Safety Tips

To successfully prevent the acts of terror and save the lives of many innocents Never Ignore Your Instincts?

  • SEE SOMETHING
  • SAY SOMETHING
  • DO SOMETHING

You CAN only identify a terrorist threat by observing or hearing about suspicious activity that may lead to a Terror Attack. Identifying suspicious activity is not a difficult science. Rely on your judgment. Your suspicion need to be based on

  • EXPERIENCE
  • JUDGMENT
  • COMMON SENSE

 

SUSPICIOUS ACTIVITY

  • Individuals who order food at a restaurant and leave before the food arrives or who order without eating
  • Anyone leaves his gift pack, bags, brief case, lunch/Tiffin box on the vehicle or at a crowded place like an office building, park, dust bin , a school, or a shopping center or an airport and doesn’t turn up, it could be a terror object.
  • Someone suspiciously exiting a secured, non-public area near a train or bus depot, airport, bridge, government building, or tourist attraction
  • Someone unfamiliar loitering in a parking lot, government building, or around a school or playground
  • Surfing net late in the night, chatting with the “friends” privately in a coded language could be a suspicious activity. He/she possesses multiple user IDs. Keep track on the websites the person visiting
  • Some employee of your company suddenly transformed into a deeply religious man, works on holidays, starts quoting religious scriptures in his conversations. His activities should be under scanner immediately
  • A group of youngsters (20-40 yrs) traveling in a bus or train with their luggage on their bodies/laps. If you are a driver/conductor/coach attendant, suspect them and check their baggage.
  • Someone leaving bus or train or cinema hall abruptly leaving his bag behind could be a terror suspect.
  • Someone in improper attire like wearing winter clothing in summers, bulky clothing with hands in the pockets, sweating profusely and in a hurry could be suspicious.
  • Someone very young, well educated, well employed harps on the words like “dying for God”, “great life in the paradise”, “elimination of other religions” in formal/informal conversations, goes to religious places very regularly, prays differently, suddenly minimizes contacts with friends could be a terror suspect in making.
  • Anyone who is calm, pleasant, well educated, looks detached and holds ultra radical religious beliefs, learns complex religious scriptures, moves in a closed group and shows intolerance to those who do not agree with him/her could be a terror suspect in making.

  1. A magic eye and a door chain are a must for your door. Use them before opening the door to any stranger.
  2. Your unverified servant, chowkidar or tenant may be criminal. Verify him through the police at once.
  3. You love your car but thief is equally desperate. Just an extra door and steering lock will keep him guessing.
  4. Ostentation of extra jewellery in open places has always proved dangerous. Beware of robbers and snatchers! A burglar always looks for a chance to break into your house.
  5. Put extra grills on your doors and windows, use extra strong locks and always inform your neighbours before going out.
  6. No gift and no lift! Tell your children not to accept gifts from strangers not to take a lift from strangers nor to take a lift offered by unknown people.
  7. Whenever you are in crowded place, keep a sharp lookout for unclaimed objects. These could be bombs.

Basic Equipment

  • Safety belts are in good working order.
  • There are 2 white headlights, both working.
  • There are 2 red taillights, both working, visible for 500 feet to the rear.
  • White rear license plate light is visible for 50 feet to the rear.
  • There are 2 red reflectors on side rear fenders of vehicle.
  • There are 2 brake lights, both working, visible from 500 ft in normal daylight.
  • Right and left turn signal are on the front and rear of vehicle, visible from 500 feet.
  • Front and rear plates are required except for motorcycles and trailers.
  • Brakes are in good working order.
  • Tires have no body ply or belt material exposed, no tread or sidewall separation.
  • Tire pressure should be accurate.
  • Exhaust system is in good working order and constant operation.
  • Windows and windshield are clean, free from obstruction, cracks or decals.
  • Good working windshield wipers are required.
  • Rearview mirror is required so a driver will be able to see at least 200 feet behind the vehicle.
  • Working horn is required, must be heard from 200 feet away.
  • Fenders must cover entire width of tire tread that touches the pavement.

Driving

  • Drive in a safe and courteous manner.
  • Keep a valid license in your possession.
  • Perform a vehicle safety check prior to beginning travel.
  • Drivers and all passangers must wear seat belts.
  • Do not drive while under the influence of alcohol or drugs.
  • Do not use cell phones or texting devices while driving.
  • Do not pick up hitchhikers.
  • Do not leave a running vehicle unattended.
  • Be mindful of the weather.
  • Avoid driving during severe weather conditions.

General Home Safety and Security

  1. If out of the home for an extended period of time, create the illusion that someone may still be there. Leave a TV or stereo on in the room where a burglar would most likely break in. Use exterior lighting and motion detectors to minimize burglar concealment.
  2. Make sure all exterior doors have good proper locks. Install 1-inch deadbolt locks on all exterior doors.
  3. If you get an unexpected knock at the door, check to see who it is before opening it.
  4. Do not leave extra keys under doormats, potted plants or any other obvious outdoor location. Thieves will generally find them. Find an inconspicuous place to hide the keys, or give a set to a neighbor you can trust.
  5. Burglar-proof your glass patio doors by setting a pipe or metal bar in the middle bottom track of the door slide. The pipe should be the same length as the track.
  6. Keep garage doors shut.
  7. Keep drapes and blinds shut – especially in rooms where there is expensive equipment. Don’t advertise the items in your home.
  8. Store cash, jewelry and other valuables in a safe or safety deposit box instead of leaving them lying around the home.
  9. Don’t leave notes on the door for service people or family members. These alert the burglar that you are not home.
  10. If you’re going to be away from home for a few days, adjust your telephone ring to its lowest volume setting. An unanswered phone may tip off a burglar that no one is home. Also, have a neighbor or friend collect your newspaper and mail. Never cancel delivery – you don’t know who will get that information.

Home Fire Safety

  1. When buying, building or renovating your home, make sure all roofing materials are fire resistant.
  2. Never leave candles or other open flames burning unattended.
  3. Douse cigarette and cigar butts with water before dumping them in the trash.
  4. Don’t leave hot irons, or burning stovetops and outdoor grills unattended while in use. Double-check that you’ve turned them off after use.
  5. Regularly clear and dispose of dry or dead vegetation in your yard or areas near your home.
  6. Make sure the lid stays on your trash can, and store firewood and other combustibles away from your home.
  7. Install smoke alarms on every level of your home. For the best detection and notification protection, install both ionization and photoelectric-type smoke alarms. Put them inside or near every bedroom. Test them monthly to make sure they work. Put in new batteries once a year.
  8. Don’t have deadbolts that lock with an inside key. You need to get out fast if a fire starts. A missing key could trap you inside. Also, don’t nail windows shut. Make sure they open easily.
  9. Make a fire escape plan for your family. Find two exits out of every room. Pick a meeting place outside. Practice makes perfect – hold a family fire drill at least twice each year.
  10. Be sure your street address is visibly posted so that firefighters can identify your home in the event of an emergency.

Outside

  • Prune lower limbs from trees near the house.
  • Trim bushes so windows are visible to neighbors.
  • High fences shield burglars from sight.
  • Lock up your ladders and tools.
  • Trellises help a burglar climb to a second story.
  • Porches and entrances should be well lit.
  • Your street number should be clearly visible for police and firemen.

Doors & Windows

  • Entry doors should be solid core wood that is at least 1-3/4″ thick, or metal.
  • Doors should fit tightly. 1/8″ clearance maximum.
  • Doors with glass panels should have a break-resistant plastic panel or a metal grill.
  • Sliding doors need special locks or a wooden strip in track to block door from opening.
  • Don’t install door hinges outside where they can be easily unscrewed.
  • Use a dead-bolt door lock with a strike plate attached by 3″ screws.
  • A rim mounted lock with bolt affords good protection. Attaches to door with long screws.
  • Police locks on rear and basement doors.
  • Padlocks must be sturdily constructed. Hasp must be bolted, not screwed.
  • Use special locks for double hung windows.
  • Use metal grills on vulnerable windows.

Vacation Check

  • Advise police that you will be away.
  • Have your neighbor pick up packages.
  • Have a friend pick up mail and newspapers daily.
  • Use timers to turn on lights automatically.
  • Hide garbage cans in garage or basement.
  • Double check locks on all windows and doors.
  • Leave your shades and blinds in their normal position.
  • Turn bell on telephone low so burglar will not hear it ringing.
  • Stop deliveries of papers and magazines.

Keys

  • Never carry identification tags on your keys.
  • Don’t hide keys outside.
  • Have locks rekeyed or changed when moving.
  • Keep daily routines confidential.
  • Don’t put valuables where visible.
  • Don’t let strangers into your home to use the phone.
  • Be aware that wrong numbers or telephone surveys may be used by burglars to “case” your home.
  • Avoid listing name or address in newspaper advertisements.

Security Systems

  • Carefully consider installing an electronic security system by General Security if your home contains valuables, is in an isolated area, or if you want more protection for your family.

Fire Prevention Tips

Every 57 seconds a fire threatens a home and family. You can reduce the danger of a fire by following these simple precautions in your home whenever possible. Things to remember to reduce your risk:

  • Don’t overload your electrical circuits. This is one of the foremost cause of fires.
  • Keep children out of reach of matches and lighters.
  • Don’t smoke in bed.
  • Don’t accumulate grease soaked rags or oil.
  • Keep combustibles far from heat sources.
  • Use a fire detection and/or smoke warning system in your home.
  • Develop and review with your family an escape plan that has primary and alternative escape routes for each member with an outdoor meeting place a safe distance from your home. Call General or request a FREE copy of the publication “Your Fire Escape Plan from First Alert Professional” sponsored in part by the International Association of Fire Chiefs.

Poisoning Prevention Tips

Over 4 million people are poisoned in the United States every year.
How can I prevent poisonings in my home?

  • Store all medicines and household products in the original containers.
  • Use child-resistant packages for medicines and potentially dangerous household products.
  • Lock medicines and products out of sight and reach of children.
  • Follow product label warnings about not mixing different products, ventilating the area, or wearing gloves.

What are some dangerous household poisons?

  • CLEANING PRODUCTS:
  • Regular household cleaning products are the major cause of unintentional poisonings of children.
  • Those that are especially dangerous are those that can cause chemical burns- drain opener, toilet bowl cleaner, laundry detergent.
  • COSMETICS AND PERSONAL CARE PRODUCTS:
  • Permanent wave neutralizers and hair straightness can cause burns. Mouthwash contains alcohol, dangerous for children who drink it. Some nail care products can also be poisonous.
  • PESTICIDES, INCLUDING LAWN AND GARDEN CHEMICALS:
  • Many chemicals used to control insects, rodents and weeds are as toxic to humans as they are to their intended victims. When ingested or inhaled in very small amounts, most are capable of producing illness.
  • HOUSEHOLD AND AUTO MAINTENANCE SUPPLIES:
  • Antifreeze and windshield washer solution are dangerous to swallow and their sweet taste makes them appealing to children and pets.
  • FOOD POISONING:
  • Food poisoning may be caused by storing food at the wrong temperature, not scrubbing knives, utensils and cutting boards after cutting raw meat and poultry, and not carefully washing hands before handling or preparing food. Symptoms of food poisoning may vary, but often include nausea, vomiting and diarrhea. Symptoms may begin soon or may not occur for more than a day or two.
  • Follow these food safety tips:
  • Counter tops, utensils and hands should be washed with warm, soapy water prior to and after food preparation.
  • Thaw meat and poultry in the refrigerator, not at-room temperature.
  • Avoid leaving perishable food out of the refrigerator for more than two hours.
  • Do not use canned foods with bulging lids or cracks.
  • Thoroughly cook all meat, poultry, seafood and eggs.
  • ALCOHOL:
  • Found in alcoholic beverages, mouthwash and perfume and aftershave lotions. Alcohol is a dangerous poison for children because small amounts can slow down their breathing and heart rate, cause seizures and coma, and even kill them. Watch children closely at adult parties and clear the “empty” glasses and cans immediately. Use child resistant closures on mouthwash bottles.

General safety tips

  • Be especially aware of your surroundings at times when you may be less alert and more vulnerable to an attack (e.g., during periods of stress) when you are upset or sick, or if you have been drinking.
  • Use discretion and caution when taking shortcuts through isolated parts of the campus.
  • If you must be in an isolated area (e.g., working or studying alone in labs or offices) lock the doors and tell a friend or the Police Department where you are and when you plan to leave.
  • Know the location of campus emergency telephones on routes to and from campus destinations.
  • Keep personal belongings in view while eating, meeting, or shopping on campus.
  • Whenever you are on campus or off, and see or hear someone who might be in trouble, your options include running, yelling, confronting, and calling the Police Department
  • Learn self-defense techniques.

Residence Halls

  • Think of your residence hall as your home. Remember that by taking a share of the responsibility to keep your residence safe, you can make a difference. Contact residential life staff regarding your security/ safety concerns.
  • Keep doors locked — even if you are going to be gone only a few minutes.
  • Door-to-door solicitation is prohibited on campus. Please report the presence of solicitors to the Police Department.
  • Notify the Police Department or residential life staff of suspicious individuals who appear to be “hanging around.”
  • Take security regulations seriously for your own protection.
  • If you leave for an extended vacation, take high-value personal property with you.

Apartment or Home

  • Install and use locks on your doors and windows.
  • Keep doors locked day or night whether you are home or not.
  • Know who is at the door before opening it. Insist on seeing an ID from anyone you do not know.
  • If someone comes to your door and asks to use your telephone to call for help, offer instead to make the call.
  • Door-to-door solicitation is prohibited on campus. Please report the presence of solicitors to the Police Department.
  • Give your home a “someone is home” look. Put radio and lights on a timer.
  • Maintain good lighting around entrances.
  • Leave spare keys with a friend, not in accessible places.
  • Keep emergency numbers near the telephone.

Driving a car

  • Have your keys in your hand as you approach your car.
  • Lock your doors when driving and after parking.
  • Check the backseat and floor before entering your car.
  • Keep your valuables out of sight, under the seat, or in the glove compartment or trunk.
  • Park in well-lighted areas.
  • If you have car trouble, signal for help by raising the hood or tying a handkerchief to the door handle. Remain in your car with doors locked until identifiable help arrives. Should another motorist offer to help, roll down the window slightly and ask them to call the police or an auto club.
  • Keep an emergency kit containing a flashlight, flares, telephone change, distress signs, and other essentials in your car.
  • To protect your car, use a lock bar that prohibits the use of the steering wheel.
  • Consider also the installation of an alarm system, ignition by-pass, or fuel shut-off switch in your car.

On the Telephone

  • Be wary of telephone surveys.
  • List only your first initial and last name in the telephone directory.
  • If you receive a threatening or obscene telephone call, hang up. Contact the Police Department and make a report.
  • Answering machines are useful in screening calls. Your outgoing message should not say that you are away from home.

Self Defense

  • If someone tries to snatch your purse, let it go. Most injuries from robberies occur when people resist during purse snatches.
  • If you are attacked, whether you resist and how you resist will depend on your personal resources and your personal values. Give some thought right now to what you would do in various situations that could arise. The more you have thought ahead, the more likely you will be to act in the way you have planned.
  • In considering your reactions to different situations, keep these three basic rules in mind:
  • Trust your instincts.
  • Don’t be afraid to be impolite or make a scene; this is especially important if someone you know threatens or attacks you.

Try to remain calm and use your imagination and good judgment; give yourself time to think

  1. Always prefer the banks recognized by the Reserve Bank of India.
  2. Never introduce an unknown person for the purpose of opening an account..
  3. Never encash cheques / drafts of an unknown person through your account.
  4. Do not keep your account inoperative for a long time.
  5. Never disclose your bank account number, user name and password to anyone.
  6. To avoid theft in postal transit or courier services and subsequent cheating, keep a track on the cheques / drafts / pay orders sent through post and courier services.
  7. As far as possible, bank transactions should be handled personally.
  8. Take care of your cheque books. Do not keep signed cheques in the drawer or any place where outsiders have an easy access.
  9. All bank transactions should be counter checked to ensure that deposited cheques have been realized.
  10. Monthly statements of your bank account should be invariably checked.
  11. At the time of withdrawal of cash, the account holder must physically check the cash. Never hand over the cash to a third person for counting.

Many crimes occur when you carry cash & valuables from your home,shop,bank in public/private transport. Numerous gangs perfected the art of stealing this money from you in your weakest moments. They play upon our petty greed and mild tension takes us over when we hold such amounts of cash. Following are the ways how these offenders operate -:

  1. Diverting your attention.
  2. Giving you false sense of security by posing as policemen.
  3. Pick Pocketing in busy buses.
  4. Loot you at knife/gun point

 

Diverting Attention Inside the Banks :

  1. Divert the attention by asking you to fill the form.
  2. Divert attention by throwing small currency on the floor & ask you whether those notes belong to you.
  3. Diverting attention of employee works at cash counter by asking some queries.
  4. Diverting attention by asking the staff about the other banks and their branches. Diverting the attention of employee safeguarding the cash by telling him that he is being called by the manager.
  5. Some will approach with a story that their relatives are in hospital & they are likely to get money from their village & ask for your account details to credit their money.

 

Safety Inside the Banks :

  1. DonaTt believe strangers.
  2. DonaTt divert attention for the small currency especially when you are in bank.
  3. Make you to fall prey for small currency they take away big cash from you.
  4. On Friday, Saturday & Monday between 10 am to 1.00 pm heavy transactions take place in banks, so one must be on high alert in those days and timings.
  5. Cash counter staff should lock doors from inside.
  6. Keep a watch on those customers who are standing idle and watching others.
  7. All the banks should install the CCTV cameras and employ staff to monitor it.
  8. Cash to be delivered to customers inside the counter those who withdraw huge cash.

 

Diverting Attention Outside the Banks :

  1. Throw small currency on the road.
  2. Alert the customers by making signs that their vehicle tyres are deflated.
  3. Enquiring about the addresses of some banks or other information.
  4. Spill sticky material with offensive odour on customers, divert their attention.
  5. Some youth posing like policemen try to a~helpaT you by keeping your cash and valuables safely with them as there is a murder nearby. When you go home later and open the bag to find your valuables missing.
  6. Some follow you till your home and when you stop midway to have tea or shopping, open your dickey to steal your money.

 

Safety Outside the Banks :

  1. After keeping the cash bag inside car, you shouldnaTt listen to words of any stranger.
  2. Think before decide to pick the small currency on the road.
  3. DonaTt alight from your vehicle immediately after you are told about the problem in the tyres of car.
  4. If your attention drawn by a stranger, you should come out from car with cash bag.
  5. Whenever you withdraw huge amount from bank better take somebody with you.

 

Safety While Transporting Huge Cash in Vehicle :

  1. hieves always observe the cash transport vehicles follow them. Whenever the employee enters into the bank, the thieves approach the vehicle and divert the attention of driver by putting small currency on the road and divert the attention of security guard by asking some addresses and steal the cash.
  2. One mustnaTt go for small currency.
  3. Security guard must be very vigilant and donaTt give any scope for negligence.
  4. Whenever the employee enters into the bank from vehicle he should lock the vehicle doors from outside.

DEFINITION OF CYBER CRIME 

Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.” 


TYPES OF CYBER CRIME :- 
HACKING 

Hackers write or use ready-made computer programs to attack the target computer. They possess the quality to enter in to target computer and obtain the data. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening them to publish the stolen information which is critical in nature. 


CHILD PORNOGRAPHY 

The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence


CYBER STALKING 

Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. The Stalkers have desire to control the victims life. Majority of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim because they failed to satisfy their secret desires. Most of the stalkers are men and victim female.

 

 

CREDIT CARD FRAUD 

The unauthorized and illegal use of a credit card to purchase property. Information about the credit card is obtained by using skimmers, the most prone places to such crimes are restaurants, bars etc. Information about the Credit Card is also obtained through Phishing. In case of anyone asking for the credit card details of the user on the internet, it is advised to first confirm telephonically from that particular organization.

 

 

PHISHING 

The act of sending an e-mail to a user falsely claiming to be an legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has.

 

NET EXTORTION 
Copying the companyaTs confidential data in order to extort said company for huge amount.

 

VIRUS DISSEMINATION 
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious

 

SOFTWARE PIRACY 

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

 

IRC CRIME 

Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other. It is requested that, a summary of the above mentioned Cyber related crimes may be published in leading newspapers in Public Interest, to make the innocent net users aware of the same to prevent them from falling in traps of cyber criminals.

 

DENIAL OF SERVICE ATTACK 

This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. Denial of Service attack, is  a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.

 

GENERAL INFORMATION :- 
1. Don’t delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these. 
2. Try not to panic. 
3. If you feel any immediate physical danger of bodily harm, call your local police. 
4. Avoid getting into huge arguments online during chat or discussions with other users. 
5. All other internet users are strangers. You do not know who you are chatting with. So be careful. 
6. Be extremely careful about how you share personal information about yourself online. 
7. Choose your chatting nickname carefully so as not to offend others.

 

GENERAL SECURITY TIPS 
CHILDREN :- 

Do not give out identifying information such as Name, Home address, School Name or Telephone Number in a chat room. Do not send your photograph to anyone on the Net without first checking with your parents or guardians. Do not respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening. Never arrange a face-to-face meeting without telling parents or guardians. Remember that people online may not be who they seem to be.

 

PARENTS:- 

Use content filtering softwares on your PC to protect children from pornography, gambling, hate speech, drugs and alcohol. There is also software to establish time controls for individual users (for example blocking usage after a particular time at night) and log surfing activities allowing parents to see which site the child has visited. Use this software to keep track of the activities of your children.

 

SUGGESTIONS FOR BETTER SECURITY:- 
1
. Use strong passwords: Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts. 
2. Make regular back-up of critical data. Back-up must be made atleast once in each day. Larger organizations should perform a full back-up weekly and incremental back-up every day. Atleast once in a month the back-up media should be verified. 
3. Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. 

  1. Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in. 
    5. Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.

 

INERNET GUIDELINES FOR STUDENTS:- 

  1. The Internet is the global storehouse for information. It is like having the biggest library in the World at your fingertip.—Use the net to increase your knowledge, to do class work better. 
  2. Visit interesting places sitting at your computer – visit the Taj or the Smithsonian Institution or the Louvre in Paris – all without stirring from your chair. –This is what the net is all about-an explosion of information. 
  3. Use the net to keep in touch with children from other parts of the Country or other Countries-make new pen friends; collect information. Many on-line service providers host chat rooms especially for children, monitored continuously for safety. — The net is a global community – without any barriers, distances, boundaries.

 

DONT’TS :- 


  1. Do not give your password to anybody. Somebody who is malicious can cause great harm to you and your reputation. It is like leaving your house open for a stranger and walking away. 
    2. When talking to somebody new on the net, do not give away personal information-like numbers of the credit card used by your parents, your home addresses/ phone numbers and such other personal information. 
    3. If you feel uncomfortable or threatened when somebody on the net feeds you an improper or indecent message inform your parents or elders. 
  2. Do not break into somebody else’s computer and worse still change things; you are probably destroying a lifetime of hard work by somebody. You may be intelligent but use your intelligence for better things. Somebody else can be as ruthless and as intelligent to break into your system and destroy your creations as well. 

5. Do not copy a program that is copyrighted on the net. It is illegal. You are actually stealing somebody else’s hard work. There is a lot of illegally available material on the net. Do not use it yourself.

Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of payment in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Credit card fraud is also an add-on to identity theft. Card account information is stored in a number of formats. Account numbers are often embossed or imprinted on the card, and a magnetic stripe on the back contains the data in machine readable format.

Debit card fraud – duplicating one or more of your bank cards, makes up the most regularly seen types of fraud.

 

What types of Credit Card Fraud are there?

Mail/Internet order fraud:  The mail and the Internet are major routes for fraud against merchants who sell and ship products, as well Internet merchants who provide online services. In this, fraudster presents stolen card information by indirect means, whether by mail, telephone or over the Internet to merchant site and orders the delivery of goods of lower value to avoid suspicion

 

Account takeover:

There are two types of fraud within the identity theft category, application fraud and account takeover.

Application fraud occurs when criminals use stolen or fake documents to open an account in someone else’s name. Criminals may try to steal documents such as utility bills and bank statements to build up useful personal information. Alternatively, they may create counterfeit documents.

Similarly you can forward the mail before you junk it to local police email ID if they have any

The scammer “wins” an auction on eBay or another auction site, then “overpays” for the item with a tuque or money order. The scammer then asks the target to send him the overage.

Some merchants added a new practice to protect consumers and self reputation, where they ask the buyer to send a copy of the physical card and statement to ensure the legitimate usage of a card.

 

Skimming:

Skimming is the theft of credit card information used in an otherwise legitimate transaction. It is typically an “inside job” by a dishonest employee of a legitimate merchant, and can be as simple as photocopying of receipts. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim’s credit card out of their immediate view. The skimmer will typically use a small keypad to unobtrusively transcribe the 3 or 4 digit Card Security Code which is not present on the magnetic strip.

Instances of skimming have been reported where the perpetrator has put a device over the card slot of a public cash machine (automated teller machine), which reads the magnetic strip as the user unknowingly passes their card through it. These devices are often used in conjunction with a pinhole camera to read the user’s PIN at the same time.

 

 

Carding:

Skimming is the theft of credit card information used in an otherwise legitimate transaction. It is typically an “inside job” by a dishonest employee of a legitimate merchant, and can be as simple as photocopying of receipts. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim’s credit card out of their immediate view. The skimmer will typically use a small keypad to unobtrusively transcribe the 3 or 4 digit Card Security Code which is not present on the magnetic strip.

 

Safety tips to avoid Credit Card Fraud

  1. There is a critical 3-digit number on the back of the card called CVV (card verification value). Always erase and memorise it. 
    2. Better hang around when your card is being swiped. 
    3. A card’s magnetic strip has the basic details of the cardholder. But the card also comes with a blank space for you to sign in. You must sign on the card to avoid unauthorized use. 
    4. Always sign up for SMS/EMAIL alerts for all transactions.   
    5. Always check your monthly bank statements for any suspicious transactions 
    6. Disable your credit card account if you are not using it.   
    7. Shred the financial documents with care   
    8. Do not store your personal and credit card information on the computer   
    9. Do not write the PIN number down.   
    10. During the online transactions, check if the web address starts with HTTPS, which ensures the encryption of all important data.   
    11. Never delay to report a lost credit card as the consequences can be highly disastrous. 
    12. Close the account that you suspect is being hit by the fraud.   
    13. Thoroughly check the authenticity of the firm, the website, or any other transactional society where your money would be flowing through.   
    14. Never give away your personal information over the phone unless you are sure of the person the other end.   
    15. Take a pause before venturing into any kind of online transaction and decide upon the authenticity of the transaction.  

 

Safety tips to avoid Debit or ATM Card fraud

  1. When you type your PIN number at an ATM, make sure that you sufficiently obscure the keypad from being viewed by an onlooker. 
    2. NEVER let the shopkeeper take your debit card out of your sight. There is no need for him/her to do so, unless he/she intends to do something unlawful. 
    3. Secure your debit card physically by storing it at a safe place.   
    4. NEVER write your PIN number at a place where it can be seen by someone who you do not intend to show it to.   
    5. ALWAYS destroy the receipts from merchants that you no longer require, especially when you have paid for using your debit card. 
    6. If you do not receive your debit card or PIN number from the bank within a reasonable amount of time after requesting one, check with the bank when it was sent and when you should expect to receive it. It may have been picked up by someone else in transit.   
    7. When at an ATM, make sure that no external devices are attached to the ATM machine and no wires are hanging around.   
    8. Check your account statements carefully for transactions that you may not have made

Using ATM machine

  1. Safeguard your credit cards and ATM cards at all times. 
    2. If you notice something suspicious about the card slot on an ATM (like an attached device), do not use it and report it to the responsible authorities.   
    3. Never disclose your ATM card and credit card PIN numbers to strangers.   
    4. Beware of your surroundings while withdrawing money at ATM centers. Do not crumple and throw away the transaction slips or debt card memos: read them, make a mental note of the details and then, either tear them or shred them to trash.   
    5. Periodically check your account balances on Internet or by requesting your bank or credit card company to send you statements to ensure that no transactions are happening behind your back.   
    6. While entering any personal identification numbers, use your discretion to shield the keypad so that your hand movements are not very visible and you enter your passwords secretly.   
    7. Be careful while withdrawing money from ATM Machine the attacker can shoulder surf to see your PIN.   
    8. Incase any one behind you while withdrawing money just tell the ATM Security guard to ask him to wait out.

 

JOB FRAUD

We often see that several unemployed youth paying huge cash to fraudsters for securing jobs in Government Services or Corporate Sector. Taking advantage of the innocence of these unemployed youth, fraudsters float fictitious companies and give attractive advertisements to the press and attract the unemployed youth towards them and after collecting money as ‘caution deposit/security deposit’ and dupe them. Here are some of the frauds committed by such criminals.

Fake JOB VISA for employment abroad

Training and employment in the same company and Employment abroad

Data warehousing works.

Employment fraud in Railways Recruitment

EEmployment in reputed PSU s and Private Companies.

Group II/I of TSPSC fraud

 

HOW TO SUSPECT A FRAUD?

If you find any of the following signs in your transactions, you have strong reason to SUSPECT it…

Transactions being carried in cash

Originals are missing and certified copies are shown to you.

Documents in colour Xerox and laminated

Signatures are varied in all places

Documents are only notarized

Seller himself is missing during deal materialization

Sale deed signed in blue ink / stamps in blue ink. It is mandatory to use black ink in Sub Registrar office

Seller is not willing to put his finger prints on the document

Seller is forcing you to finalize the deal in undue haste in the guise of owner leaving abroad etc.,

Turn impatient and embarrassed when you ask them certain questions

What is dowry?
`Dowry’ means any property or valuable security given or agreed to be given either directly or indirectly-
(a)  by one party to a marriage to the other party to the marriage; or
(b) by the parents of either party to a marriage or by any other person, to either party to the marriage or to any other person;
at or before or any time after the marriage in connection with the marriage of said parties but does not include dower or mahr in the case of persons to whom the Muslim Personal Law (Shariat) applies.
***Explanation II.-The expression `valuable security’ has the same meaning as in Sec. 30 of the Indian Penal Code (45 of 1860).

What is dowry harassment? Who can complain?
Dowry harassment is a criminal offence in India. Dowry harassment covers a span of behaviours and actions by the man or his parents or other relatives.  These are

  • The giving or taking of dowry
  • Demanding dowry

Which are offences under the Dowry prohibition act?  Apart from these, there are offences related to dowry, like cruelty under criminal law (Sec.498A IPC) which are,  

  • Any willful conduct which is of such a nature as is likely to drive the woman to commit suicide or to cause grave injury or danger to life, limb or health whether mental or physical of the woman; or
  • Harassment of the woman where such harassment is with a view to coercing her or any person related to her to meet any unlawful demand for any property or valuable security or is on account of failure by her or any person related to her meet such demand.

The victim of dowry harassment, victim’s parents or victim’s relatives can also make a complaint for any of the above offences at the police stations.

Unwelcome sexually determined behavior as :

1.

Physical contact and advances

2.

A demand or request for sexual favors

3.

Sexually coloured remarks

4.

Showing pornography

5.

Any other unwelcome physical, verbal or non-verbal conduct of a sexual nature

 

These guidelines are legally binding and enforceable with immediate effect for all public, private and other institutions.   Employers and employees both are equally responsible to stop this pervasive violation.

Employees Responsibilities :

1.

Talk about it and hold meetings.

2.

Request your employer (or other institution head) to establish a complaint procedure and a Committee to deal with these complaints.

3.

The Committee should be headed by a woman and 50% of the members should be women.

4.

NGOs or other body familiar with the issue must be made party to the Committee to prevent undue pressure within the organisation.

Employers Responsibilities :

1.

To develop a sexual harassment policy which expressly outlaws sexual harassment and to notify, publish and circulate it visibly.

2.

Develop a complaint procedure which is confidential and time-bound; ensure treatment of complaints; protection of victims and witnesses; report compliance with the guidelines to the appropriate authority.

3.

Encourage awareness raising through trainings, seminars, posters, memos, etc.

4.

Treat sexual harassment as a disciplinary offence and amend service rules to incorporate this.

5.

Where such behavior falls under criminal law, take all steps to assist the affected person (s) in terms of support and preventive action.

 

Whatever your position in your organisation help eliminate sexual harassment. Police has a collective responsibility to protect our Human Rights and eradicate behavior which is unacceptable and discriminatory.   act Now !!

Parents, guardians, and adults who care for children face constant challenges when trying to help keep children safer in today’s fast-paced world. For decades, children were taught to stay away from “strangers.” But this concept is difficult for children to grasp and often the perpetrator is someone the child knows. It is more beneficial to help build children’s confidence and teach them to respond to a potentially dangerous situation, rather than teaching them to look out for a particular type of person. In today’s world, it is vital that families know and teach their children personal safety. Here is a list of some tips most shared with parents.

Safety Tips for children

  • Never leave children unattended in a vehicle, whether it is running or not. Children should never be left unsupervised or allowed to spend time alone or with others in vehicles as the potential dangers to their safety outweigh any perceived convenience or “fun.”
  •  Always accompany your child to the bathroom in a public place. Older children may want to wander off and browse alone in a mall, at the beach, etc. Do not allow this.
  • Make sure you know where each of your children is at all times. Know your children’s friends and be clear with your children about the places and homes they may visit. Make it a rule for your children to check in with you when they arrive at or depart from a particular location and when there is a change in plans. You should also let them know when you’re running late or if your plans have changed to show the rule is for safety purposes and not being used to “check up” on them.
  • Avoid buying children clothing displaying their names. A young child is usually ready to trust anyone who uses his/her name. Explain that someone who knows your name may not know you or your parents.
  • Be involved in your children’s activities: Know the places he or she goes and know the other adults who are involved.
  • Listen to your children. Pay attention if they tell you they don’t want to be with someone or go somewhere. This may be an indication of more than a personality conflict or lack of interest in the activity or event.
  • Set up strict procedures with your child’s school or child care centre as to whom the child will be released other than yourself. Develop a strict password with your child as a backup safety strategy. Insist that the school notify you if the child does not show up on time if he/she walks or rides the bus.
  • Notice when anyone shows one or all of your children a great deal of attention or begins giving them gifts.
  • Take the time to talk to your children about the person and find out why the person is acting in this way.
  • If you find yourself in a position where a child appeals to you for help, be prepared to give it. Provide for a security guard or someone in authority. Keep an eye on the child and get help.
  • Be sensitive to any changes in your children’s behavior or attitude. Encourage open communication and learn how to be an active listener. Look and listen to small cues and clues indicating something may be troubling your children, because children are not always comfortable disclosing disturbing events or feelings. This may be because they are concerned about your reaction to their problems. If your children do confide problems to you, strive to remain calm, noncritical, and nonjudgmental. Listen compassionately to their concern, and work with them to get the help they need to resolve the problem.
  •  Practice basic safety skills with your children. Make an outing to a mall or park a “teachable” experience in which your children practice checking with you, using pay telephones, going to the restroom with a friend, and locating the adults who may be able to help if they need assistance.
  • Be matter of fact and calm in discussing good and bad touch and personal safety with children. Don’t teach fear, teach facts and strategies.
  • Remember there is no substitute for your attention and supervision. Being available and taking time to really know and listen to your children helps build feelings of safety and security.

And at last most important thing is that your child should know his full name, address and important phone numbers