 of beyond law CLC and ULS Punjabi University Chandigarh. We welcome you all to yet another engaging session and the topic for today is cyber security and privacy. Cyber security is one of the growing subjects not only for the professional students and the lawyers but for a common man also. Privacy as such is a word which is commonly being used and more specifically with the relevance of cyber. While we were holding webinars we thought that we should have the insights on this particular subject because it is a subject in which we commonly discussed among students that yes there is a threat to the cyber security as well more specifically in the lines of privacy how to go about it, what are our rights, what is how to go, how to look into it with the deep insights. Just as we have Mr. Vellumajee Balu who is a renowned advocate coupled with the fact that he has been teaching with his insights not only in the National Judicial Academy which is one of the most esteemed institution for the purposes of where the judicial officers are trained. His insights can be also examined from the fact that he has been speaking on different forums including the Rotary Club, different schools, police academies as well as the public prosecutor. He has also served as a member of the censor board for good seven years. So once it comes to the privacy and cyber they are also quite interwoven so we welcome you without taking much time because people are more interested to hear the issues right from you the topic which we commonly do discuss but the insights invariably large number of people do not know because the word itself sometimes the word is so common that one feels one shouldn't read about it because he has the insights but actually one introspects oneself then he realizes that there are much more and once you learn from a someone who specializes in that it actually gives you not only a two division but to a three division for the thought process which is quite stimulating for the mind as well as for the food for thought over to you sir. Thanks a lot for the introduction Mr. Vikas I am very grateful for beyond law for inviting me from the southernmost corner of this country to reach you people during the period of confinement anyhow the subject which is not having any confinement even during the covid is one subject which is a cyber crime and the cyberspace and in fact we must be all realizing now we must have realized that the cyberspace is the only space which is now connecting people by all means in all fields in all walks of life but at the same time when it comes to law the world is still fighting hard and working hard to know and understand what is really cyberspace and what is really cybercrime and the basic says whatever the offense committed by using the computer or by using the system that can be called as a cybercrime but when the computer was introduced it was an innovative subject but when the whole world is having a small gadget in their hand in the name of a 3G or 4G connection a small smartphone or Apple phone the meaning has reached every pocket of the world the cyberspace is now in every pocket of a man and in his palm and if he says that I'm very innocent I'm ignorant that means he is cheating himself and all walks of life is now connected with the digital world digital world in the sense when it is respect when it is compared in the respect of privacy I used to always address in all my sessions and meetings to say that we are digitally naked digitally naked means every activity of a man of an individual is now monitored tracked and surveillance by any agency or individual or by a service provider when it is happening so if somebody says that I'm innocent I don't know what is cyber privacy that he's not going to help it but why I say that we are digitally naked means any person who has got a mobile phone or a smartphone or a tab or anything his location what he speaks what he writes in mail what he dictates what he types in WhatsApp including what what's up I'll come to later and what all the messages he is sending everything is reaching the hands of somebody either through the service provider or by the hackers so what is actually happening people are always thinking I'm safe I'm using I'm taking all precautions to save myself to save my data to secure my data everything in order to maintain that I'm safe which is not so the moment the digital world has invaded into the humans life slowly from 1994 we will say the 1994 the mobile phone was introduced before that computer was introduced the 1994 that mobile phone was introduced it was only a phone which was receiving calls and sending calls receiving messages and was used to send messages even we were paying at the rate of 16 rupee 80 paisa during the peak hours for making a call to receive a call and 8 rupees and 40 paisa like that it was a status symbol during the time when it was introduced but a country like India where a third world country now in a population of more than 130 crores around 90 to 100 crore people are having mobile phones out of which smartphones are available with more than 40 to 50 crores even 70 to 80 crore people are having and it is now come prevalent that people are having two sim cards three sim cards like that when you calculate like that sometimes more than the population the population of the mobile phone exceeds in that sense in a third world country where people are still illiterate to an extent of larger population without giving them much awareness about the cyberspace without giving proper introduction what is a cybercrime without giving introduction what is information technology act now the gadget has reached the common hands common people's hand and without mobile phone or without connectivity or without having any gadget now a common man's life cannot run cannot run through to book a ticket for a train or a flight to book a ticket for a cinema or to make bills to make purchase and to make payment to each and every sector of life the digital payment is made now mostly by people by using the cyberspace or by using electronic transfer when the gadgets were introduced the humankind was not sure that it is going to become the boss one day which is in his form is going to rule himself slowly the digital slavery has started the digital slavery in the sense what I say suppose you are taken away you are plucked away from your mobile phone for about 15 minutes from your pocket you don't have to go to any asylum or you don't have to go to any place to become mad because I used to say very humorously that those days if people want to victimize somebody or to take revenge they used to go and pray use all the tantric mantra and all that they used to go to temples and pray for the revenge but nowadays it is not like that if you want somebody to be taken revenge you just take his mobile go away for about 15 minutes immediately he'll become mad the problem is he will forget his own number he will not remember his own phone number you just ask him what is the phone number of your daughter he will try to scroll you asked him what is the phone number of your son he will start scrolling you ask him what is the number of your wife he will start scrolling he put are seen many times people that once if you ask them what is the phone number of your wife they will start crawling crawling crawling sterling it'll come wife one, shooting what does that wife one wife, two means, don't know my wife has got two sim cards is going to be the answer if you ask the same question to the wife she will scroll so it even our memory is now hypothesized to the device the moment it is introduced the first casualty is our memory memory of the humankind is stored in the gadget in alphabetical order by the device allowing the human mind to think I don't have to store anything in my mind I don't have to remember anything the moment if I want to say or if I want to search something from the device or from the space or from any search site I will have to just type it it will automatically prompt and come to me into my table or into my hand so what happened to the memory already it has been hypothecated to the device slowly humankind started become a slave to the digital that is the electronic devices now man has become a slave of electronic gadgets and devices when the situation has come you must have all read the statement around four five years back when Mark Zuga came to India he said that I am the second most populous person in the world he proudly claimed that I am the second most populous person in the world means next to China India is the most populous country and Zukebek claims view of the Facebook and WhatsApp I have become the boss of the world that statement was not taken seriously when it was delivered by Zukebek now it has been proved as a reality during the period of covid why during the period of covid what is the privacy compromised what is the security compromised is the biggest question because when it was can wash by the government when it was introduced by the union government that you must make most of the payments only through digital platforms as much as possible you must start using the digital platforms for all your communications not only mails and whatsapp and other things but for other purposes also for making payment to government to make your eb bills to make your telephone bills to make your Wi-Fi bills Wi-Fi connection whatever it is people are now trained to make all their payments by using the digital platforms at the same time at the same time do they know that how much security they are taking how they are likely to be cheated so during these period of covid and confinement the trend which is going on in the cyberspace is one is mostly fishing you must have heard about it by sending any email to anybody they may be asking for a email details or your account details of a bank or a particular password they will say that we are updating your updating your data's in the website of our bank there is a particular gang which is operating from Chattisgarh area the whole village is trained only for the purpose they have a system of making phone calls throughout randomly to almost they reach the customers of bank they say that I'm calling from SBI your ATM call is now blocked we want to verify the details immediately you love to disclose the number and other things the next minute the money mules will be transferring your money from your account which will reach a small tiny island called reunion island or Madagascar some places like that by cloning and other fraudulent methods even if you know that your money has been fraudulently taken transferred the most maximum you can do is you can just register an FIR after registering the FIR though the Information Technology Act says any act committed inside India from outside India they still the case can be registered but by registering an FIR what is the maximum ultimate result you'll be getting is only getting the copy of the FIR because the moment money is transferred to somebody's account through money mules you will never be able to either see the person's arrest or detention or brought back to India for the purpose of facing the trial when it is happening like that even three four days back I received an email and also SMS in the SMS it is mentioned it is very very urgent contact me only in the email that email ID is given the moment you go and click that email ID automatically taken to the site of that other person if you fill any parts any details or that toss in that they will be in a position to hack all your data by sitting in the remotest corner of the world this is how the phishing activities and other things are going on at the same time pornography offenses against women offenses against children domestic violence everything is taking place only through the cyberspace during this period of when it is so what the countries have done so far they are so aware that it is happening but this is one field which is evolving every day on its own with the introduction of lot of technologies when every other technologies introduce the law becomes world the law becomes world and then we need to go for amendment any type of amendment we are giving into effect to the action other things the next revolution comes in technology so we will have to modify ever since mentally first then legally next when it is happening like that continuously the humankind that's now come to your position whether it is possible for them that without cyberspace or cyber field they can exist any branch of law can now go ahead without touching the computer field highly impossible right from reading a judgment writing a judgment and even fixing the meetings like that now even the quotes are now going to the digital platform and hearings are going through teleconferencing when the whole world is now switching over to the digital world can we sit in our room and claim very innocently that I don't know anything about the computer I don't know anything about cybercrime and all that that means we are not updating ourselves then we'll be called as digital illiterates digital illiterates means during those days when people were educated themselves in the village villages village people commonly used to say I don't know how to put my signature I used to put my only my LTI finger thumb for all my all the purpose of my making my presence for any registration and all that now the biometric entry which has been introduced by the digital media has become the hallmark of the same thing which was done by our elders those days so digital illiteracy means I don't know anything about computer I don't know anything about information technology is not going to be a good answer every person not only a lawyer from every field even an older man about seventy five eight years eight years old sitting in the house also should know what is happening around most of the elders used to say I don't know anything but all my grandchildren are playing with the computer like that they are so savvy they are so smart but I don't know anything means you are going to be cheater in your own house each and every house has become an island on its own if you have three rooms all the three people wife has been daughter or son sitting in the other rooms and communicating among themselves only through the digital media everybody is now engaged only with the phone or internet or anything else when the situation is going like that the act introduced by our own government in 2000 information technology act even after so many amendments up to 2008 in 2010 whether that law is sufficient in 2020 we must say it is not sufficient because the penal sections which are given an information technology act the amount of privacy which has been compromised throughout the world by using the advances and techniques by the cyber crime criminals every other day you must have all seen when the American president was elected during the period of Obama almost all the presidents and the prime ministers of other countries went and made a special request to the American president please don't have any surveillance over us please don't spy over us please don't do any activity which is likely to compromise our privacy our own privacy that was initiated by Angela Merkel of Germany followed by the president of Brazil each and every person went and pleaded with another country requesting not to violate the primacy of the presidents and prime ministers leave alone a common public even when Trump was elected as the president you must have read the statement he said I miss my smartphone that has been taken by the security agencies I've been given with a small phone where I can only make calls and receive calls and Trump made a special statement don't send any emails to the White House please send couriers by papers so the country which claims they have the highest form of technology available solutions available is not believing the cyberspace and cyberworld and that president is requesting please send me courier and he says I miss my smartphone I cannot use my smartphone when the condition has become like that we have given the smartphone more than 120 crore people of this country when you go to the remote corner of this country till today we can see people traveling on the rooftop of the buses even over the top of the trees and the literacy is very very poor they don't know what is password they don't know what is the login ID they don't know what is the gadget what is the 3G what is the 4G and having given all the technology in their hand we are trying to reach them we are making them to become a compulsory activity of the life they they should be connected with the digital world every day when they are so illiterate they don't know what is what even the judiciary or the parliament this incident I am repeating every other in every other session this is what had happened in the parliament of our country when our ex-president Pranav Boogarji was attending a session he received a marketing call in his mobile phone from a particular bank demanding for a loan then Pranav Boogarji got shocked immediately he called the next person who was sitting next to him is Sambika Soni Sambika what is this I'm receiving a phone call like that during the session she said two minutes back I also received a call that was the first incident that Troy took the initiative to curtail the activities of the telemarketing so we are taking our own lessons only from the incident if it are if at all it is likely to happen to the top bureaucrats or to the president like candidates most of you must have read most of you must have seen when the 2g spectrum case was going in the Supreme Court on day-to-day basis when the Supreme Court was hearing the matter one day the bench went on to the extent of asking the council we are monitoring the case on day-to-day basis actually we would like to know that the 2g 3g 4g we are discussing about actually we don't understand what is 2g what's the question raised by the bench then the council explained what is 2g then they said oh it is receiving calls and making calls and receiving data and sending data in a smaller speed is 2g that is the second generation phone oh we don't understand then what is 3g 3g is only with better speed oh I see then what is 4g 4g is the next generation which is going to have a greater speed for transferring videos and the audios and other things I will go to the extent of saying that the judiciary do not know law is not the subject we have to it is not the thing of that generation when they were educated it was not there at all it was introduced in between so even the judiciary was having a hesitation to understand what is 2g 3g 4g means judiciary is not clear parliament is not clear parliamentarians are not clear but at the same time like corona it has reached each and every corner of the world you cannot come out of the clutches of cyberspace or cybercrime unless or otherwise you have the awareness among yourselves where to stand where to draw a line or you are always under risk the sections which are introduced through the information technology act starting from 65 to 80 82 only 15 17 sections are dealing with the offenses and punishments though there are certain particular sections which says that your privacy cannot be compromised because if your primaries privacy is discussed under 66 e 66 e discusses with privacy 66 f discussion discussing with cyber terrorism and what can be had through computer what are all the offenses committed by using the computer system and what is the publication which is made against women against children how it can be punished and all that though it is discussed like that whether it is sufficient with great respect to my friends it is not at all sufficient and when the law was introduced the power to register a case was given only to the assistant commissioner but during the case when two girls were involved in a case a circular and the direction was given by the Supreme Court that it is not necessary that anybody can register a case at the same time an amendment was also made after 2008 any station officer can register a case any station officer can register a case means even a sub inspector can register the case provided the sub inspector should know what is a cybercrime whether the crime committed by using an electronic gadget or electronic equipment whether it will come under the purview of the act with a section it is attracting how the FIR should be registered how the material should be collected how it should be preserved how it should be produced during the course of the trial no proper training has been given to the police authorities till today we have only very limited cyber forensic laboratories like Ahmedabad Pune 109 hello hello hello are you getting my video just a little dark it's dark probably you have closed the video on your side no no you stop the videos around your side it's okay now so still dark though though your photo is visible it's darker on the side the power has gone okay the power has gone but you can continue but we are able to hear you your voice is good enough to engage us I'm just trying to switch on a light one minute is it okay yeah perfect it clearly show that way there's a will there is a way no no no no now showing the face it's not the matter now okay yes little disturbance I'm sorry so any initiative which has been taken by the government it has really not reached the public among phone it has not reached the public they are not even able to understand what's happening at all but at the same time the cyberspace starts introducing every other day either one app or one platform for public to interact with others for example after the introduction of Facebook Twitter and Instagram what's up we can proudly say that the whole world is now connected I'm having everything in my palm global village is the concept I have the world in my finger tip the same trend is also in the hands of the criminals the same idea has reached the minds of criminals he is also having the whole world in his fingertips we must have all read and seen any offense committed nowadays is thoroughly brilliantly used either by learning by using the WhatsApp or by having a search from the Google in one particular case you must have seen how the privacy is compromised we are all every other day seeing that the police is investigating cases by using the CCTV cameras whether that CCTV camera installed in each and every office in every house in some houses in the bedrooms also whether it is safe or not last week we people might have seen and read one leading company which is giving the service of CCTV camera a particular person who is working in that company has taken away the past world and other details of his customers running into 220 in number and by such sitting in his house he was watching all the activities of the people connected through the CCTV police claim government claim that we have installed more than four lakh five lakh of CCTV cameras in the streets and other places but who is the service provider for all the CCTV cameras where all the data are going how it is distributed nobody knows for example I have a CCTV camera in my house I have a connection that particular app is called IVMS that IVMS once if you go and resist your email ID and password it is showing that the company is available in Guangzhou in China so anytime I forget my password and reconnect with that CCTV camera it is again getting connected with the Guangzhou province in China and then only I'm getting my connection if the person who is installing my CCTV camera is taking all the details of my password and other things he will be able to sit in his house and watch my activities if you are connecting your door smart locks and all other things like that through apps whenever we are making registration into the apps nobody knows what is there in the app they just keep on pressing next to next to next to next without reading anything and most of the apps or this device most of the apps are designed in such a way that it is getting permission to have access to your contacts it is having permission to get access into your location it is also having permission to switch on your microphone in your device this is what one example I have explained to you all the devices are connected through CCTV camera they are having the service in China in some other place where is the privacy available for a man the privacy has been defined as a fundamental right by the Supreme Court but the privacy is in open public by the devices and when the devices are used without even knowing what is what and one particular case your person started stealing motorbikes from parked places most of the motorbikes will be parked with the documents the moment he takes the motorbike from that particular place he will take the documents from the motorbike by seeing the chase's number in the document he has to inscribe it on the other bike stolen by him he takes an innovative way of doing he goes to the YouTube and read from the YouTube how to inscribe numbers without making more scratches in these chases so he is printing the chase's number in the other bike from the stolen documents and started selling the motorbikes more than 22 into 25 numbers within a matter of one month during the period of force last week he was arrested in Chennai so by sitting at home during this period everybody is using YouTube everybody is using Instagram everybody is using a Twitter and everybody is connected with the digital world so any type of offense when it is committed even to register a case even to register a case you are under the mercy of the police the police do not know if you go to the court we have not trained the courts and all the controversies are coming only through the public platform bank accounts are stolen if you make an electronic transfer your amounts are siphoned if you are using an ATM card if you're going to any shop and use your ATM card cloning is there by taking the cloning of your card you know that skimmers are used the moment you give your card to anybody in a shop the skimmer which is fixed in the machine is copying your code and also your password the password it sent through a message to a third person that person is immediately making an ATM card or a credit card cloning it sending those message to a person who is sitting in the remote corner of a world and immediately your money is siphoned this is the methodology used by the cybercrime criminals after committing the offense though the ad says nothing is possible throughout the country people might have seen the Nigerian scam the Nigerian scam is such an innovative way it is done I have made so many appeals in all platforms including the racial judicial academy and the state judicial academy and also in the Supreme Court that a person who is connected with the mafia gang in Nigerian scam is able to get a sim card from our local service providers like wood of bone BSNL Airtel idea like that by using that sim card he is able to send messages to individuals saying that you are one of Britain lottery about six crore pounds three crore pounds you have won a lottery this message is sent by using a local number when the local number is given there is a provision in our country to get a sim card that you must submit your other details address proof photo identity everything you must provide then only you are in a position to get a sim card but in our country you can go to any pawn shop just buy any two samosas and also a sim card when sim cards are given like that that is used even by people for the purpose of Nigerian scams where crores and crores money are being looted from the public I'm very sorry to say here only most of the educated people have become victims for the Nigerian scam because they don't verify even if they verify also they believe that it is not going to happen to me it's going to happen to some other person after sometime so I will escape in one particular case a PG candidate of Madras University around 45 years back I've lost the 56 lakhs by responding to a Nigerian scam paying money on insolments after losing 56 lakhs she lodged an FIR saying that I received a mail and message from a phone number stating that I won a lottery in a British company that which has showed me six crores or six lakh pounds something will you not think will you not allow your mind to work I have not purchased any lottery I have not entered into any scheme I have not enrolled myself into any online game then how my name will be selected for six black pound or six crore pound whatever it is this is greedy in nature educated people are more responsible to become victims on the cyberspace privacy is concerned it is one area criminal activities are concerned it is other area which area is not connected through cyber space now each and every walk of life every part of life minute by minute moment by moment you are living with these cyberspace to call anybody to speak to anybody to spend any message send any message receive any message send any mail to receive the account to make your account to make your payment for everything you are connected but you do not know what is a digital but even digital signature has not been explained to our people properly what is electronic signature signature what is digital signature asymmetric asymmetric technologies used public key and private keys are used for generating an electronic signature digital signature though it is defined in the act what is a digital signature that digital signature can be accessed only by using a public key and the private key both should sing together any document can be signed electronically that can be used as an evidence before any court of law even for registration entering into contracts but once if that is to be hacked whether that electronic signature can be hacked or cut and paste though so many security measures are given how many of us know to go probe read learn and then to execute nowadays courier service people are coming they are delivering your career cover and immediately asking for a signature in a device which has been brought by him by just showing a pad he's asking you to put your signature over the screen will you make it normally I don't do it because I will say the moment I put my signature on the pad it can be stored in that device but that particular courier is delivered only for that particular consignment on the day with the consignment number of for that cover only the moment you receive and put your signature where they are making an entry it is only tallied with that particular delivery it is blank and it is simply received from you that signature which is put on the pad can be stored the same signature can be cut and made as a paste in any other consignment which is you are not lawfully about to receive or to deny that I don't want that this is a small and simple example I never make my signature in any pad if it is shown by a courier delivery man simply ask for the paper I'll see the consignment number then only I'll put my physical signature in the paper I will say that I will never put my signature in the device you can still refuse they cannot demand in so many places inner world and we are making our presence either by way of fixing our fingerprint even in a small device like Apple phone or Samsung smartphone and all that everybody is proud to say that moment I put my fingerprint my phone will open that is the password but when you register your fingerprint in your mobile phone how many times it demands you to put your finger on the device minimum five to ten times it lasts you to put your finger over it every time it says it is verified put it again keep it again keep it again keep it again finally to say that it is registered the registered fingerprint whether it is stored in your device or whether it is stored by the service provider or whether it is stored by the stored in the cloud server of Apple or Samsung or by the manufacturer that fingerprint is now available in the cloud of that particular company your face recognition is also done by the devices so a face recognition means we do not know whether it takes only the three-dimensional view of the face or a three-dimensional photo of that person also will be able to open the phone any person who is taking or flicking away and compromising with the password and misusing that phone for committing any offense the act makes it very clear unless or otherwise you prove that you are taken due care it will be assumed that you only use the device for the purpose of committing the defense so when the security is not properly taught the moment you put your finger finger print we don't know where it is stored the moment we store our face facial recognition we do not know where it is going to be stored the future investigation by the police and other things used to be under the under the by using the artificial intelligence and facial recognition facial recognition cameras are going to rule here after the world everywhere it is going to be fixed on the lamp post and in public places even if you're going for a protest also nowadays you could see that the drones are flying over your head the drones can come and take a closer view of your face in a mass of 100 and 200 you can register all the faces who are in the street and take the pictures of that person that can be sent to the administrative agency where immediately it will be verified with your other details and other things you can be isolated from this society digitally you can be switched off all the facilities given by the government all the benefits you are enjoying by using your cards and all that even to book in your flight ticket can be banned by an investigating agency or by the government this is called the switching off mode switching off mode means future imprisonment or to make a person in confinement there need not be any prisons there need not be any confinement or containment sense centers simply they can digitally switch off a person and make him available to sit in his house and suffer on his own and it had happened already tested with the Dominic Strascon Dominic Strascon was the presidential candidate for French elections for about 1050 10 years back when he went to America there was a sexual allegation against him that he tried to molest a woman who attended his needs in a room after the complaint he was arrested a small ankle it was fixed in his around his leg he was confined in a small room the moment he goes out of that room the ankle which is connected with the investigative agency will make alarm and alert sounds so that he cannot move out of the house he was wearing the tanklet Dominic Strascon was the vice president of the international monetary fund by the time he was arrested the same technology was used for more than 1,500 students who went on illegal visas and joined an illegal of the under recognition university in America all the 1,500 students were detained by American government by fixing the ankle it's when drones are going to use that face recognition technology when artificial intelligence is going to be used for registering the movement of a person even this ROGS which has been introduced by the government during the period of COVID one Anderson friend France has alerted the ICRT that is Indian come in computer emergency respond team the Indian computer emergency response team was responsible for all the activities that should be monitored by the agency appointed by the central government any activities positive or negative in the cyber phase they have to give the advisory to the government Anderson said that our idea said who is not safe we have given all the intimation about how it could be compromised by other persons and the debtors available with the service provider can be hacked by somebody because already more than 10 crore people have registered themselves by using the apps that app is tracking the locality of a person who has been shown as COVID positive in order to check that he's not moving out of his house the map is following the map is tracking whether he's moving from the place of confinement to other place which is very helpful for the health care activities and the officers to find out the movement whether he's whether he keeps on moving and the spreading the virus and the government has given an explanation no no it is fully secured but they have not come out with complete details whether it is really safe or not so when the flights were allowed to operate earlier there was a statement by the government that each and every person who wants to fly has to install that RBS edu app as a matter of mandatory compulsory for booking your flight tickets then after the human crime after the questions of privacy and other things were raised in the public platform slowly it was withdrawn now say they only you'll have to submit a disclosure form stating that I am not affected by Corona even an app introduced by the government itself is doubtful how many apps have been introduced for example tick tock tick tock in the sense the whole country was crying that it should be bad you must have seemed very recently there was a war between tick tock and YouTube between two individuals who has got more than 1.7 million subscribers 1% and another person has having 1.5 million both of them were having a fights over tick tock and YouTube describing that this is more famous that is more famous but tick tock is an app developed by a Chinese company that Chinese companies app is being used for more than millions and millions of people throughout the world by recording all their activities of life but we must all understand my friends that China is not having Google China is not having Facebook China is not having WhatsApp China is not having Twitter China is not having Instagram your country with the population of more than 150 crores has kept away everything but the whole world is under the supervision on monitoring of these types of apps there are so many apps even if you are taking a photograph by using your mobile phone just go to that photos go to the corner click that at the right corner you will be able to see date time place and the altitude of the place which part of the world you were standing by using what lens what is the speed of the shutter used by using what lens you have taken the particular photo is available with the Google but Google says we are safe but the FTC of the American government FTC has imposed a penalty of five billion dollars for Google company for compromising for not maintaining the data of the customers Google was brought to the Parliament Sundar Pichai was made to appear in the Parliament to give explanations about the data safety Sundar Pichai was telling one particular question was raised to him whenever we are entering the name of the president it is showing as idiot why it is happening so why it is showing only his name when when we type the name of our president showing idiot the explanation given by Mr. Sundar Pichai CEO of Google is the algorithm in such a way it is stored the predictive test stored in the service if it is stored in such a way there are 200 patterns of storing the materials in the server when it is stored in such a way the memory is stored in such a way in the server as it is given so when a search is going for it the predictive text shows in such a manner it is stored suppose if it is taken as a task if it is if it is given as an assignment for a company it is stored in such a way so people whoever is going for such particular search will get only the predicted result that is how Google was taken for a task after the elections of the American elections with the connection with the Cambridge Analytica of a British company Cambridge Analytica was responsible for sending so many defamatory messages about the candidates and it was responsible for making a change in the election results itself even that company was fine but technologically superior companies who are having most of the people in their hand are fined in European Union in UK by the FTC in America what is the privacy agreement those companies have signed with the Indian government is not made public till today when the full bench judgment of our honorable Supreme Court says privacy is a fundamental right what is the privacy agreement entered with those companies by the government of India has not been tabled before the court of law till today when the mob lynching was going on what's up company was called by the Supreme Court asking for the details can you give the origin of the message sent by whom received by whom what's up company said it is technically not possible for us to submit those details maximum we can restrict the forward messages from 256 to 5 when you are restricting the forwarding message from 256 to 5 the company says we are not in a position to give the origin of the message where from it is originated the outfit of it filed by the watch up company is end to end encryption is issued by our company even what's up cannot intercept when what's up says that we cannot intercept is it not against the telecommunications law of our country where the investigating agencies have got the power to intercept illegal messages sent or received our communications originated and received by various people or various agencies even including sorry including terrorist organizations when the government is not in a position to intercept government investigating agencies are forensic forensic agencies like cybers forensic agencies are not able to intercept an message when the company has made it as a policy and filing an affidavit before the court of law that end to end encryption is given by the what's up my dear friends I make a serious request to this platform just go to what's up go to settings and find out you could see there is a declaration made by the company in the settings you could see end to end encryption is issued even what's up cannot intercept your moment your message is sent from what's up from one person to other person either by audio or by video the moment it reaches the destined person it will not be available in the server at all even what's up company cannot intercept the decryption technology has not been shared but at the same time an Israeli and company because is the software developed by the company is having access with more than 1,500 prominent persons of the world of their what's up account hacked into their account and taken details what's up company as largely complained against the Pegasus software of that the Israeli and company in American court and they have also intimated the persons personally that your account is compromised but the end to end encryption is assured when it is against the sovereign nature of the loss available in the country the what's up is now available with more than 100 crore people of this country used for all purposes we could still see the maximum assurance as given by the what's up company that once if you scan the code available in the settings with your computer of your friends account if both codes are valid that end to end encryption is assured between these two subscribers even that is not clear to you you could see 16 numbers will be given in that if you read if you take the phone of your friend and open his what's up account and your account and read that 60 number which is matching with your phone it is assured that any communication between these two instruments are secured end to end encryption is given here I want to give an explanation section 69 of the information technology gives all power to the government to decrypt to monitor to block to supervise and also to enter into the system and take all the decrypted codes for the purpose of investigation 2018 November the government has made a circular under section 69 16 and 1 16 and 2 of the Information Technology Act that the government has given power to 10 agencies of our own investigating agencies like CBI, law, customs authority, revenue authorities and local police and military signaling police all people are being given power by the amendment of the rule of 69 of Information Technology Act number 2018 any citizen of this country can be monitored, tracked, followed any surveillance can be made 24 into 7 by those 10 agencies that particular section gives the power to the investigating agency to decrypt any message which is sent by a agency but at the same time one particular company what's up like is making an effort filing an effort of it before the court of law supreme court that we cannot share the data it is not available even with us is the declaration given by what's up think seriously my dear friends in this platform everybody will say that no no no what's up is very very useful for the people what's up is so useful for people without what's up people cannot even all that is it so when the device is given to you free of cost without any payment for every month that particular app has gone and reached hundred and crores hundred crores hundred and twenty crores become order of the day without that you can't sleep without that you can't even make up without seeing the good morning messages in the what's up your your thoughts are not complete without saying good night the dust is not complete without sending the motivated messages you don't sleep without seeing the messages are something like that but how the company's ruling this is where the digital slavery is very enforced by using the gadgets but our own law is not supporting you must have all read my friends the British government has introduced a law which is called the super charter super charter was introduced in 2017 that were challenged before the court of law in England it is made up to do by the Supreme Court of England in 2018 July that 48 departments of the UK now has got access over each and every citizen of their day-to-day activities when all the day-to-day activities of a citizen is monitored either by an agency or by an app or by the government and here I would like to also say that a particular community called Uighurs in Chinese in China more than 10 crore people are under confinement under 24 into 7 surveillance by the government by using apps in that particular Uighur area Jingxiang province even if you are buying a small weapon for your kitchen that has to be embedded with the code by showing your ID card your address everything only they will give you the knife that knife once if you enter into your house you have a QR code entry in your door that particular owner of the house has to affix it's QR code in the door then only you can have access into a spoon house that particular weapon when it is entered into the kitchen that will be registered with the next available police station this particular weapon purchased from this store with the code as entered into this house today any person who is going out of the house has to make an entry in the QR code by the time he has to re-enter into his house he has to re-enter the QR code any third person comes or any other person goes and doesn't return that to be immediately taken into account by the cadets they call the police there it will be recorded by the cadets immediately next minute the cadets will reach what happened to the person a new person has come to the house this is how the privacy of individuals are compromised even today when artificial intelligence is going to be introduced in the future for the purpose of investigation and other things humans are going to be implanted with chips with them that is we are all going to be called a cyber box in the future not human cyber box will be called a cyber box we will be implanted with chips when artificial intelligence the lawyers must have seen in America there is one Mr. Watson I think Watson is the software developed which is going to root out the very future of the lawyers and they say artificial intelligence is going to be used for the purpose of analyzing the character and quality of a person in plea bargain for example in a tested case the artificial intelligence was used by the juries for giving punishment the finding given by the artificial intelligence the person is from particular locality where criminal activities are taking place probably downtown then his race is taken into account his race his color his locality everything is taken into account between a black and white the artificial intelligence gives a report the black person is likely to commit more offenses in the future the white person is not likely to commit offenses in the near future so in plea bargaining there can be lesser punishment for the white there can be larger punishment for the black he's a finding given if it is going to be used like that by using artificial intelligence for the purpose of even giving punishment in future the gadgets are going to rule the world when the gadgets are going to rule the world I feel personally this particular period of corona is a testing platform for using all the technology and other areas are concerned because in the near future by making people to sit at their home confined at their home either by way of a virus or by way of any containment or by any act you will be completely forced mandately only to get connected through gadgets if you are forced to live through gadgets your whole life will be operated by using a single remote by a single person the whole meaning of democracy will be scrapped the whole meaning of democracy and free-living freedom of expression life everything will be rewritten by the digital world by a person who was having got hold of the whole thing this is the particular message we must register we must underline in reading that if technology is going to be allowed to overlap the lives of the person the owners of the technology will become the super boss of the world attempts are made by way of using the apps the persons who have started revealing those facts to the world have been already punished you might have seen what happened to Edward Snowden you might have seen what happened to Julius Assange Assange was confined in UK for more than six to seven years in an embassy his asylum status was also cancelled now he's undergoing imprisonment for bail jump in UK he was monitored having surveillance over his two bedroom apartment of the Nicaraguan embassy for more than five to six years after that now he's taken into custody Edward Snowden has gone to Russia we don't know what happened to him both people have started exposing to the world that what's actually happening with the privacy of the people they have been the whistleblowers have been punished they are not allowed to move in public even that Julian Assange case that they went to the extent of saying that he molested girls in Switzerland and he was about to be tried that Switzerland government was demanding for sending him to Switzerland finally the prosecution was withdrawn after even after withdrawing the prosecution also he was not able to move freely he is now taken into custody by the British government Australian government is introducing a scheme which is called the reverse poem when any phonography photographs are taken by people during the course of their interaction or any consensual relationship any personal photograph intimate photographs taken by them if it is used for the purpose of revenge it's called the reverse poem revenge poem the Australian government has got a scheme called ease of service where if you are blackmailed with your nude photos you will have to submit the fresh nude photo to the government so the government will compare your photos published in the media and if both the photographs are going to sink together the government will use a technology to remove the photo from the particular site even after making complaints if either Facebook or Instagram is not removing the government has got a separate scheme in order to protect their citizens from reverse pornography in a country like India reverse pornography is a way of life even in a consensual relationship both men and women are taking photos recording their personal intimate activities and started sending through WhatsApp sharing it to others and though there are so many judgments which have been given that sharing or even admins can be prosecuted that very recently one judgment has come that admin cannot be prosecuted we are not clear that way we say that the WhatsApp goes to the extent of filing an affidavit before the court of law supreme vote that we will not give the decryption details we cannot share the details and the information technology act says that the certificate must be submitted under 65 if certificate is going to be compulsory under 65 there are three four judgments already it has been utilized by the latest judgment even if you don't own the gadget also you need not bother about it you can file a self declaration but the larger bench judgment which is given in that case is still holds good that the compulsory 65 be certificate is compulsory even in murder cases what happened very recently here in one murder case in the place of occurrence you know your photo taken by somebody was shared in WhatsApp one photograph has reached the investigating officer that investigating officer who has received the photo in his mobile phone as filed in the court as a matter of exhibit without any particulars without showing who is forwarded whether it was really taken from the scene of occurrence what was the lens you see once you start using your mobile phone and taking photos you can change the entire scenario you can change the color you can add the brightness you can either bring it to the night effect or evening effect that's a city or tone or the evening tone all that everything can be brought into by taking to different angles you can bring different picture of a scene of occurrence once a photo is taken from a particular scene of occurrence without ceasing that instrument and without taking copies from that instrument two three particular photos received by the investigating officer have been filed before the court of law saying that I don't have to give you any details I don't have to file any certificate under 65 be even self declaration was also not filed of course that was rejected by the court of law but when when the electronic gadget is used for all purposes I just told you about the how the investigations can be tampered how even the movements of the president and prime ministers of any country can be followed and tracked and monitored where do we stand humans see the latest controversy you must have seen when when a particular statement was made by the president of a country Twitter goes to the extent of removing the content saying that it is against your policy because immediately after the George Floyd in a incident in Minneapolis a statement was given by Mr. Trump once if the loot begins the shoot also begins this is the particular faceology used by him the looters have started looting so we'll start shooting it was not a content okay with Twitter Twitter said we'll remove the content but Zuckerberg says it is a freedom of expression we have limited scope so even president of a country is not spanned once a moment your fire is coming out of the particular gadget by way of a word it goes like a rapid fire a small a small news or a smaller bogus news can reach 100 crores of people matter of one hour which can change the whole scenario of a country but we have not given proper treatment proper training we have not given proper awareness we don't have sufficient law only these particular 66 to 65 to 80 17 18 sections are only available for offenses which is taking 24 into 7 among 120 130 crude people whether it is sufficient no why the parliament is not marching forward because the digital world is not properly introduced to each and every person of the whole world because they are not sure they are not sure Google was about to make a separate search engine for the Chinese government which was objected by the Google employees and pitch I was forced to give a statement before the American Congress in Parliament no no we don't have a separate program for any making any services a search engine for the Chinese each and every country is now trying to produce their own search engine because one particular search engine Google has become the boss for each and everything we depend on only the search engine of the Google I am making requests through all my sessions to the whole country of 120 crores why we should not develop our own search engine in Indian languages when indeed is going to be your own search engine it is coming under the purview of our all enactments and acts you don't have to go and beg Google you don't have to go and beg Facebook you don't have to beg Instagram for the purpose of getting details either through the nodal offices or by sending someone to them they simply could come to your platform and say no no all our services are available in foreign country we are unable to give those decays to the court of law can any agency be allowed to operate in a country with 120 crore and 130 crore people which openly files an affidavit that this detail cannot be shared into encryption into end encryption is assured we cannot share the details the top most lawyers are appearing for the company and arguing the case in the court but my dear friends but when when privacy is not in our hands when the punishment which is given by the information technology act is very less most of the offenses are compounded other than the sexual offenses against children some of the against us against women and cyber terrorism most of the offenses are compounded below three years with this law how we are going to govern ourselves you have given the weapons to the people you are given the trigger to the people you are not trained to them when to shoot when to hit it is like a dynamic sleeping in their pocket you do not know anything I do not know anything we do not know anything but we have everything in the cyberspace and cybers world there is no privacy everybody is naked everybody is digitally naked I am monitored you are monitored the moment you enter your name the moment you install any app in your computer or your mobile phone by way of entering your name by way of pressing all the accept accept accept you are giving access to every part of your activity to some map some of the apps are designed even without your knowledge it will switch on or your camera and record your activities most of us say that what is there let them take my data and all that my dear friends data is going to be the asset of the future that is why there are particular fields which are operating called data mining the data mining means whatever the data available with the system or whatever the data available in your computer is the source of information for many companies to make their livelihood especially I think during this period of corona COVID-19 the entire data of the humankind running into more than 700 billion might have already reached the corporate heads in insolvency or in total I'm not very sure in near future suppose if there is not going to be any dawn out of this problem we don't know for how many months together how many years together we are all forced to sit at home and the digital world is going to rule going to rule the digital world is going to become the order of the day for each and everything even to purchase a small banana if it is not safe to walk in the street you love to make online order and the detox will be available the government this person is diabetic you can take only two bananas so that person is having hypertension this medicine is given from many plus so this is the medicine supplied to the house this is the vegetable supply to go this is their budget this is this is this is the medicine he's taking or yes who is there he's whether he's moving out or that my private movement out of the house even after that compulsory period of 21 days also still that app will be there the app will track my movement it will track my by it will follow my travel even if you're traveling from one place to other place also by crossing the towers you are registering your map of travel the moment you start your from your house go to the next state you are automatically switching off to the next tower of the mobile phone and your map starts getting registered there and Google is following Google map is following where you are free varies your privacy there is no privacy we are all living in the naked world digitally naked I started because why emphasize still that when you are forced to live your life under the supervision of gadget when gadgets are making your life miserable if you do not have proper awareness if you do not have proper legal provisions how to go ahead then we are in a mess the whole mess is going to be the investment for the corporate companies who are going to own us in future won't us in the means each and every of your activity your purchase your food your medicine will be decided by them already one private corporate company from our country has started purchasing shares and already started having business agreements with the foreign company like Facebook and all that slowly they will become boss over you a particular company which was permitted to sell their sim cards owned by two brothers ten crore people have purchased sim cards by submitting their other details in the company around two three years back other access any particular detail is leaked or hacked there is a punishment provision in other act but that particular company after selling more than ten crores of mobile phones have largely complained that some of the data sort of breached from our data's our from from our service is the complaint registered by the company wherever you go you are not safe if you go to other even far 500 people by 500 rupees they are making other card in your name other is not safe but privacy is a fundamental privacy is compromised there is no provision to protect your privacy you are forced to be under digital surveillance you are also always supposed to be under supervised when you are supervised monitored attract where should I leave how would we live we should train ourselves to live with gadgets by having the little knowledge about how legally it should be implemented because each and every incident through the media either can be misrepresented or missing informed in order to verify what is true we must have the real sensors with us to verify suppose you go to Google and read Wikipedia Wikipedia you might have seen there is one person called edit you can enter any detail into Wikipedia and come out by putting your own input there is no censorship there is no censorship in visual media there is no censorship for YouTube anything you can upload just like that you can come out so my dear friends especially after the incident of George Floyd in Minneapolis they reach up the media they reach up the content matters because when we are sitting at home we see people are violating not by not wearing masks it gives you news oh when so many people in America is not wearing mark why should I wear mask so you are copying pasting the activities of the people by seeing the activities in cyberspace but we do not know whether it is right or wrong and one such incident which has triggered the racism in that country has opened so many subjects which is likely to spread but that is not our subject but if anything happens like that all the more possibilities are there that a particular section of people can be targeted that can be tried and unless or otherwise we have the awareness unless or otherwise what is the relief available in that particular act nothing is available you cannot prosecute a person properly if any any any pornography there is there is a separate section under books act if information technology if cyberspace is used for the purpose of books act serious punishment is there but nobody is going to prove it before the court of law properly by using the technology so let's all take this as an opportunity to get an interaction to the technology first nobody is an expert even I am a no-wise every other day I'm updating myself by reading either by going through the news what's happening around I am updating myself so that I can share whatever it is available with the common people with my lawyer friends with court of law with judges judiciary and other things so let me take this opportunity and I'm very grateful for being with me this time though I am not used this for this platform we are very much used only by addressing the people in a gathering so there will be little hesitations here and there because this is a new attempt so I personally feel that I'm not complete with my entire content but still time is running out so I thank everybody for being with me let's all take this only an introduction to the privacy and cyber world and let's all hope that the near future is going to be good and the best for the human kind we'll all pray for that I'm very grateful for once again Mr. Vikas for giving me this opportunity to share the platform and whoever has joined in the session I thank everybody I pray for your wellness we'll hope for all the best thank you thank you it was an extremely engaging and after the entire session two things actually come down to the mind as we all invariably say that technology is a great servant but a bad master so as long as we try to use the technology as a servant then it's a it's fine but as long as we try to get engaged with the technology in such a way that it becomes a master then it has its own repercussions after hearing the session one aspect definitely goes in the mind of every participant that as to whether we have actually surrendered to the technology and have we affected our privacy in such a way that it could be really alarming and in fact the insights given by you that too with the examples not only of India but worldwide and what are the effects etc you have touched the various aspects include how the trails of your submission to the technology and the cyber etc and that is why the topics cyber security how are its effect and then certain issues which we normally did like giving a thumb impression let's assume somebody we buy a product on an online and when the as you said Decorium was comes there are certain difficulties and we will definitely ask you as to how and the way you said that we all submit ourselves to all this while accepting any application which we are downloading in a lighter way and I am reminded that we often say that when we actually give our acceptance to any technology and when any any application it is just like once we are accepting to the all those which we give at the time of marriage without actually seeing as to whether we have understood the whatever we have done when the pundits say that you are like accepting this for everybody says yes if actually one would have accepted the woes and done in the manner it would have been then the litigation on the domestic front at least would not have come but that that was all in the lighter way we would be taking questions but I personally feel that large number of issues you have already touched but before we take the questions I will ask this is Naga Matu who has been kind enough I've just I was just looking at the participants I just saw that this is Naga Matu who has also given us the insights on a different topics fortitudeously enough he's also on the platform it only shows one aspect of just as Naga Matu that despite the fact that he's so knowledgeable he's himself coming forth to listen to this session it shows because so thank you very much for having called me and in fact as Mr. Balu very aptly put it we are all this is a cyberspace or cyber crime illiterates do not do anything therefore this is a good time for us to learn at least to save our own personal interest and our own privacy that is why I've been here and I thank you for providing such a very good platform and this this lecture has been a lot of information to us as to how to protect ourselves thank you Mr. Vikas and Mr. Balu thank you sir I my all my greetings to you and it was a beautiful lecture thank you sir thank you thank you Mr. Vikas thanks to you sir word of thanks word of the insights being learned coming from just as Naga Matu itself shows that the session was engaging I will just take there are only few questions the person who actually want to post the questions they can do that I've just seen that one question has come invariably a Varun Mahajan a Facebook hacking and getting money transferred from the no is getting normal what is your view on the same I don't have to say anything about that because once if you get any request for money transfer and all that you must be always aware whether that person is known to you first and whether the transfer is really essential nowadays you have phone you can just like the call that person and find out whether you have really made a request and all that you must have seen a incident which had taken for a Supreme Court judge one year back both of them were sitting together in the same bench even after retirement also they were attending some orbitations and other things one day a message was received by a particular judge saying that judges the relative is admitted in the hospital immediately 1 lakh has to be transferred by using electronic transfer he made a transfer of 1 lakh next day also he was sitting with them he did not even verify whether you required that money you sent a request for that I've transferred the money after sometime some more amount was taken from his account then only he verifies did you receive any money from my account because there was one urgent request from your account on that night then both of them shocked together and registered a complaint after some this that happened to a bench of our own Supreme Court once the request comes there is a phone you just call that person find out whether there is any requirement why by seeing a message in the Facebook you should go to that just avoid it that's all I can say all physical verifications are available am I right? Yes sir. So Varun Maharajan he himself advocate RP Singh says how to prevent security theft theft and avoid misuse of cyber privacy. The only thing you must doubly ensure by seeing the messages whether it is from a genuine suppose you receive a mail you must see whether that mail is served from a secured mail server or not because once if you go and see that if it is a secured mail the test will be there most of us don't verify or you will have to just forget it and allow it to just be there if anybody is calling you over the phone and asking details through mobile phone or through your mobile don't submit any details suppose if it is coming in the name of your bank you call your bank and verify whether you send any mail to me asking for details for example SPI will be there SPI means state bank of India they'll put a small I together we will not see it we will see it as SPI so by seeing the proper address of the mail ID first whether it that is proper for example ICICI bank is there suppose ICICI nobody will be able to read it first they'll see ICICI but they will think it is ICICI then they will start giving the particulars never respond anything over the may for example I'll tell you two days back I received a message this is very very important immediate please contact me through this mail that name is known to me that is why I got confused when the name is known to me I got confused normally I never respond to such messages and mails I never touch that I forgot it once if it is not repeated the moment you ignore it if it is not repeated you can be sure it is a scam if it is really known person they will start attempting to reach you suppose you are not responding to your mail they'll call you over the phone or they will send you a message or at least through what's up so what is the urgency by reading a mail and submitting your details heaven is not going to fall check double check cross check then submit always the physical verification is still available if you are not very clear with the technical details approach a person within your home who are little having knowledge about the space whether it could be done or not that is the only way to come out so we have unmuted mr. Lal he would like to ask the question directly mr. Lal good evening yeah thanks for a very great very great insights and my question is that in this case when there is a personal data which is being taken by the people and in various forms and there are less remedies how does a person protect himself you have answered it in the previous question to advocate RPC but any other precautions or any other thing where an individual can protect themselves by by the personal data which is being taken and this personal data is being used by the corporates as you have mentioned in various forms for their benefit see as such we are not technically superior you must always have an interaction with people who are well versed with computers and internet activities and other things then we must have a legal thinking over that get trained from them then to apply because as a lawyer as a lawyer what I could do is you can do this you need not do this how it should be done technically means we must also have interaction and try to learn for example if they have a doubt immediately and go to Google and search for it and find out whether it is right or not for example if to suppose if you want to crack a password you just type it out how to crack a password you will get one but 10 10 10 lakh 50,000 pages to crack a password by going through that anybody can have an idea how to crack a password then we must be doubly assured to in order to maintain our password it is always advice that it must be either a long password or with capital letter and small letter higher case lower case uppercase lower case mingled with alphabets and numbers all that should be mingled for example even sometimes it is suggested don't try to have a password which is common for everyone triple six dead of birth car number like that to humorously it is even introduced that you can even have the pet name of your dog or cat as your password temporarily sorry if you have a pet for anybody in your pet name for your somebody in your house that can be used even a name of a movie can be used as a password for quite some time you must keep on changing your password for mail for anything and that password should not be stored in your device this is my password this is my ATM password this is my moment your device is looted by somebody then everything goes to his hands so the habit of changing the password is another problem mentally I'll tell you this is a great difficulty if you have a hundred accounts you need you cannot have hundred passwords it is humanly impossible to remember everything as I said that the first casualty is our memory after the introduction of gadgets so have a separate notebook and write your passwords and keep it in your pocket always very safe that is the old way of remembering your phone numbers like that password you have a separate small the notebook in your that will keep it always because we are opening so many accounts that is one way of remembering and keep on changing it don't always try to go for guessable passwords especially the name of the children date of birth marriage day which can be easily guessed by people is attended by them even I am told the moment you start entering into any account the next minute you are going to type out the password when you are going to type out the password which letters or numbers are very often used that is also tracked by the hackers how many keyboards are very often used after entering your mail ID you are entering your password suppose you are starting with a is the first keyboard you are catching then that particular press is tracked in such a way technology is improved people can steal everything including your password so the only way is keep on changing it very often don't have a password forever so we've unmuted Vishnu Vishnu wants to ask a question directly Vishnu you can ask the question hello hello good evening sir first of all I would like to thank you for such a wonderful seminar sir my question is that every day I receive over 50 to 100 messages on my email I never come to know who sends me such a messages most of them are promotion messages or so many such messages so how can I prevent such messages or I can delete them because many times I could not delete them I get such messages again and again and again I have the same problem my dear friend the problem is the moment we start using any ATM card or petroleum card that you use your ATM card or any petrol card or make any purchase your email is automatically registered by those companies and those data are sold by those companies to the survey also for other people for marketing for example if I fill petrol by paying cash that week I will be getting later lesser messages suppose I make my payment by using my ATM card I can be sure next week I'll be getting minimum 50 to 100 miles I have a normal way of doing it I don't read it simply I'll go delete it that's all the moment I see the headings of the message I know whether it is meant for me or not otherwise I'm very far sure it is a marketing message immediately I select the delete button and finish it other than that I don't have any remedy at present you cannot prevent it because you are now being forced by government agencies to use digital payment and your card is used your card is registered everywhere with your email ID once your card is registered with the email ID you make any purchase they have your daughters and the and the data protection act which does not be given into effect I don't know whether it is going to speak for it or not we will have to wait for it and see it till then the only way is to depend on the delete button physically no other way go select all in a bulk and just delete it and send it with the dustbin don't read it. So we have unmuted Rwati Ji Bohan the question can be asked Rwati, Ravthi. Ravthi. Yeah hello sir good evening. Yes please. Yeah sir it was a wonderful session and I learned a lot about this digital world. Thank you. Since now you said that when the courier person comes with a courier and you should not sign it on the digital board but if he doesn't have any paper he doesn't have a physical paper or anything to sign and he asks us to do the signature. He cannot compel you I've done many times I said I will not affix my signature whether if you want to deliver the good deliver or take it back to your company then immediately you'll say sorry okay sir I'll make entry on my own that it is delivered and I'll give you be firm on it. Okay thank you sir. Yeah one last question we will take and then otherwise. Yes sir. I'm just saying. It says I'm a cyber forensic practicing for last from last 14 years. Mr. Baluyame Ji. Hacker needs permissions to assess your account. Don't you think it's a mindset in India only as you have also said off-camera is assessing us anytime and whole world is naked. It's the starting of cybercrime. Definitely we have to learn from him he only has to teach us because as I told you once if any access is given for any apps to steal our account whether they are accountable because that survey is available in a foreign country remote place they're not accountable only thing you can register a case that is why all the technology must be given to illiterate people also that when you are downloading an app you decide whether the app is required for you if it is made mandatory by the government then the government should come forward educate the people how it is safe how it should be done they should sensitize without sensitizing anything you cannot keep on doing everything and depend on the cyber forensic even cyber forensic can fail sometimes so I'm afraid of that particular whole area how it has been done how it is hacked and all that the remedy when the remedy is not available we should be in solid unless or otherwise it is a mandatory or it's a much for you just for the sake of fun just for the fun of game and all that take it and accept take example of the pubg game what pubg game has brought into India pubg game has made all the adults are violators of law and violent in their activities both in words and action blue whale came that suicide tendency was going on blue whale came pubg game each and everything will keep on coming then I request always through the media the moment something is illegal going on the duty of the ICRT is only for the purpose the duty given to the computer emergency response team is to advise the government they've been empowered to do that I don't know what they are doing by sitting in seven sir hotels or five sir hotels and what are the decisions taken by them they must be the first person to create the awareness it is made as a law in information technology act they should take the initiative they should interact with cyber forensic people and come out with a white paper this is technically safe this is technically not safe then sensitize the people at least through the government channels private channels not do we are having more than 2000 television channels in India any such warning messages can reach the mass of 130 crores within a matter of one hour who should take the initiative so government should have a separate initiative by interacting with the CRT by interacting with them getting the advisory program then you should reach the mass in the vernacular language that is how we could educate the people in near future it is a must I feel thank you sir questions will continue to pour but we generally believe in the time straight part after the webinar one thing has actually come to our mind that prevention is better than cure and the insights given by you definitely gives us a belief that what insights you have given we should at least try to unmute yourself thank you thank you because it was a wonderful session and tomorrow we have a session on risk management and economy which is very relevant tomorrow we have three speakers mr. Anil Tishora who is a former DMD of and chief risk officer of the State Bank of India Navleen Kundra who is a consultant and shifalik mercantile and he had been a general manager in the Oriental Bank and then mr. Amaji Chopra who is a chartered accountant by profession and former president of Indian Institute of Chartered Accountants so do stay connected again tomorrow at 5 p.m. thank you everyone stay connected stay blessed all the participants we are thankful to you I on behalf of the on-law CLC and you are just having to sit down here thank all the participants and tomorrow same time but with a different topic thank you everyone stay safe stay blessed