Page 16 - Chinmaya_C8_flipbook
P. 16

DIGITAL FOOTPRINTS


                  Footprints are the impression we leave through foot or walking on the ground
                  while moving. In the same way, a Digital Footprint is an impression of a user
                  leaves while using the Internet.
                  Digital  Footprint  is used  to  describe  the mark, traces  or "footprints"  that
                  a person leaves when  he use internet. The information exchanged online
                  through e-mails and attachments, uploading videos or images leave marks
                  of personal information  about  you  which is available to  others online. A
                  Digital Footprint is also known as Digital Dossier.



                         INDIAN LAWS AND GOVERNMENT INITIATIVES


                  The various legislations that enforce cyber security in India are as follows:


                       Information and Technology Act, 2000

                  This act is also known as the Indian Cyber Act. It provides legal recognition to all e-transactions
                  and aims to protect online privacy and curb online crimes.


                       Information Technology Amendment Act, 2008
                  This law aims to protect data privacy and information security. It validates digital signatures and
                  contracts. According to this act, the owner of a given IP address will be held responsible for the
                  content accessed or distributed through it.


                       National Cyber Security Policy, 2013

                  It is a policy in India that aims to protect public and private infrastructure from cyber-attacks and
                  safeguards personal, financial, and banking information.






                             Let’s Back-Up

                     •   The Internet and smart devices have become an integral part of our daily routine.

                     •   Cyberbullying refers to the use of Internet, e-mail, instant messaging, chat rooms or social
                         networks,  such  as  Facebook,  Twitter,  etc.  to  harass,  demean,  embarrass  or  intimidate
                         someone else.

                     •   When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality
                         they're not to be trusted.
                     •   Spamming refers to the sending of bulk mail by an identified or unidentified source.






                   14   Premium Edition-VIII
   11   12   13   14   15   16   17   18   19   20   21