E-Security (IT) Tips


  • Do not give out identifying information such as Name, Home address, School Name or Telephone Number in a chat room.
  • Do not send your photograph to anyone on the Net without first checking with your parents or guardians.
  • Do not respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening.
  • Never arrange a face-to-face meeting without telling parents or guardians.
  • Remember that people online may not be who they seem to be.


  • Use content filtering softwares on your PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
  • There is also software to establish time controls for individual users (for example blocking usage after a particular time at night) and log surfing activities allowing parents to see which site the child has visited.
  • Use software to keep track of the activities of your children.



  • Don’t delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these.
  • Try not to panic.
  • Avoid getting into huge arguments online during chat or discussions with other users.
  • Remember that all other internet users are strangers. You do not know who you are chatting with. So be careful and polite.
  • Be extremely careful about how you share personal information about yourself online.
  • Choose your chatting nickname carefully so as not to offend others.
  • Do not share personal information in public spaces anywhere online, do not give it to strangers, including in e-mail or chat rooms.
  • Do not use your real name or nickname as your screen name or user ID.
  • Do not post personal information as part of any user profile.
  • If a situation places you in fear, contact a local law enforcement agency.
  • Save all communications for evidence. Do not edit or alter them in any way.
  • Also, keep a record of your contacts with Internet System Administrators or Law Enforcement Officials.


  • Use strong passwords.
  • Choose passwords that are difficult or impossible to guess.
  • Give different passwords to all other accounts.
  • Make regular backup of critical data.
  • Backup must be made at least once in each day.
  • Larger organizations should perform a full backup weekly and incremental backup every day.
  • At Least once in a month the backup media should be verified.
  • Use virus protection software.
  • That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically.
  • Use a firewall as a gatekeeper between your computer and the Internet.
  • Do not keep computers online when not in use.
  • Either shut them off or physically disconnect them from Internet connection.
  • Do not open email attachments from strangers, regardless of how enticing the subject line or attachment may be.
  • Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that person’s knowledge from an infected machine.
  • Regularly download security patches from your software vendors.



  • Develop and publish a comprehensive privacy policy.
  • Ensure your employees are trained on the policy and follow it.
  • Monitor the privacy policy and your compliance.
  • Only ask customers for information that is absolutely necessary to complete a transaction.
  • Store only absolutely necessary data elements; once a payment is complete, there is no reason to maintain payment information in readable form.
  • Verify the payment system that you implement deletes temporary data files with payment records.
  • Make certain server log files do not inadvertently store customer payment information.
  • Limit employee access to payment systems and monitor those who have access to sensitive data or payment systems.
  • Use technology tuned for the Internet to detect potential fraud.
  • Follow up on suspicious transactions and immediately report any security breach or loss of computer systems to police.


  • The Internet is the global storehouse for information. It is like having the biggest library in the World at your fingertip Use the net to increase your knowledge, to do class work better
  • Visit interesting places sitting at your computer – visit the Taj or the Smithsonian Institution or the Louvre in Paris – all without stirring from your chair.
  • Use the net to keep in touch with children from other parts of the Country or other Countries-make new pen friends; collect information.
  • Many on-line service providers host chat rooms especially for children, monitored continuously for safety.
  • The net is a global community – without any barriers, distances, boundaries.
  • Be careful about talking to “strangers” on a computer network.
  • Respect privacy on the net.
  • You may have known the password of some other user- your friend/schoolmate. But do not use it to read their mail or send mail from their ID. Remember somebody else can also do this to you.
  • Use the net to find information about schools and colleges-events or courses they may be offering. Many of them offer you a virtual guided tour of their facilities. Take advantage of this. This will help you take a decision when planning your future.
  • Be careful about what you download from the net. Use a virus scan before the download as many programs may contain virus-this has the potential to destroy your system.

Don’ts :

  • Do not give your password to anybody. Somebody who is malicious can cause great harm to you and your reputation. It is like leaving your house open for a stranger and walking away.
  • When talking to somebody new on the net, do not give away personal information-like numbers of the credit card used by your parents, your home addresses/ phone numbers and such other personal information.
  • If you feel uncomfortable or threatened when somebody on the net feeds you an improper or indecent message inform your parents or elders.
  • Do not break into somebody else’s computer and worse still change things; you are probably destroying a lifetime of hard work by somebody. You may be intelligent but use your intelligence for better things. Somebody else can be as ruthless and as intelligent to break into your system and destroy your creations as well.
  • Do not copy a program that is copyrighted on the net. It is illegal. You are actually stealing somebody else’s hard work. There is a lot of illegally available material on the net. Do not use it yourself.


Hacking is an offence under section 66 of the IT Act. Hacking attracts serious penalties which include a jail term of 3 years, a fine of Rs. 2 Lakh or both.



  • Hacking can put you in a lot of trouble;
  • Hacking is not fun but causes tremendous trouble;
  • Use your brains and intelligence for something better.



Please think about what you would have felt if you were one of the 600 phone subscribers that were affected. Imagine what would have happened if there were an emergency with you – somebody was sick and you needed the ambulance.

You would stay out of harm – if you stopped for a moment to think – what if somebody hacked into your system or your program/opened your mail.


Banking Tips:

Safe Usage of ATM, Debit Card, Credit Card and Net Banking

An Unethical Hacker/Cracker/Cyber Criminal has many ways to gather a credit card number from an Victim. The most common one is known as phishing, Desktop Phishing, Tab Napping, Ex: – www.paypala.com Instead of www.paypal.com or onlinesbl.com instead of onlinesbi.com or lcalab.com instead of icalab.com [Always check URL before login in any Online Bank account].



  • In this technique, the hacker poses as an officer within an organization, let’s say Visa. The hacker sends to a group of email accounts an alert, instructing the receiver to follow determined set of instructions before his credit card is cancelled. If the user is not aware of this kind of fraud, he will insert his credit card number, his name and expiration date without knowing he is going to be a victim of an online crime.
  • Another way for hacking credit card numbers is through a website. The hacker only needs to hack the systems of an online retailer, let’s say, Snap deal, ebay and search for the database where the retailer stores the information of all of the users who have made recent transactions.
  • The third way is through the online process of buying. Let’s say an adult finds a website with adult content that he or she finds attractive. It’s quite probable that the website is only a masquerade for acquiring credit card information from you.


  • There is some way to Protect your credit cards and bank accounts from the hackers is that to check URL before putting your password and important data” that your sharing your information with right organization or not .
  • Example if you’re going to do online banking or any online login at that time check your URL that your trying to login in Original website or fake Now You can easily find which one is fake website www.bankofindiaka.com or www.bankofindia.com.
  • Protect your Personal Identification Number (PIN) or secret code when using your card (at the ABM and at a merchant). Memorize your PIN. Do not write it down anywhere. Change your PIN regularly and do not choose one that is too obvious (e.g., your date of birth, address or part of your telephone number). Don’t share your PIN with anyone.
  • Never divulge your card number by phone unless you are doing business with a very trustworthy company. Only give the number if you initiated the transaction.
  • Be aware of online purchases on a public Wi-Fi connection easily hackers can make you target if you’re doing online transaction on public wifi If you find yourself using public Wi-Fi often, consider getting a VPN, which is more secure.
  • Use different passwords on different sites. Ignore pop-ups because it can contain malicious software which can trick a user into verifying something.
  • Lock your phone and tablet devices to prevent another to use your cell phone to do any malicious stuff
  • Don’t forget to destroy any cards that you no longer need so that no one else can use them. Each time you use your card, make sure that you are returned the right one after paying. When at work, never leave your credit cards unattended. More credit cards are stolen at work than from any other location. Never leave your credit cards in cars or any unsafe place. A large percentage of credit card thefts are from vehicles. While travelling, keep your cards on you or in a safe location.
  • Always check your monthly account statement. Make sure that the transactions are yours. Immediately notify the Bank or issuing company if a card is lost or stolen.


How to Report Cyber Crimes in India

Cyber Crime is a criminal activity which is carried on by the use of computers and the Internet. Some of the common cyber crimes are hacking without permission, cyber stalking, denial of service attack(DoS), virus dissemination, software piracy, credit card fraud & phishing.

To tackle the issue of cyber crimes, Crime Branch & District Police of various states opened up Cyber Crime Cells in different cities. The Information Technology Act of India states clearly that when a cyber crime has been committed, it has a global jurisdiction, but a complaint can be filed at nearby cyber cell.


Vadodara Cyber Cell

Address: Bhadra kacheri, Panigate Darwaza, Vadodara, Gujarat 390017

Phone:1800 599 9001





Call / Whatsapp Me on (+91) 8141165881