safely browsing the web and using social networks
   Follow proper protocol in language use while chatting, blogging and emailing
          Do not download and use copyrighted material
          Avoid revealing too much of your personal information like your age, address, telephone
           number, school name etc. as this can lead to identity theft
          Do your privacy settings very carefully on social networking sites
          Never reveal your password to anyone other than your parent or guardian Communicate and
           collaborate only with people known to you
          Do not post anything which hurts others feelings
          Always be careful while posting photographs, videos and any other sensitive information in
           social networking sites as they leave digital footprints which stay online forever
          Do not post your friends’ information on networking sites, which may possibly put them at risk.
           Protect your friends’ privacy by not posting the group photos, school names, locations, age, etc.
          Avoid posting your plans and activities on networking sites
          Do not create fake pro-les for yourself on any social networking sites. If you suspect that your
           social networking account details have been compromised or stolen, report immediately to the
           support team of networking site
          Do not forward anything that you read on social media without verifying it from a trusted source
          Always avoid opening links and attachment through social networking sites
          Never leave your account unattended after login, log out immediately when you are not using it
        Identity protection while using internet
   We use internet for a variety of reasons like for using social media, buying and selling goods, to sending
   information. When we give out private data to businesses and other internet users, we trust them to
   use that information for right purpose. This is not always the case though and financial and personal
   data can be used for harmful reasons like hacking, stalking and identity fraud.
        Proper usage of passwords
   Passwords provide the first line of defense against unauthorized access to your
   computer and personal information. The stronger your password, the more protected
   your computer will be from hackers and malicious software. You should maintain strong
   passwords for all accounts on your computer.
   Here are some useful tips to for creating strong passwords and keeping your information secure.
1. Use a unique password for each of your important accounts. Do not use the same password across
   multiple accounts.
2. Your password should be at least 8 characters long. Password should consist of lowercase and
   uppercase letters, numbers and symbols. A long password will offer more protection than a short
   password if it is properly constructed.
3. Do not use personal information such as your name, age, date of birth, child’s name, pet’s name, or
   favorite color/song when constructing your password.
4. Avoid consecutive keyboard combinations (i.e. qwerty or asdfg).
5. Look around and make sure no one is watching while you enter your password. If somebody is, politely
   ask them to look away.
6. Always log off/sign out if you leave your device for the day – it just takes a few seconds to do and it’ll
   help ensure that no one uses your system for malicious purposes.
7. Avoid entering passwords on computers you don't control – they may have malicious software installed
   to purposely steal your password.
8. Avoid entering passwords when connected to unsecured Wi-Fi connections (like at an airport or coffee
   shop) – hackers can intercept your passwords and data over unsecured connections.
9. Never tell your password to anyone.
10. Change your passwords regularly and avoid using same password over and over again.
11. Never write down your passwords on a sticky paper and hide underneath your workstation or
    telephone. Somebody will find it.
12. Always select “never” when your Internet browser asks for your permission to remember your
    passwords.
    Privacy
    privacy is the right to be let alone, or freedom from interference or intrusion. Information
    privacy is the right to have some control over how your personal information is collected and
    used.
    Confidentiality of Information
    Confidentiality of Information ensures that only authorized users get access to sensitive and
    protected data.
    Cyber Stalking
    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication,
    such as e-mail or instant messaging (IM), or messages posted to a social networking Web site
    or a discussion group.
    Reporting Cybercrimes
     In order to register a cybercrime complaint anonymously, the victim/complainant shall follow the
     following steps: Visit the website of National Cyber Crime Reporting Portal at
     https://cybercrime.gov.in/ The complainant will not have to provide any personal information
     and the complaint will be registered anonymously
     Safely accessing websites
1.   Keep your browser and any plugins updated. ...
2.   Use a browser that allows you to take your bookmarks with you between devices. ...
3.   Block Pop-ups. ...
4.   Use an ad blocker. ...
5.   Enable “do not track” in your browser. ...
6.   Clear your web browser cache and cookies. ...
7.   Turn on private browsing. ...
8.   Use a VPN.(virtual private network)
     Viruses and malware
     Viruses and malware are programs that can attack computers, tablets, phones and other digital
     devices.
     A virus is a small program designed to cause trouble by gaining access to your device. It can
     copy your personal data or slow your device down. A virus spreads by duplicating and attaching
     itself to other files.
     By combining the words ‘malicious’ (meaning ‘harmful’) and ‘software’ we get the word
     ‘malware’. Viruses are just one type of malware. Other types include spyware, worms and
     trojans.
     Adware
     Adware, a term derived from "advertising-supported software," is software that displays
     advertising on a computer screen or mobile device, redirects search results to advertising
     websites, and collects user data for marketing purposes.