Page 63 - CA 165 ver 1.0 Class 9
P. 63

Protection against Cyber Stalking


                 If you find any such situation of cyber stalking, then inform the stalker that you want him / her to stop all
                 such communications immediately. To take action against the stalker, you should:
                 l    Keep Evidence: Do not delete any email or other messages of the stalker and also keep a printout
                      of the same.

                 l    Save all records: If there is any written threat by the stalker then keep it as a record. If the threats
                      have been verbal only, then keep a record of the date, time and circumstances of those threats.

                 l    Contact stalker’s ISP: If Internet Service Providers (ISP) have concrete proof that any of their users
                      has been using their service for harassing others, then they should immediately stop providing
                      services to such people.

                 l    Keep Records: Keeps a record of all the complaints that you have made to an ISP or agency and
                      also safely keep their official reports for future use.

                   CYBERCRIME

                 Cybercrime refers to misuse of data and resources on internet i.e., cyber stalking, identity theft, bank

                 details theft, unauthorised access of computer or network (hacking), etc. Cybercriminals use Information
                 technology to access personal information, business trade secrets or use the internet for exploitative or
                 malicious purposes.
































                 While most of the cybercrimes are committed to generate profit for oneself, some cybercrimes are done
                 out of hatred or to harass others for fun or for no reason.

                 Cybercrime includes many types of criminal activities, which can be broadly divided as:

                 l    Crimes that target computer networks or devices viz., viruses and malware attacks.
                 l    Crimes that use computer networks to facilitate other criminal activities viz., cyber stalking, fund
                      transfers, identity theft, etc.


                                                                                                 Cyber Safety    61
   58   59   60   61   62   63   64   65   66   67   68