Saturday, November 9, 2019

Ways to Discipline

There are many simple ways that parents can help encourage their child’s development from an early age. Learning how to effectively discipline your child is an important skill that all parents need to learn. â€Å"To get what we want in life, we have to do what we have never done.† (Derrick 25). Whether the parent is traditional, a stay home parent, or a fulltime worker, the most precious thing a parent can give his or her kids is their time. Here are some ways to discipline, educate, and spend quality time with your children. It is very important to educate your child to succeed. First of all, build up their confidence and ensure that they are happy children. Fuel their imagination by reading bedtime stories. Roy Derrick’s research found that children who are regularly told stories have a better vocabulary, have more idea of sentence structure, and sense of stories (126). Also, nurture their creative skills through play. Some activities can help; like building with plastic bricks, painting, or simply creating items can help a child to build up their confidence. Here are some ways to discipline your children. Avoid physical punishment; it can make your child more aggressive and angry. Also, remember to always give rewards and praise them for good behavior, that way they will know you are happy when they behave well. â€Å"Because of their size, children may be difficult to discipline properly† (Rourke 38). Most importantly, provide your child with a safe environment in which they feel secure and loved. Discipline means to teach and train children family values, right from wrong, to respect the rights of others, and how they are to behave or not behave. Discipline is a positive parenting skill that emphasizes nurturing, guidance, teaching and training that builds a child’s self-confidence and teaches self-control and behavior management. The better you are with discipline, the less you will have to punish (Lin 45) Try to spend some quality time with your kids. Most parents work all day and do not give their child the time they deserve. There are many easy ways to be there with them, like helping them with homework. Make it fun and interesting for them. Plan a picnic, kids love to be outdoor where there is food, games, and they enjoy spending time with family and friends. â€Å"Your children need your presence more than anything else†¦Ã¢â‚¬  (Jackson 42). Growing a garden with your child is also interesting and different from other activities, but they will enjoy getting their hands dirty and being accompanied by you. In conclusion, spending quality time with your kids helps both the parent and child to be more open with one another. Also, educating your child to succeed from the early age, will be an advantage for them in the future. Last of all, to discipline your children with the correct manners, it is important for them and yourself as a parent. Remember to always be there for them when they need you, and you will be a great parent.

Thursday, November 7, 2019

The Distribution of Power at Gateshead in Jane Eyre Essay Example

The Distribution of Power at Gateshead in Jane Eyre Essay Example The Distribution of Power at Gateshead in Jane Eyre Essay The Distribution of Power at Gateshead in Jane Eyre Essay Essay Topic: Jane Eyre At Gateshead, the Reed family holds power over Jane Eyre. The Reeds power comes in several forms, including limiting Janes social contact as well as bullying her. The Reeds also psychologically abuse Jane by attacking her value. Mrs. Reed does not allow Jane to interact with her cousins saying that not until, by her own observation that I was endeavoring in good earnest to acquire a more sociable and child-like disposition, she really must exclude me from privileges intended only for contented, happy, little children. (p.7) This line not only shows the limit of Janes social contact, but also her exclusion from the family as well as a psychological attack against her. Janes cousin John is the member of the Reed family that physically holds power over her. He bullied and punished me: not two or three times in the week, nor once or twice in the day, but continually: every nerve I had feared him (p.10) Up until Janes fight with John, she was expected to remain silent until she could sp eak pleasantly, she also took all of her abuse without reply. Throughout Johns bullying, Janes, care was how to endure the blow which would certainly follow the insult. (p.10) She realizes that reacting will do her no good and that is shown when she does react to John throwing the book at her, Mrs. Reed punished her by sending her to the red-room, while it appears that John receives no punishment. Jane is also reminded of how she is not apart of the Reed family. When John finds her reading he tells Jane that, You have no business to take our books: you are a dependant, mama says: you have no money; your father left you none; you ought to beg, and not to live here with gentlemens children like us. (p.11) Once Jane does gain hope of leaving the Reeds household, the Reeds begin to act curler towards her. Janes social interaction is further red

Monday, November 4, 2019

Quality in customer focussed operations Assignment

Quality in customer focussed operations - Assignment Example Its cost control techniques, details of operational process and incessant product development, along with the corporate attributes, have aided the company to maintain a lower price for customers. During the period of global expansion, it has lowered price of products on an average of 2%-3%. As of January 2014, the company owns around 349 stores across 43 countries. It has been recorded that the company had sold products, amounting to $23.1 billion, in 2010. It is identified that sales of the company has increased by 7.7% from the previous year. The company website displays over 12,000 products to customers, along with clear pictures of IKEA range of products, in order for the latter to gain interest in the company products. The number of visitors, who visit IKEA’s website every day, has been recorded to about 470 million in 2013. It has been identified that in 2013, IKEA has been the largest user of wood, as the company has been noted to use about 1% of the total wood availabl e on the earth. IKEA concentrates on selling wide range of products. The company sells nearly everything, which are required for furnishing a home, including furniture, plants, toys, kitchens and many more. The products, which are provided by them, have unique styles and the function of good quality and style is complimenting products to become most attractive and satisfy customers need. The company accepts the challenge of producing products at a lower price. Any company can make higher quality products at a high price, but IKEA provides its customers with the best quality, along with the lowest price possible, on the product. To provide high quality products at low prices, the company has undertaken cost effective and innovative techniques, which have made them strong enough to rule the retail market with confidence. The whole production process has been reviewed by designers, which has brought in new packing methods and such, thereby reducing cost of manufacturing. The

Saturday, November 2, 2019

Context Analysis and IMC Recommendation Assignment

Context Analysis and IMC Recommendation - Assignment Example Mainly Integrated Marketing Communication (IMC) technique will be used to serve the purpose. Different techniques of marketing communication can be used by VOLVO, but selecting a communication strategy which has right blend of clarity, large communication impact and consistency can be a challenging task. The next half of the project will discuss about the features of the product. VOLVO MOVE is a seven-sitter MPV which has already won NCAP (New Car Assessment Programme) status according to European safety standard. Fuel consumption rate is very low for this car and applications like satellite navigation and park assist facilities are also offered along with their standard model. Moreover, the product is also priced at an affordable rate of ?24, 995. VOLVO has also successfully positioned itself as a car that offers safety and durability to the customers. SWOT analysis for VOLVO MOVE Strength VOLVO is perceived as a reliable and durable brand that manufactures durable cars. The company gives high value for safety and. Likewise in the process of manufacturing MOVE; the company has implemented all such measures. VOLVO has already created a group of customers who strive for safety and in the same way their new product can target the families and elderly people. Weakness Factor like traditional design can create a negative image in the mind young people and unknowingly VOLVO is de-marketing their product for their target young customer (D'Amico, â€Å"Demarketing e turismo sostenibile†). VOLVO lacks the technology to design stylish cars which is the reason why they cannot compete with the car brands like BMW, Cadillac and Lexus in terms of style quotient. Opportunity VOLVO MOVE can change its marketing strategy by using social media marketing to fulfil the primary intention of spreading their message for test driving. VOLVO MOVE can enhance technical features along with better design. VOLVO can use their previously satisfied customer groups to generate word of mouth promotion via online social interaction. Threat VOLVO is not a premium car brand and rather it competes with car brands like Infinity, Lexus and others. VOLVO MOVE has to change their marketing communication strategy constantly otherwise their competitor can copy their move. VOLVO MOVE needs to improve their research and development program on a regular basis to match with customer’s requirement. There is a threat for the car brand in the form of its old fashioned design. However it needs to change with respect to time. Integrated Marketing Communication (IMC) IMC is a strategic marketing communication technique and it represents four types of marketing communication modes. 1. General Advertising-General Advertising creates awareness about the brand and provides information to customers about different aspects and applications of the product. 2. Direct Marketing- This is an approach to create relationship with customers and delivering information about products to the customers. Direct marketing also helps to close sales cycle in a structured manner. 3. Sales Promotion-It is not a long term process. Incentives are there for both consumers and traders. 4. Public Relation- Companies can go for organizing public

Thursday, October 31, 2019

Education Essay Example | Topics and Well Written Essays - 500 words

Education - Essay Example One such person is Fr. Pedro Arrupe, the former head of the Jesuits. He is known to have made a statement that set forth the objective of education to be that of forming men and women for others. He continued by saying that these men and women must believe that â€Å"†¦love of self or of God which does not issue forth in justice for the least of their neighbors is a farce†. This essay will look into this statement shedding light on its meaning and giving an example of a person who works for the least of their neighbors. Father’s statement can be divided into two with the first part looking into making ‘men and women for others’. An educated person should be made to realize that their learned skills and competences in life endeavors are to be used to assist other people. This eliminates self-centeredness and opens room for humbleness. Jesuit Secondary Education Association states that education should be designed to make someone more of a people’ s person than an individual. It is actually impractical for someone to use their learned skills and competences on themselves and for their personal gain. ‘Others’ in this context denotes all people regardless of their race, gender, religious affiliations or even moral backgrounds. Discrimination of any kind has no room in education which means that even ‘less than our neighbors’ are simply our neighbors.

Tuesday, October 29, 2019

Oceanography Today Essay Example for Free

Oceanography Today Essay The speed of sound waves in the ocean ranges from 4,800 to 5,100 feet per second, depending on water temperature, salinity, and depth. This speed is about 4 and ? times the average speed of sound waves in the air. Sound waves can travel great distances in regions of minimum velocity called sound channels. In 1960 the sound from depth charges exploded by a Columbia University research ship off southwestern Australia was detected in a sound channel by hydrophones off Bermuda, 12,000 miles away. In addition to determining the shape of the ocean floor, sonar equipment is used for navigation, to locate submerged submarines, and to locate schools of fish. Porpoises and certain species of sea lions have a natural form of sonar. They emit high- frequency sound pulses, which they use to avoid collisions and to search for food. A fully submerged submarine can communicate with a nearby submarine or surface ship by means of an underwater telephone. This device transmits voice signals directly through water. Reference: 1. Blair, Carvel. (1986). Exploring the Sea: Oceanography Today. Random House Publishing.

Sunday, October 27, 2019

The Information Technology Act

The Information Technology Act When Internet was developed, there was hardly any inclination that Internet could transform itself into an all pervading revolution which could be misused for criminal activities and which required regulation. Today, there are many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities in cyberspace. All existing laws had to be amended to suit the latest developments. Since other laws cannot handle cyber legislations completely, the need was felt to introduce cyber law as a separate discipline. Reasonable Security Measures must be adopted while handling, storing, processing Sensitive Personal Information and Data. This paper examines the various aspects of Cyber Legal System. Keywords- Cyber Crimes, Cyber Crime Investigation, Cyber Forensics, Cyber Space, Cyber Law, Data Protection, Digital Signatures, E-Contracts, Intellectual property rights, IT Act INTRODUCTION The growth of Information Technology has given rise to a new society named Cyber Society. Computers and allied technology is used as a basic tool in Communication, Storage, and Control. Cyber Society includes Cyber Space which is no different from physical space in real society. Information and Communications Technology popularly known as ICT is considered as an integration of computers, software, storage, visual systems, telecommunications that enables a user to access, store, transmit and handle information. To maintain harmony and co-existence in Cyber Space, a need was felt for a legal regime which we call as Cyber Law. In simple words, Cyber Law is the law governing and regulating cyber space. Cyber Laws impact every aspect of Cyber Society be it Education, Entertainment, Business etc and are considered as basic laws of Cyber Space. INFORMATION TECHNOLOGY ACT Indian Cyber Law comprises mainly of Information Technology Act. The Information Technology Act was enacted in the year 2000 and came into force since then. IT Act 2000 is not a penal statute. The Act is intended to promote e-governance of which an essential part is e-commerce. All cyber crimes do not come under the ambit of IT Act; many crimes are covered under IPC. The objective of IT Act 2000 is to provide legal recognition to electronic records and transactions carried out by way of electronic data interchange. CYBER CRIMES Cyber Crimes require no special introduction. In this information technology era, computers and technology are used in every phase be it Business, Education, Governance, Communication, Booking of Rail, Air, Cinema Tickets to name a few. Crimes committed in the Cyber World are Cyber Crimes. In general, cyber crimes can be explained as crimes committed by using a computer either as a tool or a target or sometimes both. There are a variety of Cyber Crimes including Unauthorized Access, Tampering Computer Source Code, Electronic Documents, Forgery, Virus, Trojans, Online Defamation, Cyber Trespass, Stalking, Email Harassments, and Lottery Scams etc. New types of crimes are evolving day by day. Information Technology Act 2000 discusses certain types of Cyber Offences and provides Civil and Criminal Remedies thereon. The punishment is also provided under Information Technology Act 2000, Indian Penal Code, Criminal Law, and Banking Law etc. Therefore, any crime committed on the Cyber Space or by use of Cyber tools is punishable under Indian Law. These Laws are also applicable for persons residing outside India provided any computer, computer network, computer resource in India is used to commit a crime. E-CONTRACTS DIGITAL SIGNATURES A contract is considered as a key element in business. All agreements enforceable in a court of law only are called contracts. The ICT has given a new medium to transact business which is the electronic medium. A new form of business called e-business has become popular today which led to a revolution in commerce by way of e-commerce. With the rise in e-commerce, e-business, the business essentials also turned electronic. This has bought in a revived approach to paper based contracts by introducing e-contracts or online contracts. Information Technology Act has provided legal recognition to all e-contracts. The Act has advanced a unique form of authentication by way of e-authentication which includes digital and electronic signatures. An Electronic document to be legally valid has to be affixed with digital/ electronic signature. The digital signature is needed to use a PKI (public key infrastructure) authentication mechanism. Digital Signature forms an important component of E-contracts and a standard one way hash algorithm is adopted for checking the data integrity. In simple words, there is a public key which in the public domain and there is a private key which is known only to the private user, only if both the keys correspond the document is validated. The Government has licensing authorities called CAs (Certifying Authorities) who would be responsible for issuing a standard key generation systems to the public. A digital certificate would be issued based on application and certain approved procedures. At present there are four agencies established for this purpose including NIC, IDRBT and two private agencies like TCS, Safe Scrypt. IT Act 2000 has also provided a clarification as to determining the time and place of an electronic document when it is transmitted from one place to other. Any electronic document including a webpage, e-mail or any computer generated document can be held against the originator for legal purpose under the ambit of this law. Any automatic system which is either a hardware or software like programs, servers, routers can be considered as an Agent of the owner and any action taken by such a system may be legally held to be an action taken by the owner himself. DIGITAL RIGHTS Freedom of Speech and Right to Privacy are considered as certain rights which all the Citizens enjoy in the nation. Correspondingly, these rights also exist in the digital world. Just as freedom of speech is guaranteed by the Constitution of India, the same also extends to Online Speech or Cyber Speech that might include expression on a website, rights of regulators to restrict the freedom in the interest of sovereignty and integrity of the country, maintaining friendly relations with its neighbors as well as to retain harmony and peace in the society. The Information Technology Act provides that the Controller of Certifying Authorities can order decryption of any information and failing to co-operate with the concerned authority could lead to imprisonment. In addition, under POTA (Prevention of Terrorism Act), the appropriate authorities can intercept communication including emails under approved procedures without the knowledge of the user of the email. Likewise, an investigating Police officer has certain rights to not only intercept and monitor communication but also provide requisition support of the Network administrator for the purpose under Criminal Law read along with Information Technology Act. Right to privacy is a personal right that is guaranteed by the Constitution of India. In the world, whenever a person visits a website or sends out an e-mail his digital identities are being recorded by several systems. Additionally, users share their personal information for varied reasons to different websites. This information is covered under the privacy rights of a user. INTELLECTUAL PROPERTY There exists digital property in cyber world as like the real property in real world. The digital property is also known as Intellectual Property. It is an intangible asset and a vital element in the e-business. It comprises of Copyright, Patent, Trade Mark, Trade Secret, Domain Name, Semi Conductors and Industrial Layouts, Designs. Domain Name is a crucial digital property which a website owner possesses. There is a contractual arrangement between the Domain Name Registrant and Domain Name Registrar. Domain Name registrars are those who are authorized for the purpose by ICANN (Internet Corporation for Assigned Names and Numbers) and the law regarding domain names is governed indirectly by the policies of the ICANN. Laws relating to domain names is associated and linked closely to Trade Mark Law. Generally, the person holding a trademark right can claim priority to possess a corresponding domain name. Content is another cyber property that needs to be considered. Content either within a file or on a website confers a copyright to the original author. The holder of copyright can assign or license the copyright for a price or allow it to be freely used by the public. Infringement, Punishments, Remedies are provided under the Copyright Law. Copyright in cyber world has some grey areas mainly due to a strict definition of Copyright law as applicable to the Meta Society would make Caching, Proxy Server Setting, Meta Tags setting, Caching by a search engine, Hyper linking, Framing, File Sharing etc as possible copyright infringements. Another area where digital property can be recognized is patents on Software and Web Utilities. These are encompassed under the Patent laws. A patent holder can enforce payment of licensing fee or damages if a Patent system is used by another person without specific authorization. Patents in the cyber world are facing a dilemma especially in regard to aspects of technology that are needed to keep the Internet going like Framing, Hyper Linking etc since they are claimed as patented products by the patent holders. DIGITAL EVIDENCE Evidence is the element which probablises a case in a court of law. The evidence in digital form is called Digital Evidence. This digital evidence may be found in computer hard disks, cell phones, iPods, pen drives, digital cameras, CDs, DVDs, floppies, computer networks, the Internet etc. In Civil Law, evidence is analyzed on the principle of PREPONDERANCE OF PROBABILITY. In Criminal Law, evidence is analyzed on the principle of BEYOND RESONABLE DOUBT. Digital Evidence is relatively difficult to destroy. Even if it is deleted, digital evidence can be recovered. When criminals attempt to destroy digital evidence, copies can remain in places they were not aware of. The Present Legal Scenario mandates two sets of quantum of evidence à ¢Ã¢â€š ¬Ã‚ ¢ STRINGENT à ¢Ã¢â€š ¬Ã‚ ¢ RELAXED FACTORS OF DIGITAL EVIDENCE à ¢Ã¢â€š ¬Ã‚ ¢ IDENTIFICATION à ¢Ã¢â€š ¬Ã‚ ¢ PROCUREMENT à ¢Ã¢â€š ¬Ã‚ ¢ PRESERVATION à ¢Ã¢â€š ¬Ã‚ ¢ ANALYSIS à ¢Ã¢â€š ¬Ã‚ ¢ PRESENTATION IN A COURT OF LAW If it can be proved that the chain is not compromised and from the time the sample is taken a standard protocol was followed,the defence tries to demonstrate that there was a possibility of compromise in the chain and proves that he is entitled for a benefit of doubt.(NDPS ACT ,FOOD ADULTERATION). The basic philosophy of understanding or accepting evidence is to know its authenticity. A document should be demonstrated or proved that it is the same document what is purports to be. The forensic skills, technology may be used to prove or demonstrate before a court of law. Section 65 B of the Indian Evidence Act 1872- a certificate similar to Section 3, 4 of Bankers Book Evidence Act. LOGIC BEHIND THE LAW In a secure environment, if persons are to transact there should be a trusted authority. The authority would supervise things to check the integrity, attributions and to prevent non- repudiation. If all these characteristics are given to any environment, the legal system of any country would accept it as legally admissible evidence. TRUSTED AUTHORITY The certificate issued by a trusted authority there is a general tendency to believe it to be true. There are many cases of manipulation of these certificates, but still such systems are not scrapped off. Eg: Voter ID, Passport There cannot be a 100% fool proof system. If it can be demonstrated before a court of law that the new technology is reasonably reliable which would indicate that if manipulated can be found out, then it is accepted by the court. The trusted authority is the certifying authority. It certifies the digital signature. There is an attribution or a presumption a corresponding amendment in the Evidence Act all these together make a presumption. All presumptions are rebuttable. The presumption shifts the onus or burden to the other party to prove the compromise. It applies to civil and criminal law. It is the passport office of the digital world. CYBER CRIME INVESTIGATION It is the Collection, Analysis, investigation of digital evidence, cyber trails. The various techniques of cyber crime investigation include forensic analysis of digital information -using forensic tools, use of sound forensic procedure to identify and detect evidence, examination of evidence, observation of proper custody of evidence, control procedures, documentation of procedures, findings to ensure admissibility in a court of law, preparation of comprehensive written notes, reports. INCIDENT RESPONSE It is considered as a pre-cursor to techniques of cyber crime investigation, forensic tools. Incident Response may be referred to as precise set of actions to handle any security incident in a responsible, meaningful and timely manner. The goals of incident response include confirming whether an event has occurred, educating senior management, helping in detection or prevention of such incidents, minimizing disruption, facilitating criminal action against perpetrators. Various steps of incident response are detection of incidents, initial response, investigation of event, reporting, resolution, pre-incident preparation. CYBER FORENSICS It is considered as the use of investigative, analytical techniques to identify, collect, examine, preserve and present evidence or information which is magnetically stored or encoded. Cyber Forensics can be also defined as the scientific method of examining, analyzing data from computer storage media so that data can be used as evidence in court The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computer and who was responsible for it. Computer evidence is just like any other evidence in the sense that it must be authentic, accurate, complete, convincing to Juries, in conformity with common law and legislative rules. EXAMINER OF ELECTRONIC RECORDS Section 79 A of IT Amended Act 2008 empowers the Central government to appoint any department or agency of Central or State government as Examiner of Electronic Evidence. This agency will play a crucial role in providing expert opinion on electronic form of evidence The explanation to the Section has an inclusive definition of electronic form evidence that means any information of probative value that is either stored or transmitted in electronic form and includes computer evidence, digital audio, digital video, cell phones, digital fax machines. With the increasing number of cybercrime cases it will become necessary to set up at least one Examiner of Electronic Evidence in each State. The CDAC cyber forensics lab in Trivandrum, CFSIL laboratory in Hyderabad are playing similar role at present in cybercrime. COMPUTER- LEGAL DEFINITION COMPUTER is defined under Section 2(1)(i) of the IT Act as:- Computer means any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network;[1] ANALYSIS OF DEFINTION The term computer has been defined in a very wide sense. Considering the definition, devices like microwave ovens, washing machines, scanners, printers, desktops, personal computers, mobile phones etc are considered as a computer under Information Technology Act. COMMUNICATION DEVICE Similarly the word communication devices inserted in the Information Technology Amended Act 2008 has been given an inclusive definition, taking into its coverage cell phones, personal digital assistance or such other devices used to transmit any text, video etc like what was later being marketed as iPad or other similar devices on Wi-Fi and cellular models. CYBER SECURITY There is a need to create a secure environment in cyber space and also prevent unauthorized access and misuse of computer system. In simple words, the security of the cyber space can be called cyber security. Cyber security is critical due to the dangers that threats in cyber world. It requires a global co-operation and effort from all stake holders. DEFINITION The term Cyber Security is for the first time given a legal definition under Indian Cyber Law. Cyber Security has been newly added in the IT Amended Act 2008, under Section 2 (nb) which is as under- Cyber Security means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. [2] ANALYSIS OF DEFINTION The said definition provides security in terms of both, physical security to the devices and security to the information stored therein such devices. The above definition also provides protection for unauthorized access, use, disclosure, disruption, modification and destruction to both physical device and the information stored therein. All communication devices like phones, smart phones and other devices used to communicate audio, video, image, text is covered under the ambit of the definition. DATA PROTECTION LEGAL REGIME Processing of data raises considerable issues on privacy, e-security, misuse of individual information and data. Personal data like credit cards, debit cards etc are normally routed via many countries. The Government of India recently notified the Reasonable security practices and procedures and sensitive personal data or Information Rules, 2011 (Rules) under Section 43A of the Information Technology Act, 2000 (ITA). These Rules have been made effective from April 11, 2011. Section 43A of the ITA inter alia deals with protection of data in electronic medium1 by providing that when an body corporate is negligent in implementing and maintaining reasonable security practices and procedures in relation to any sensitive personal data or information which it possesses, deals or handles in a computer resource which it owns, controls or operates and such negligence causes wrongful loss or wrongful gain to any person, such entity shall be liable to pay damages by way of compensation to the person so affected. Section 43A applies to data or information in a computer resource. The Rules define Personal Information and Sensitive personal data or information to mean as follows: Personal Information means any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person Sensitive personal data or information means such personal information which consists of information relating to;- (i) Password; (ii)Financial information such as Bank account or credit card or debit card or other payment instrument details; (iii) Physical, physiological and mental health condition; (iv) Sexual orientation; (v) Medical records and history; (vi) Biometric information; (vii) Any detail relating to the above clauses as provided to body corporate for providing service; and (viii) Any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise.[3] EXCEPTION TO SENSITIVE PERSONAL DATA OR INFORMATION Any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force is not to be regarded as sensitive personal data or information. ANALYSIS Definition of personal information is wider than sensitive personal data or information (SPDI). The definition of SPDI is in the nature of an exhaustive list of items. Hence, no other information apart from the one listed above, would be considered as SPDI. It is interesting to note that Section 43A only included SPDI within its ambit, but some of its provisions of the Rules have been made applicable to Personal Information. It is appropriate to note that these Rules apply to personal information irrespective of the nationality of the provider of the information; thus information provided not only by Indian nationals but also by nationals in different jurisdictions, whose information is stored, dealt or handled by a corporate entity in a computer resource in India would attract the provisions of the ITA. The applicability is driven by the location of computer resource in India, as can be seen from the wording of Section 43A of the ITA read with the Rules. Rules will also be applicable in cases where the information is collected in India and is transferred to any computer resource outside India and also in cases where the information is neither collected nor stored in India, but is dealt with or handled in India E.g. even accessed from India. Thus, typical outsourcing businesses where personal information of foreign nationals is transferred to Indian entity (ies) who deal or handle such information would henceforth attract the provisions of the IT Act. DATA PRIVACY RULES SECURITY MEASURES The Data Privacy Rules require that the body corporate and the Data Processor implement reasonable security practices and standards; have a comprehensively documented information security program, and security policies. These must contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected and with the nature of business. The International Standard IS/ISO/IEC 27001 on Information Technology Security Techniques Information Security Management System Requirements is recognized as an approved security practices standard that the body corporate or the Data Processor could implement to comply with security measures under the Data Privacy Rules. Any other security standard approved by the Central Government may also be adopted by the body corporate or the Data Processor in compliance with the security measures under the Data Privacy Rules. The security standards adopted by the body corporate and the Data Processor should be audited by an auditor approved by the Central Government. The audit must be carried out at least once every year, or at such times as the body corporate or the Data Processor undertakes a significant upgrade of its process or computer resource. If there is an information security breach, the body corporate or the Data Processor will be required, upon request from a governmental agency, to demonstrate that it has implemented the security control measures as per its documented information security program and information security policies. A corporation is required to designate a Grievance Officer to address the grievances of the Provider. The name and contact details of the Grievance Officer must be published on the website of the body corporate. The Grievance Officer must address the grievances within 1 month from the date of receipt of grievance. JURISDICTION Since the cyber world is a boundary less world, there are lots of issues regarding Jurisdiction, which laws would apply. Material may be lawful at one place, but unlawful somewhere else for instance the places from where is it accessed. The Yahoo Case is a classic example. ILLUSTRATION Consider a scenario, where a person A is employed as a computer programmer by a bank in Country X. The programmer managed to instruct a computer to transfer money to his account in Country Y. A case was registered against the programmer in Country X. On Appeal, the Court in Country X had no jurisdiction over matters from Country Y. Though S.75 of IT Act provides for extra-territorial operations of this law, but these should be enforced with orders and warrants of external authorities and demands a highest level of inter-agency cooperation. ADJUDICATING AUTHORITY ADJUDICATING OFFICER Up to Rs.5 Crores IT SECRETARY OF THE STATE. CYBER APPELLATE TRIBUNAL appellate jurisdiction. SUB COURT or CITY CIVIL COURT. CYBER CRIME PROSECUTION Section 67 C to play a significant role in cyber crime prosecution- Section 67 C brings a very significant change in the IT Act, 2000. According to this section, intermediaries shall be bound to preserve and retain such information as may be prescribed by the Central government and for such duration and format as it may prescribe. Any intermediary that contravenes this provision intentionally or knowingly shall be liable on conviction for imprisonment for a term not exceeding 2 yrs or fine not exceeding one lakh or both. Many cybercrime cases cannot be solved due to lack of evidence and in many cases this is due to the fact that ISP failed to preserve the record pertaining to relevant time . This provision is very helpful in collection of evidence that can prove indispensable in cybercrime cases POSSIBLE RELIEFS TO A CYBERCRIME VICTIM- STRATEGY ADOPTION A victim of cybercrime needs to immediately report the matter to his local police station and to the nearest cybercrime cell Depending on the nature of crime there may be civil and criminal remedies. In civil remedies, injunction and restraint orders may be sought, together with damages, delivery up of infringing matter and/or account for profits. In criminal remedies, a cybercrime case will be registered by police if the offence is cognizable and if the same is non cognizable, a complaint should be filed with metropolitan magistrate For certain offences, both civil and criminal remedies may be available to the victim CONCLUSION The word cyber crime is not mentioned in the IT ACT for the reason that not to scare away the potential users and keeping in mind the basic philosophy of reducing the digital divide(computer literate or not ) . Reasonable measures should be adopted. The IT Act is an articulation of all existing laws with e added to most of the provisions. The dark or grey areas should not alone be highlighted. We can therefore conclude that cyber law knowledge is the need of the hour for the persons working with computers, computer systems, computer networks, computer resources and information communication technology since these laws cover the legal aspects of the information technology and ignorance of law is no excuse in the eyes of law.