbullying, trolling and harassment . retention, processing, disposal and
and unlawful attacks on his or her honour * Blackmail and extortion. disclosure.
and reputation (Art.16). * Invasion of privacy and stalking.
* Misuse or exploitation of personal data. * Protection against harassment, hate,
* Against all forms of abuse and neglect * Misinformation and defamation defamation, crime and sexual exploitation.
(Art. 19), including sexual exploitation and hostility, hate.
sexual abuse (Art. 34), and other forms of * Persuasion and manipulation - suicide, * Children should be free to use the
exploitation prejudicial to child’s welfare (Art. self-harm, pro-anorexia, drugs. internet and protected from its risks and
36). threats based on evolving capacities.
(Source: International Convention on the Rights of the Child, 1989)
PROVISION:
* Life, liberty and security.
To support children’s right to life and development * Formal and informal learning resources and
(Art. 6) curriculam. * Access and use of a secure and open
To preserve his or her identity (Art.8) to education * Wealth of accessible and specialised internet, including addressing special needs of
to support development of his or her full potential information. disabled children.
(Art.28) and prepare them for a responsible role in * Opportunities for creativity exploration and
a free society (Art.29) to recreation and leisure expression. * Cultural and linguistic diversity on the
appropriate to their age (Art.31) to diverse * Digital skills and literacy. internet must be promoted and innovation
material of social and cultural benefit to the child * Ways to counter inequalities. should be encouraged to facilitate plurality of
(including minorities) to promote children’s * Expanded entertainment choices. expression.
well-being (Art. 17) to all measures for recovery * Access to cultural and heritage content online
from neglect, exploitation and abuse (Art. 39). in an equitable way. * Education through the internet, to culture
and knowledge online.
Table adapted from UNICEF and Child Rights in the Digital Age by Sonia Livingstone
The UN Committee on the Rights of the Child is in the process DO YOU KNOW YOUR RIGHTS?
of finalising a General Comment on Children’s Rights in
Right To Education
relation to the Digital Environment, which will provide global
guidance to all countries on how different stakeholders can
The right to education has been recognized as a human right
take measures to protect children’s rights.This will become
in a number of international conventions, including the
available shortly on the following website:
International Covenant on Economic, Social and Cultural
Rights which recognizes a right to free, compulsory primary
https://www.ohchr.org/EN/HRBodies/CRC/Pag education for all, an obligation to develop secondary
es/CRCIndex.aspx education accessible to all, on particular by the progressive
introduction of free secondary education, as well as an
obligation to develop equitable access to higher education,
ideally by the progressive introduction of free higher
education.
• Use technology in a
manner that respects
• Do not breach the community
• A right is the right the rights of others,
• Act within the law, follow • Read the fine print standards. If you do, the service
thing to do. Every including the right to
the norms of decency, and when you first use provider or administrator may
right comes with a privacy and free
pose no serious risk of an online service. intervene to take corrective measures,
corresponding speech.
harm to yourself and which can affect your digital footprints.
responsibility.
others.
Right To Be Forgotten
If you find yourself in the following situations, which right would you exercise.
Match the following :
Situations Rights
55 | Digital Security
Several public locations like shopping malls and airports
among others offer their customers free access to public
Wi-Fi. But public Wi-Fi networks also enable cyber criminals
to spy on unwary customers, take advantage of this
convenience and intercept their data. They can access
sensitive information of users’ banking credentials, account
https://www.youtube.com/
passwords and other valuable information. watch?v=LSoFbqYr4ew
WATCH
8.2.2 Preventing And Countering Threats
And Risks
Install anti-virus software and ensure that is updated as f) Download apps from trusted sources like Google play,
c) Verify if the Wi-Fi link is legitimate and safe • Always scan the USB device with latest antivirus before
accessing.
Treat all Wi-Fi links with suspicion. Public Wi-Fi is inherently
insecure — so be cautious. The Wi-Fi link could also be a • Protect your USB device with a password.
bogus link set up by a cybercriminal trying to capture
valuable, personal information from unsuspecting users. • Encrypt the files/folders stored on the device.
Don’t connect to an unknown or unrecognised wireless
access point. Try to use known Wi-Fi links, which are • Use USB security products to access or copy data on your
password protected. USB.
d) Learn to create VPN to avoid downloading of data through • Do not accept a promotional USB from unknown persons.
public Wi-Fi.
• Do not keep sensitive information like username and
Use your mobile phone to create VPN If you need to access
passwords on the USB.
any websites that store or require the input of any sensitive
information consider accessing them via your mobile phone
g) Disable Bluetooth and Airdrop when not in use
network, instead of the public Wi-Fi connection.
8.3 OPERATIONAL SECURITY a short while. Always keep your system locked whenever it is
not in use.
8.3.1 Passwords
Strong WATCH
Unique
may prevent you from sending virus to others if you are
57 | Digital Security
8.3.3 Security Settings On The Browser Data Accessibility And Privacy
• Update anti-virus software regularly. Certain online activities compromise the privacy of children.
DO NOT OPEN OR DOWNLOAD ANY Use the following advice when browsing the web to reduce
FILES SENT BY UNKOWN SENDERS. your risk of being a victim of cybercrime. Settings and
THEY MAY CONTAIN MALWARE security models are different for each browser. Visit the
THAT CAN following vendor websites to learn more about the security
https://www.youtube.com/
watch?v=1p2-YtsRcUg
WATCH
58 | Digital Securityt
INTERNET EXPLORER
APPLE SAFARI
59 | Digital Security
MOZILLA FIREFOX
GOOGLE CHROME
60 | Digital Security
Securing Browsers
Click on the three vertical dot top right side corner in the Chrome and select Settings. Or simply
type chrome://settings/ in the address bar.
People section
Autofill section
Advanced Section
In Privacy and security turn off the Allow sites to check if you have payment methods saved.
Click on Site Settings then Cookies and it is recommended to disable Allow sites to save and read
cookie data (recommended) and enable Block third-party cookies. Click on Location and make
sure that Ask before accessing (recommended) is set or you can block the location access by
simply toggling the button.
Click on Camera and make sure that Ask before accessing (recommended) is set or you can
block the camera access by simply toggling the button.
Click on Microphone and make sure that Ask before accessing (recommended) is set or you can
block the microphone access by simply toggling the button.
Click on Motion sensors and Block sites from using motion sensors by simply toggling the
button.
It is highly recommended to disable JavaScript for Security purposes but on disabling JavaScript
some webpages may not load properly. To disable JavaScript click on JavaScript and then block
it.
It also recommended to turn off Flash in Chrome. To check it click on Flash and make sure it
showing Block sites from running Flash (recommended).
Click on Pop-ups and redirects and make sure it is Blocked, if not block it.
Click on Ads check it is showing Blocked on sites that show intrusive or misleading ads
(recommended).
Click on Clipboard and make sure Ask when a site wants to see text and images copied to the
clipboard (recommended) is checked.
61 | Digital Security
Make sure your Safari is up-to-date to the latest version. To check for updates just go to the Apple
menu and click on Software Update.
Now it's time to secure Safari Preferences. Just go to the Safari Menu and click on Preferences.
Apple Safari
In General section uncheck Open “safe” files after downloading.
It is recommended to disable JavaScript for security, but some sites may not load properly.
In the bInternet plug-ins uncheck Allow Java and also uncheck Allow all other plug-ins.
In the Privacy section-- Select Block cookies as From third parties and advertisers.
First of all, click on the Tools icon in the top right corner in Internet Explorer and click Internet
options.
First of all it is recommended to Update Your Windows to necessary security patches.
In General section:
It is recommended to change the Home page first. Change it to something reputed search
Internet Explorer
engine.
Check the Delete browsing history on exit.
In Medium-high section:
Set the Security level to High or at least Medium-high.
Check the box Enable Protected Mode.
Click on Apply.
In Privacy Section:
Set the Settings to High or at least Medium High.
Check the boxNever allow websites to request your physical location.
Check Turn on Pop-up Blocker.
Check the box forDisable toolbars and extensions when InPrivate Browsing starts.
Click onApply.
62 | Digital Security
In Connection Section:
Click on settings under theAutoComplete.
Uncheck Box for Forms and also for User names and passwords on forms.
Check Ask me before saving passwords.
To harden firefox security go fore the three vertical lines located in the top right corner in
Firefox browser and select Options.
OR, Just type about: preferences in the browser address bar also.
First thing Keep your Firefox Up to date for best performance, stability and security and also
make sure Automatically install updates (recommended) is selected in the General section.
Mozilla Firefox
In the Search section make sure you have selected a trusted search engine in the Default
Search Engine.
In the Content Blocking area of Privacy & Security section make sure the Standard protection
or Strict protection is selected. Strict protection may cause some sites to break but Standard
protection will be good enough.
In Cookies and Site Data check the option Delete cookies and site data when Firefox is closed.
It will delete all of your cookies after you close the Firefox browser.
Check the Ask to save logins and passwords for websites option in the Login and Passwords
area.
Check Use a master password. It will pop up a window where you can set a master password. A
master Password is used to protect sensitive information like site password. If you create a
Master Password you will be asked to enter it once per session when Firefox retrieves saved
information protected by the password.
In History select Use custom settings for history and uncheck Remember browsing and
download history and Remember search and form history and also check Clear history when
Firefox closes.
63 | Digital Security
In Permissions Click the Settings right beside Location and add the trusted sites which can
access the Location.
Click the Settings right beside Camera and add the trusted sites which can access the Camera.
Click the Settings right beside Microphone and add the trusted sites which can access the Mozilla Firefox
Microphone.
Check Block websites from automatically playing sound and also you can set exception for the
sites which trust.
Check Block pop-up windows and also you can set exception for the sites which trust.
Check Warn you when websites try to install add-ons to prevent anty third party website to
install add-ons in the browser.
In the Firefox Data Collection and Use uncheck Allow Firefox to send technical and interaction
data to Mozilla.
In the Security make sure that Block dangerous and deceptive content is checked.
Select Ask you every time when a server requests your personal certificate.
Check Query OCSP responder servers to confirm the current validity of certificates.
Always install Plugins and Extensions from official Mozilla foundation. To install add-ons in
Firefox go to Add-ons by going that three vertical lines mentioned earlier and install as per your
requirements.
https://www.youtube.com/
watch?v=uoMfcvDxlKQ
WATCH
64 | Digital Security
8.3.4 Beware Of Strangers And Suspicious Links
Taking regular data backups is an important strategy for securing all your important data. A backup is the only way to restore
the original data.
Data on a hard disk can be lost for a variety of reasons, such as:-
- Hardware failure;
- Operating system failure, e.g., file system crash.
-Files or volumes modified or deleted accidentally by yourself.
-Files or volumes modified or deleted intentionally by intruder.
-Files or volumes modified or deleted by virus or malicious
codes.
Back Ups
65 | Digital Security
You Can Also Use Google Drive To Take A Backup Of Your Data.
Backup On iPhones
https://www.youtube.com/
watch?v=RGJ1oiNOxBI
WATCH
66 | Digital Security
8.4 PERSONAL SECURITY
a) Protect your online reputation: Use the services
provided to manage your digital footprints and ‘think
If you wouldn’t accept this offline, why would before you post’. Even if offensive posts and pictures
you accept this behaviour online? are removed by appealing to the service providers, the
possibility of someone taking screenshots or
If there are people offline who you would be uncomfortable downloading the content cannot be ruled out.
talking to about your physical / sexual experiences, chances
are, you’d be uncomfortable doing this with strangers online b) Do not go to meet a person whom you met online
too. Cyber Groomers who create fake accounts to befriend alone.
people, for the purpose of harming them whether physically,
sexually or emotionally.
Be cautious when your chat partner gives you many Use reliable services and know how to legally access the
compliments regarding your appearance within a short span music, film and TV you want.
of your acquaintance.
Do not talk to people who ask you to share your sexually Acknowledge your sources: use trustworthy content and
explicit photographs or videos. Never accept a friend request remember to give credit when using others’ work/ideas.
from someone you have never met in person. If you share Think about something you have worked hard for, and
your sexually explicit photos or videos with someone, the imagine that someone online would want to receive the same
person can share those photos with others or post them on consideration and receive credit for their work.
Via GPS:
This is mandatory for anyone below the age of 14. Some apps
are malicious in nature. Therefore, to prevent malpractices, it
is important to share the information with parents.
Also, Facebook policy does not allow any student below the
age of 14 to use the app. Even Netflix, YouTube and Amazon
Prime mandates ‘Kids mode’ for all children below the age of
14.
68 | Digital Security
ACTIVITY 1
DOWN ACROSS
4
ACTIVITY 2
Word search:
Find the maximum number of words related to cyber security.
ACTIVITY 3
An$#yOuM@n!071 https://www.faceb00k.com
9570000066@pass http://www.amazone.com
Loveyou3000 htps:/www.google.com
All of the above All of the above
ACTIVITY 4
List three ways by which you protect yourself from threats and
risks on digital devices.
01
02
03
ACTIVITY 5
What is stalkerware?
D I G I TA L L AW
9.2 ILLEGAL ACTIVITIES USING
DIGITAL TECHNOLOGIES
Plagiarism is an act of using or closely rewording the
language and thoughts of another author without seeking
their permission or representing another author’s work as
9.1 WHAT IS DIGITAL LAW? yours without giving credit to the author. Stealing other
people’s work in the form of words, ideas, images or data
Digital law can be defined as the legal rights and restrictions with permission is both illegal and unethical. When using
governing technology use. Most users are unaware of the online resources for school projects, assignments, essays,
possible consequences of their online activities thereby need give credit or acknowledge the author(s) of the resource.
to be made aware of the rules and legal implications of using Copyright infringement: Involves using someone else’s work
the internet. but not paying them for it. For example, using a photograph
found online without seeking the photographer’s
The following are some actions that are unethical or illegal: permission or not paying for using it is a copyright violation.
• Ignorance of the law is not a Sexting is sharing of sexually explicit texts, photos or videos
72 | Digital Law
broken relationship through publicizing false, sexually
provocative portrayal of his/her victim, by misusing
information that he may have known naturally and that he
may have stored on his computer, or phone, or may have been
conveyed to his electronic device by the victim herself, or may
have been stored in the device with the consent of the victim
herself; and which may essentially have been done to publicly
defame the victim.
III. Be smart
Manage mobile apps:
a) Keep apps on your mobile devices updated. Updates
often have security fixes in them.
b) Delete apps you no longer use. It would also entail
clearing of the cache.
73 | Digital Law
Illegal online Laws covering
Penalty
activity offense
74 | Digital Law
9.4 GOOD PRACTICES
What you write is clearly your prerogative. But do remember that any production, consumption and distribution of content
which involves sexual imagery of children is illegal.
Choose friends wisely. Everything is not about the number of friends Consider the whole image. Ask yourself if the image or the
you have. Select your friends wisely as they can access your background giving an indication where you were or what you were
information. Learn to delete/block unwanted friends. doing at the time of taking the picture. If yes, then reconsider posting
it.
Think before saying anything. Be mindful of what you post/update
on Facebook. Ask if you will regret it five years later. Do not become Manage your visibility. Photos you are tagged in are visible to
a part of hate-groups. everyone. To make it secure you can make your account private by
Manage privacy settings. Your posts are publicly shared unless you going to the menu on the (top right side) on your profile.
go to settings and change your Security and Privacy to Only Friends.
Accepting followers. If your account is private you can approve who
Keep in mind the dangers of sharing. Be careful of what information follows you. Do not accept requests from strangers. Also be mindful
you put out on Facebook. Check your posts and images for of who you are following.
indicators of your whereabouts or anything that may invite unwanted
users. Block/report unwanted contacts. Go to their profile and tap menu
(top right side) to report and block. You can also report images by
Create friends lists to manage your posts. Create separate lists for going to menu option at the top of each image.
your acquaintances, friends, family etc. This will make it easy to
regulate or control who can see your posts. “Untag” yourself. You can untag yourself by tapping on your
username in the post, provided the post is public or you follow the
Look out for suspicious activities. Do not click on suspicious links. person who tagged you.
Beware of fake Facebook pages that steal your password. If your
account is hacked, change your password or report to Facebook. Other tips. Switch off geotagging and location feature. Delete your
post if you are not sure about it. Posts are easy to embed in other
websites. It may go viral.
Being safe on
social media platforms
Other instant messaging applications
Screen capture is possible even on Snapchat, which does not save
images. Screen shots are an easy way to save images, and many Do not open, accept, or download a file in Instant Messenger from
third party apps auto-save images. someone you do not know or if you do not know what is in the file.
Notification is not guaranteed. Snapchat tells you when your snap Contact the sender by email, phone, or some other method to confirm
was viewed or screenshot. But this function is not always reliable. that what they sent was not a virus.
Manage your privacy settings. Tap on the ghost icon on the top of Visit Microsoft Update to scan your windows computer and install any
your camera screen-> Settings (gear icon)-> ’who can’ section-> high-priority updates that are offered to your PC. If you have Automatic
change settings from Everyone to My Friends. Updates enabled, you have to make sure you install them when
received.
Threat of unknown users. Tap and hold the user and select gear icon
Use up-to-date version of your Instant Messenger software for better
to Block unwanted users.’ Add Nearby’ may seem cool but keep in
protection of your computer against viruses and spyware.
mind it can be risky.
Upgrade from MSN Messenger to Windows Live Messenger in order to
Sexting concern. Avoid sharing snap stories that you do not want
block attachments that may contain malware and allow scanning of
others to access. Do not share sexually explicit pictures as these
attachments for viruses.
may easily go viral.
“Spim” (a short form of spam over instant messaging) uses IM
Keep your User ID Private. Do not post your username on social platforms to send spam messages over IM. Like email spam
media as it may attract unwanted attention. Also do not share your messages, a spim message may contain advertisements or weblinks,
password with anyone. by clicking on those links malicious code enters into your PC.
75 | Digital Law
9.5 AVAILABLE REDRESSAL
MECHANISMS
Step 1: If you come across any
9.5.1 Social Media Platforms content that you wish to report, or
get removed, go to the top right
corner of the post and you will find
three dots.
https://www.youtube.com/watch?
v=YuTlFfV1gdg&feature=youtu.be
WATCH
76 | Digital Law
Step 1: If you wish to report any comment you see on
Step 1: If you wish to YouTube, go to the comment section.
report any number on
WhatsApp, go to the 3
dots on the right-top
corner of the chat.
Social media platforms have similar processes for reporting objectionable photos, videos, accounts and comments or any
other content. Click on the three dots on the corner of the post to go to the “report” option. Report objectionable content by
choosing the appropriate reason.
77 | Digital Law
9.5.2 Police
Reporting on
cybercrime.gov.in
Portal run and maintained by
Ministry of Home Affairs,
Government of India
78 | Digital Law
9.5.3 Childline 1098 9.6 REPORTING
· Social- Talk to parents, teachers , counsellors .
CHILDLINE 1098 is India’s first 24-hour, free, emergency
· Legal- Approach the police.
phone service for children in need of aid and assistance. A
· Platform - in app reporting, as discussed above.
child or any adult on his or her behalf can dial 1098, the toll
free number to seek help for emergency needs and to avail
Content Removal from Websites
of long-term care and rehabilitation services.
https://www.youtube.com/watch?
v=YuTlFfV1gdg&feature=youtu.be
WATCH
79 | Digital Law
ACTIVITY 1
Plagiarism:
Impersonation:
Revenge Porn:
Unauthorised access:
Defamation:
ACTIVITY 2
What are the good practices that should be followed on social media
platforms for personal safety and digital security?
ACTIVITY 3
ACTIVITY 1
ACTIVITY 2
In a debate, take a stance for or against the motion and frame your arguments
on the basis of your research.
D I G I TA L L I T E R A C Y
ACTIVITY 1
1. False.
The domain names say a lot about websites, .com, .edu, and .gov are among the
most credible domain endings for websites. Other variations are much less
credible. If any of those three options end a URL, it indicates the website’s
credibility).
2. False.
When reading online, the resource opens quickly but the pages open one at a
time. There may be some brief load times when flipping pages. But when reading
offline, the resources may take several seconds to open as the entire file is
decrypted.
3. True.
4. False.
5.True.
Digital literacy involves the ability to read, understand and interpret digital
processes whereas, digital communication is the ability to communicate,
connect and interact with others.
ACTIVITY 2
D I G I TA L C O M M U N I C AT I O N
ACTIVITY 1
ACTIVITY 2
ACTIVITY 3
The following preventive measures reduce the possibility of online risks and
threats:
2. Do not share personal information like name, date of birth, address or phone
numbers while playing online games. Never share your passwords with anyone.
Use a complex password for online gaming and other online accounts. Change
your password at regular intervals.
3. Never use voice chat or webcam while playing online games. This may reveal
your identity to other players and attract cyber bullies and cyber criminals.
4. Never share your or your parent's credit card/debit card details with anyone
while playing online games. You may be asked credit or debit card details but
never share such details with anyone.
D I G I TA L C O M M E R C E
ACTIVITY 1
D I G I TA L E T I Q U E T T E
ACTIVITY 1
Cyberbullying takes place between two people. The cyberbullies, known people,
known people hiding their identities, or strangers, send nasty text messages or
emails, or set up hate groups on social networking sites. The victim is often
targeted constantly, or periodically, even when they are in the comfort of their
own home. The technologies enable the cyberbullies to circulate messages or
images very quickly and widely on the internet.
ACTIVITY 2
ACTIVITY 3
1. Agree to disagree.
2. Avoid digital drama.
3. Be positive online.
4. Be responsible, honest and truthful.
5. Respect people’s confidence.
6. Appreciate boundaries – your own and of others.
7. Learn to seek consent.
ACTIVITY 4
ACTIVITY 5
D I G I TA L R I G H T S
ACTIVITY 1
ACTIVITY 1
ACTIVITY 2
Word search
1. Phishing
2. Virus
3. Malware
4. Cloud
5. WAF
6. Firewall
ACTIVITY 3
1. (a) An$#yOuM@n!071
2. (d) All of the above
ACTIVITY 4
D I G I TA L L AW
ACTIVITY 1
ACTIVITY 2
63 | Digital Law
ACTIVITY 3
The complaint may be lodged on the social media platform, the Ministry of Home
Affairs portal, with the local police and police cybercell, and e-Raksha portal at the
NCPCR website.
U S E F U L C O N TA C T S
Lodge complaints in person, by post, by messenger, or by any means to the following address:
Complaints can be lodged through E-Raksha, or delivered in by post or in person at the above address.
USEFUL RESOURCES
* https://www.cyberpeacecorps.in/CPCRC/ * Being Safe Online: Guidelines for raising Awareness
among children, parents, educators and the general
public
https://ncpcr.gov.in/showfile.php?lang=1&level=1&&su
blinkid=1637&lid=1661
* Government of India, Ministry of Home Affairs. A
Handbook for Adolescents/Students on Cyber Security.
https://mha.gov.in/sites/default/files/CyberSafety_Eng-
lish_Web_03122018_0.pdf
CBSEIndia cbseindia29 cbse_hq_1929
Cyberpeacecorps