Safety rules are essential to prevent accidents and injuries by establishing guidelines for behavior in various environments, from home and school to the workplace and on roads. Key principles include staying aware of your surroundings, following proper procedures for equipment and personal safety, using appropriate protective gear, and adhering to traffic laws like using seatbelts and signals.
To successfully prevent the acts of terror and save the lives of many innocents Never Ignore Your Instincts?
You CAN only identify a terrorist threat by observing or hearing about suspicious activity that may lead to a Terror Attack. Identifying suspicious activity is not a difficult science. Rely on your judgment. Your suspicion need to be based on
SUSPICIOUS ACTIVITY
Anyone who is calm, pleasant, well educated, looks detached and holds ultra radical religious beliefs, learns complex religious scriptures, moves in a closed group and shows intolerance to those who do not agree with him/her could be a terror suspect in making.
Basic Equipment
Driving
General Home Safety and Security
Home Fire Safety
Doors & Windows
Vacation Check
Keys
Security Systems
Fire Prevention Tips
Every 57 seconds a fire threatens a home and family. You can reduce the danger of a fire by following these simple precautions in your home whenever possible. Things to remember to reduce your risk:
Poisoning Prevention Tips
Over 4 million people are poisoned in the United States every year.
How can I prevent poisonings in my home?
What are some dangerous household poisons?
General safety tips
Residence Halls
Apartment or Home
Driving a car
On the Telephone
Self Defense
Try to remain calm and use your imagination and good judgment; give yourself time to think
Many crimes occur when you carry cash & valuables from your home,shop,bank in public/private transport. Numerous gangs perfected the art of stealing this money from you in your weakest moments. They play upon our petty greed and mild tension takes us over when we hold such amounts of cash. Following are the ways how these offenders operate -:
Diverting Attention Inside the Banks :
Safety Inside the Banks :
Diverting Attention Outside the Banks :
Safety Outside the Banks :
Safety While Transporting Huge Cash in Vehicle :
DEFINITION OF CYBER CRIME
Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.”
TYPES OF CYBER CRIME :-
HACKING
Hackers write or use ready-made computer programs to attack the target computer. They possess the quality to enter in to target computer and obtain the data. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening them to publish the stolen information which is critical in nature.
CHILD PORNOGRAPHY
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence.
CYBER STALKING
Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. The Stalkers have desire to control the victims life. Majority of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim because they failed to satisfy their secret desires. Most of the stalkers are men and victim female.
CREDIT CARD FRAUD
The unauthorized and illegal use of a credit card to purchase property. Information about the credit card is obtained by using skimmers, the most prone places to such crimes are restaurants, bars etc. Information about the Credit Card is also obtained through Phishing. In case of anyone asking for the credit card details of the user on the internet, it is advised to first confirm telephonically from that particular organization.
PHISHING
The act of sending an e-mail to a user falsely claiming to be an legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.
NET EXTORTION
Copying the companyaTs confidential data in order to extort said company for huge amount.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other. It is requested that, a summary of the above mentioned Cyber related crimes may be published in leading newspapers in Public Interest, to make the innocent net users aware of the same to prevent them from falling in traps of cyber criminals.
This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. Denial of Service attack, is a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.
GENERAL INFORMATION :-
1. Don’t delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these.
2. Try not to panic.
3. If you feel any immediate physical danger of bodily harm, call your local police.
4. Avoid getting into huge arguments online during chat or discussions with other users.
5. All other internet users are strangers. You do not know who you are chatting with. So be careful.
6. Be extremely careful about how you share personal information about yourself online.
7. Choose your chatting nickname carefully so as not to offend others.
GENERAL SECURITY TIPS
CHILDREN :-
Do not give out identifying information such as Name, Home address, School Name or Telephone Number in a chat room. Do not send your photograph to anyone on the Net without first checking with your parents or guardians. Do not respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening. Never arrange a face-to-face meeting without telling parents or guardians. Remember that people online may not be who they seem to be.
PARENTS:-
Use content filtering softwares on your PC to protect children from pornography, gambling, hate speech, drugs and alcohol. There is also software to establish time controls for individual users (for example blocking usage after a particular time at night) and log surfing activities allowing parents to see which site the child has visited. Use this software to keep track of the activities of your children.
SUGGESTIONS FOR BETTER SECURITY:-
1. Use b passwords: Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts.
2. Make regular back-up of critical data. Back-up must be made atleast once in each day. Larger organizations should perform a full back-up weekly and incremental back-up every day. Atleast once in a month the back-up media should be verified.
3. Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically.
INERNET GUIDELINES FOR STUDENTS:-
DONT’TS :-
5. Do not copy a program that is copyrighted on the net. It is illegal. You are actually stealing somebody else’s hard work. There is a lot of illegally available material on the net. Do not use it yourself.
Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of payment in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Credit card fraud is also an add-on to identity theft. Card account information is stored in a number of formats. Account numbers are often embossed or imprinted on the card, and a magnetic stripe on the back contains the data in machine readable format.
Debit card fraud – duplicating one or more of your bank cards, makes up the most regularly seen types of fraud.
What types of Credit Card Fraud are there?
Mail/Internet order fraud: The mail and the Internet are major routes for fraud against merchants who sell and ship products, as well Internet merchants who provide online services. In this, fraudster presents stolen card information by indirect means, whether by mail, telephone or over the Internet to merchant site and orders the delivery of goods of lower value to avoid suspicion
Account takeover:
There are two types of fraud within the identity theft category, application fraud and account takeover.
Application fraud occurs when criminals use stolen or fake documents to open an account in someone else’s name. Criminals may try to steal documents such as utility bills and bank statements to build up useful personal information. Alternatively, they may create counterfeit documents.
Similarly you can forward the mail before you junk it to local police email ID if they have any
The scammer “wins” an auction on eBay or another auction site, then “overpays” for the item with a tuque or money order. The scammer then asks the target to send him the overage.
Some merchants added a new practice to protect consumers and self reputation, where they ask the buyer to send a copy of the physical card and statement to ensure the legitimate usage of a card.
Skimming:
Skimming is the theft of credit card information used in an otherwise legitimate transaction. It is typically an “inside job” by a dishonest employee of a legitimate merchant, and can be as simple as photocopying of receipts. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim’s credit card out of their immediate view. The skimmer will typically use a small keypad to unobtrusively transcribe the 3 or 4 digit Card Security Code which is not present on the magnetic strip.
Instances of skimming have been reported where the perpetrator has put a device over the card slot of a public cash machine (automated teller machine), which reads the magnetic strip as the user unknowingly passes their card through it. These devices are often used in conjunction with a pinhole camera to read the user’s PIN at the same time.
Carding:
Skimming is the theft of credit card information used in an otherwise legitimate transaction. It is typically an “inside job” by a dishonest employee of a legitimate merchant, and can be as simple as photocopying of receipts. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim’s credit card out of their immediate view. The skimmer will typically use a small keypad to unobtrusively transcribe the 3 or 4 digit Card Security Code which is not present on the magnetic strip.
Safety tips to avoid Credit Card Fraud
Safety tips to avoid Debit or ATM Card fraud
Using ATM machine
JOB FRAUD
We often see that several unemployed youth paying huge cash to fraudsters for securing jobs in Government Services or Corporate Sector. Taking advantage of the innocence of these unemployed youth, fraudsters float fictitious companies and give attractive advertisements to the press and attract the unemployed youth towards them and after collecting money as ‘caution deposit/security deposit’ and dupe them. Here are some of the frauds committed by such criminals.
Fake JOB VISA for employment abroad
Training and employment in the same company and Employment abroad
Fake JOB VISA for employment abroad
Data warehousing works.
Employment fraud in Railways Recruitment
EEmployment in reputed PSU s and Private Companies.
Group II/I of TSPSC fraud
HOW TO SUSPECT A FRAUD?
If you find any of the following signs in your transactions, you have b reason to SUSPECT it…
Transactions being carried in cash
Originals are missing and certified copies are shown to you.
Documents in colour Xerox and laminated
Signatures are varied in all places
Documents are only notarized
Seller himself is missing during deal materialization
Sale deed signed in blue ink / stamps in blue ink. It is mandatory to use black ink in Sub Registrar office
Seller is not willing to put his finger prints on the document
Seller is forcing you to finalize the deal in undue haste in the guise of owner leaving abroad etc.,
Turn impatient and embarrassed when you ask them certain questions
What is dowry?
`Dowry’ means any property or valuable security given or agreed to be given either directly or indirectly-
(a) by one party to a marriage to the other party to the marriage; or
(b) by the parents of either party to a marriage or by any other person, to either party to the marriage or to any other person;
at or before or any time after the marriage in connection with the marriage of said parties but does not include dower or mahr in the case of persons to whom the Muslim Personal Law (Shariat) applies.
***Explanation II.-The expression `valuable security’ has the same meaning as in Sec. 30 of the Indian Penal Code (45 of 1860).
What is dowry harassment? Who can complain?
Dowry harassment is a criminal offence in India. Dowry harassment covers a span of behaviours and actions by the man or his parents or other relatives. These are
Which are offences under the Dowry prohibition act? Apart from these, there are offences related to dowry, like cruelty under criminal law (Sec.498A IPC) which are,
The victim of dowry harassment, victim’s parents or victim’s relatives can also make a complaint for any of the above offences at the police stations.
Unwelcome sexually determined behavior as : |
|
1. |
Physical contact and advances |
2. |
A demand or request for sexual favors |
3. |
Sexually coloured remarks |
4. |
Showing pornography |
5. |
Any other unwelcome physical, verbal or non-verbal conduct of a sexual nature |
|
These guidelines are legally binding and enforceable with immediate effect for all public, private and other institutions. Employers and employees both are equally responsible to stop this pervasive violation. |
Employees Responsibilities : |
|
1. |
Talk about it and hold meetings. |
2. |
Request your employer (or other institution head) to establish a complaint procedure and a Committee to deal with these complaints. |
3. |
The Committee should be headed by a woman and 50% of the members should be women. |
4. |
NGOs or other body familiar with the issue must be made party to the Committee to prevent undue pressure within the organisation. |
Employees Responsibilities : |
|
1. |
To develop a sexual harassment policy which expressly outlaws sexual harassment and to notify, publish and circulate it visibly. |
2. |
Develop a complaint procedure which is confidential and time-bound; ensure treatment of complaints; protection of victims and witnesses; report compliance with the guidelines to the appropriate authority. |
3. |
Encourage awareness raising through trainings, seminars, posters, memos, etc. |
4. |
Treat sexual harassment as a disciplinary offence and amend service rules to incorporate this. |
5. |
Where such behavior falls under criminal law, take all steps to assist the affected person (s) in terms of support and preventive action. |
Whatever your position in your organisation help eliminate sexual harassment. Police has a collective responsibility to protect our Human Rights and eradicate behavior which is unacceptable and discriminatory. act Now !! |
|
Parents, guardians, and adults who care for children face constant challenges when trying to help keep children safer in today’s fast-paced world. For decades, children were taught to stay away from “strangers.” But this concept is difficult for children to grasp and often the perpetrator is someone the child knows. It is more beneficial to help build children’s confidence and teach them to respond to a potentially dangerous situation, rather than teaching them to look out for a particular type of person. In today’s world, it is vital that families know and teach their children personal safety. Here is a list of some tips most shared with parents.
Safety Tips for children
And at last most important thing is that your child should know his full name, address and important phone numbers