Legal Protection for Women And Child

 



LEGAL PROTECTION FOR WOMEN AND CHILDREN

Project Report


Submitted By


NASNY NAZEER

JAYALEKSHMI  JAYAN

NAJMA SUDHEER

APARNA SURESH

RINCY HUSSAIN

AMINA BAIJU

SABINA SALIM

RAGENDU R

ANJANA VIJAYAN

ABHIRAM J



















In partial fulfillment

of

CONNECT TO WORK 

KUDUMBASHREE 

IN ASSOCIATION WITH

ADDITIONAL SKILL ACQUISITION PROGRAMME

February 2021





Table of Content



Contents

LEGAL PROTECTION FOR WOMEN AND CHILDREN 1

Project Report 1

INTRODUCTION 4

CYBER CRIMES 5

TYPES OF CYBER CRIMES 6

COMMON FORMS OF CYBER CRIME 7

REASONS OF CYBER CRIMES 8

1.Online Classes 8

2.Online Gaming 10

3. Misuse of Social Media 11

AFTER EFFECTS OF CYBER ATTACKS 18

HOW TO DEFEND 21

1.EDUCATIONAL ASSISTANCE TO WOMEN HEADED FAMILY 21

2.MANGALYA SCHEME FOR WIDOW REMARRIAGE 23

3.  ABHAYAKIRAN 24

4. CHIRI 26

5. NIRBHAYAM 27

HOW TO PROTECT YOURSELF AGAINST CYBERCRIMES 28

RULES OF CYBER ETHICS 31

WHAT WE DID 35

CONCLUSION 36

REFERENCE 38



INTRODUCTION 

 

Connect to Work (C2W) programme focuses on the development of soft skills

of young people from rural areas. In this component of the scheme, govt. will

provide guidance to youth to enable them to find employment and connect

them to the job market.


We are really proud to be a  part of this programme as we get a wonderful

chance to perform our communication skills and presentation skills

throughout the transaction of the lessons. And we are connected more to

work and thereby to society.

Our topic for study was ‘LEGAL PROTECTION FOR WOMEN AND

CHILDREN’. We have chosen this topic because in the present scenario

many problems faced by women and children in the society. During the days

of quarantine children of different ages became the victims of suicides and

depression due to the overuse of mobile phones and misuse of internet and

computers. 







 

 




 CYBER CRIMES

 

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.


Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.


Some cybercriminals are organized, use advanced techniques and are highly 8technically skilled. Others are novice hackers.


Rarely, cybercrime aims to damage computers for reasons other than profit. These could be political or personal.


Random programming source code with syntax



















TYPES OF CYBER CRIMES

 

  Here are some specific examples of the different types of cybercrime:


  • Email and internet fraud.

  • Identity fraud (where personal information is stolen and used).

  • Theft of financial or card payment data.

  • Cyber Extortion (demanding money to prevent a threatened attack).

  • Ransomware attacks (a type of cyber extortion).

  • Cyber Espionage (where hackers access government or company data).


  

 

 

 

 










COMMON FORMS OF CYBER CRIME


  • phishing: using fake email messages to get personal information from internet users;misusing personal information (identity theft);

  • hacking: shutting down or misusing websites or computer networks;

  • spreading hate and inciting terrorism;

  • distributing child pornography;

  • grooming: making sexual advances to minors.













REASONS OF CYBER CRIMES

Online Classes



Online education is the form of education that takes place over the Internet. It is also called e-learning or online learning .Online learning is a great alternative to traditional classes. But it has advantages and disadvantages.

 

ADVANTAGES


  • It is very convenient.

  • It provides flexibility.

  • It brings education to home.

  • Online classes teach us to be self disciplined.

  • Online classes can be efficient and productive.


DISADVANTAGES


  • Online classes provide a sense of isolation.

  • It give us more freedom

  • Online classes are study centric.

  • Students can not focus.

  • There may be technical 















































2.Online Gaming


An annual research  conducted by OF COM  (The office of communication) says that online games are hugely popular among children and young ones. The report says that online gaming is one of the top activities that is enjoyed by the teen ages.

Most of the games are playing either via mobile device or going online to play with their games consoles .Most popular one are the mission based games or the sports related one.

ADVANTAGES

  • Video games are the best time pass ever.

  • It can be played with a partner. 

  • Video games improve thinking ability.

  • Eye and hands coordination improves.

DISADVANTAGES

  •  Video games are very expensive.

  • Video  makes you addicted.

  • It requires expensive software.

  • Video games are very dangerous for school going children .

  • Some time players  of video games suffer from eye sight problems and neck pains.



3. Misuse of Social Media



Social Media means that any personal sharing information or communication on the internet which occurs through mobile, computer, and tablet.Numerous apps and websites contribute to it to make it possible. Now social media is becoming the most significant and widespread communication source rapidly.


Social networking and social media provide people free platform to share their content, news, ideas, and information at a faster speed.  It helps many people to connect and finds new friends and shares your details and experiences of life. Social media also provide you with the service of buying and selling. Social Media is a tool that serves thousands of people to connect remotely. Some versions of the electronic device are WhatsApp,Facebook, Youtube, Twitter, and Pinterest etc.








  • WhatsApp is the most popular platform for messaging and calling purposes. And it can also provide you with the service of voice messages, videos, and photos sending.  All the contacts from the mobile can be transferred to the WhatsApp contact list.



  • Twitter helps you with instant news. It is the microblogging network that allows you to share different multimedia content. Twitter gives you a platform that can discover the rest of the world.



  • Facebook is a primary social networking source among people on the internet. It is the second popular app that also used for messaging. We can even get knowledge about someone by checking his profile on facebook. 



  • YouTube is also the commonly used website and provides all the current news about the country, movies, and informative tutorials on any problematic thing.



  • Pinterest gains the highest praise that attracts thousands of unique customers monthly. It also infiltrates the market for shopping.



ADVANTAGES



1:- Connectivity – The first and main advantage of social media is connectivity. People from anywhere can connect with anyone. Regardless of the location and religion. The beauty of social media is that you can connect with anyone to learn and share your thoughts.


2:- Education – Social media has a lot of benefits for the students and teachers. It is very easy to educate from others who are experts and professionals via social media. You can follow anyone to learn from him/her and enhance your knowledge about any field. Regardless of your location and education background you can educate yourself, without paying for it.


3:- Help – You can share your issues with the community to get help and giddiness. Whether it is helping in terms of money or in terms of advice, you can get it from the community you are connected with.


4:- Information and Updates – The main advantage of social media is that you update yourself from the latest happenings around the world. Most of the time, Television and print media these days are biased and do not convey the true message. With the help of social media you can get the facts and true information by doing some research.


5:- Promotion – Whether you have an offline business or online, you can promote your business to the largest audience. The whole world is open to you, and can promote them. This makes the businesses profitable and less expensive, because most of the expenses made over a business are for advertising and promotion. This can be decreased by constantly and regularly involving social media to connect with the right audience.


6:- Noble Cause – Social media can also be used for the noble causes. For example, to promote an NGO, social welfare activities and donations for the needy people. People are using social media for donations for needy people and it can be a quick way to help such people.


7:- Awareness – Social media also creates awareness and innovates the way people live. It is social media which has helped people discover new and innovative stuff that can enhance personal lives. From farmers to teachers, students to lawyers every individual of the society can benefit from the social media and its awareness factor.


8:- Helps Govt and Agencies Fight Crime- It is also one of the advantages of social media that it helps Governments and Security Agencies to spy and catch criminals to fight crime.


9:- Improves Business Reputation – Just like it can ruin any business reputation, It can also improve business sales and reputation. Positive comments and sharing about a company can help them with sales and goodwill. Since people are free to share whatever they want on social media, it can impact positively when good words are shared.


10:- Helps in Building Communities – Since our world has different religions and beliefs. Social media helps in building and participating in the community of own religion and believes to discuss and learn about it. Similarly, people of different communities can connect to discuss and share related stuff. For example Game lovers can join games related communities, car lovers can join communities related to cars and so on.



DISADVANTAGES



1:-  Cyberbullying – According to a report published by PewCenter.org most of the children have become victims of the cyberbullying over the past. Since anyone can create a fake account and do anything without being traced, it has become quite easy for anyone to bully on the Internet. Threats, intimidation messages and rumors can be sent to the masses to create discomfort and chaos in the society. Check out the 6 cyberbullying stories that turned into suicide stories.


2: – Hacking – Personal data and privacy can easily be hacked and shared on the Internet. Which can make financial losses and loss to personal life. Similarly, identity theft is another issue that can give financial losses to anyone by hacking their personal accounts. Several personal twitter and Facebook accounts have been hacked in the past and the hacker had posted materials that have affected the individuals personal lives.  This is one of the dangerous disadvantages of social media and every user is advised to keep their personal data and accounts safe to avoid such accidents.


3:- Addiction – The addictive part of the social media is very bad and can disturb personal lives as well. The teenagers are the most affected by the addiction of social media. They get involved very extensively and are eventually cut off from the society. It can also waste individual time that could have been utilized by productive tasks and activities.


4:- Fraud and Scams – Several examples are available where individuals have scammed and committed fraud through social media. For example, this list contains the 5 social media scams that are done all the time.


5:- Security Issues – Nowadays security agencies have access to people's personal accounts. Which makes the privacy almost compromised. You never know when you are visited by any investigation officer regarding any issue that you mistakenly or unknowingly discussed over the internet.


6:- Reputation – Social media can easily ruin someone’s reputation just by creating a false story and spreading across the social media. Similarly businesses can also suffer losses due to bad reputation being conveyed over the social media.


7:- Cheating and Relationship Issues – Most of the people have used the social media platform to propose and marry each other. However, after some time they turn to be wrong in their decision and part ways. Similarly, couples have cheated each other by showing fake feelings and incorrect information.


8:- Health Issues – The excess usage of social media can also have a negative impact on the health. Since exercise is the key to lose weight, most of the people get lazy because of the excessive use of social networking sites. Which in result brings disorder in the routine life. This research by discovery will shock you by showing how bad your health can be affected by the use of social media.


9:- Social Media causes death – Not just by using it, but by following the stunts and other crazy stuff that are shared on the internet. For example bikers doing the unnecessary stunts, people doing the jump over the trains and other life threatening stuff. For example in this video a 14 year old from Mumbai was doing stunts on a running train which caused his death. These types of stunts are performed by the teenagers because of the successful stunts made and shared over the social media.


10:- Glamorizes Drugs and Alcohol – One of the disadvantages of social media is that people start to follow others who are wealthy or drug addicted and share their views and videos on the web. Which eventually inspires others to follow the same and get addicted to the drugs and alcohol.


These are some of the advantages and disadvantages of social media for society. However, these are the enough advantages and disadvantages to decide which way to go on social media.it's 












AFTER EFFECTS OF CYBER ATTACKS


Cyber crime is being committed every day. Thieves commit cyber crimes to steal people’s money and their identity. With your identity, the cyber criminal:

can take out loans, incur credit, accumulate debt and, then flee without a trace. It can take years to rehabilitate your identity. A virus can destroy someone’s files and a lost database can result in receiving unwanted sales calls.

Following points are some among those after effects of cyber attacks ;

  • Identity Theft

Becoming the victim of cyber crime can have long-lasting effects on your life. One common technique scammers employ is phishing, sending false emails purporting to come from a bank or other financial institution requesting personal information. If you hand over this information, it can allow the criminal to access your bank and credit accounts, as well as open new accounts and destroy your credit rating. This type of damage can take months or even years to fix, so protecting your personal information online is an important skill to learn.


  • Security Costs



Cyber criminals also focus their attacks on businesses, both large and small. Hackers may attempt to take over company servers to steal information or use the machines for their own purposes, requiring companies to hire staff and update software to keep intruders out. 

  • Monetary Losses

The overall monetary losses from cyber crime can be immense. According to some studies, more than 1.5 million people fall victim to some sort of cyber crime every day, ranging from simple password theft to extensive monetary swindles. 

  • Piracy

The cyber crime of piracy has had major effects on the entertainment, music and software industries. Claims of damages are hard to estimate and even harder to verify, with estimates ranging widely from hundreds of millions to hundreds of billions of dollars per year. 

  • loss of reputation due to personal information that is revealed.

 

 

 

 

 

  • Health issues  related to cyber bullying


cyberbullying exacerbated symptoms of depression and post-traumatic stress disorder (PTSD) in predisposed adolescents. The children in the study came from challenging backgrounds, and cyberbullying still had a more forceful impact than other indicators in worsening depressive symptoms.

Further, the study suggested a vicious cycle. Those who were already depressed or suffering from mental health issues were more likely to be bullied online than those who did not suffer from mental health issues. The researchers said that their work confirmed the results of previous studies.




HOW TO DEFEND 


GOVERNMENT INITIATIVES FOR US ;


EDUCATIONAL ASSISTANCE TO WOMEN HEADED FAMILY




The number of women Headed family in Kerala is very High.  Majority of these families are living in deplorable conditions. The scheme propose to  extend a helping hand  to these families by way of providing  financial  assistance to the education  of children.

 

Eligibility


  • BPL/Priority   Family (Children of HIV/AIDS affected   persons, socially discriminated   persons  are Irrespective    of their priority / BPL status ).

  • Family in which the husband of a woman is bedridden  and not able to cover livelihood,  due to  stroke/or spinal injury  is eligible (Medical Certificate  to be submitted from  a Government Doctor.)

  • Only two children  of a family  are eligible

  • The child who avails  any other scholarship  is not eligible  for the assistance.  A certificate  to this effect has to be obtained from the  head of the educational institution  where the Child is studying.

  • The child must study in Government  or Government aided School or  College.

 


Financial/Help Assistance pattern

  • Category -I

       Children  below 5 years and between 1st and 5th standard Rs. 3000/year

  • Category -II

       Between 6th and 10th standard Rs. 5000/year

  • Category –III

       Plus  One Plus Two  Rs, 7500/year

  • Category IV

       Degree and above Rs. 10000/year


MANGALYA SCHEME FOR WIDOW REMARRIAGE


In Kerala Women  not only outnumber men, but also outlive them,  So the marital status of women  in Kerala is very important .  It could influence  the overall level of care and  support they receive from their family and society.  Statistics show only 3.5 percent of the total male population  in Kerala are widowers and the  proportion of the widowed  female population  is 11.56% .  This gender gap adversely affects women in every sphere of her life.

       It is in this context, the Government of Kerala envisages the scheme  called Mangalya to  encourage   widow remarriage.  The scheme  imparts financial assistance for the widows/divorced to remarry. 

Documents Required

  1. The following particulars should be attached  to the application  form .

  2. Proof  of remarriage

  3. Death Certificate of first Husband

  4. Legal document of divorce (For divorced women )

  5. Proof of BPL/Priority Category

  6. Proof of age in  the form of school leaving certificate or certificate  issued by competent authority.

  7. Proof of remarriage certificate.

  8. Certificate from Village officer showing that husband has deserted the women for over 7 years (for such applicant )

  9. Copy of bank pass book

Financial/Help Assistance pattern
  Financial Assistance of Rs.  25000/- is provided for  eligible widows and divorced women.
Implementing Agency
Application should be  forwarded to District Women and Child Officers through Child Development Project Officers.
Documents for reference

 Application Form for Mangalya

 

3.  ABHAYAKIRAN

With an objective of providing  a safe and better living environment to destitute and Homeless widows. The scheme  provides monthly financial assistance of Rs. 1000 to the close relatives of destitute widows who provide protection and shelter to them.  

Documents Required

  1. Certificate from concerned village officer showing that the applicant is a widow and is under the protection  of her  relatives.

  2. Attested copy of priority/BPL Ration Card/Income Certificate  issued by village officer. 

Services Delivery


The scheme  provides monthly financial assistance of Rs. 1000 to the close relatives of destitute widows who provide protection and shelter to them. 

Implementing Agency


The duly filled  application form along with supporting documents should be submitted to Child Development Project Officer.

Documents for reference

 Abhayakiranam - Application Form






4. CHIRI


‘CHIRI’-Kerala Police

 Ph:9497900200

For more details see here



5. NIRBHAYAM


For more details  click this picture











HOW TO PROTECT YOURSELF AGAINST CYBERCRIMES

 


  • Keep software and operating system updated

Keeping your software and operating system up to date ensures that you benefit from the latest security patches to protect your computer.


  • Use anti-virus software and keep it updated

Using anti-virus or a comprehensive internet security solution like Kaspersky Total Security is a smart way to protect your system from attacks.


Anti-virus software allows you to scan, detect and remove threats before they become a problem. Having this protection in place helps to protect your computer and your data from cybercrime, giving you peace of mind.


If you use anti-virus software, make sure you keep it updated to get the best level of protection.


  • use strong password

Be sure to use strong passwords that people will not guess and do not record them anywhere. Or use a reputable password manager to generate strong passwords randomly to make this easier.


  • Never open attachments in spam emails

A classic way that computers get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.Hands typing on laptop keyboard


  • Do not click on links in spam emails or untrusted websites

Another way people become victims of cybercrime is by clicking on links in spam emails or other messages, or unfamiliar websites. Avoid doing this to stay safe online.


  • Do not give out personal information unless secure

Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are. 


  • Contact companies directly about suspicious requests

If you get asked for data from a company who has called you, hang up. Call them back using the number on their official website to ensure you are speaking to them and not a cybercriminal. 


Ideally, use a different phone because cybercriminals can hold the line open. When you think you’ve re-dialed, they can pretend to be from the bank or other organization that you think you’re speaking to.Woman using mobile phone


  • Be mindful of which website URLs you visit

Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with unfamiliar or spammy looking URLs.


If your internet security product includes functionality to secure online transactions, ensure it is enabled before carrying out financial transactions online.


  • Keep an eye on your bank statements

Our tips should help you avoid falling foul of cybercrime. However, if all else fails, spotting that you have become a victim of cybercrime quickly is important.


Keep an eye on your bank statements and query any unfamiliar transactions with the bank. The bank can investigate whether they are fraudulent.



 

 

 

 

 

 

 

 

                                             













RULES OF CYBER ETHICS

 

The basic rule is "Do not do something in cyberspace that you would consider wrong or illegal in everyday life."


 

  • Considerations When Determining Responsible Behavior

  • Do not use rude or offensive language.

  • Do not cyberbully.

  • Do not plagiarize.

  • Do not break into someone else's computer.

  • Do not use someone else's password.

  • Do not attempt to infect or in any way try to make someone else's computer unusable.

  • Adhere to copyright restrictions when downloading material from the Internet, including software, games, movies, or music.






 




1. Keep Personal Information Professional and Limited

Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.


2. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available.


3. Practice Safe Browsing

You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes.




4. Make Sure Your Internet Connection is Secure

When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about "endpoints"—the places where a private network connects to the outside world. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you're able to connect to a secure Wi-Fi network) before providing information such as your bank account number.


5. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust.


6. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure.


7. Make Online Purchases From Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections.


8. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing selfie you took at a party. Don't put anything online that you wouldn't want your mom or a prospective employer to see.


9. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real.


10. Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it's to date. 


‘Keep these 10 basic Internet safety rules in mind’



 







  

         

 









WHAT WE DID


  • Awareness Class on “ LEGAL PROTECTION FOR WOMEN AND CHILDREN “  given to Kudumbasree Members of our panchayat.

  • Interviewed with a Police Officer Vishnu R. L. , State Industrial Security Force,Thiruvananthapuram and Collected brochures of government schemes for the welfare of Women and Children.

  • Created a Booklet and Keep it in the Public Library.

  • Used online platforms for knowledge sharing.

  • Created a blog to know about the topic for public awareness.





    





CONCLUSION


               We are living in an era where the internet has become a part of our daily schedule. Online Gaming is not a beneficial hobby to start when you're bored. There are many disadvantages that could befall you and others around, for instance your family. Online Gaming can even ruin your future and education. There are many more hobbies which could benefit you in terms of physical and mental health.

As the technology is developing, the web-based social networking has turned into the routine for every last individual, people; groups are seen dependent with this technology consistently. Online networking has expanded the quality and rate of coordinated effort for students.

Though not all people are victims of cyber crimes, they Though not all people are victims of cyber crimes, they are still at risk. Crimes by computer vary, and they don't always occur behind the computer, but they are executed by computer. The hacker's identity is ranged between 12 years young to 67years old. The hacker could live three continents away from its victim, and they wouldn't even know they were being hacked. Crimes done behind the computer are the 21st century's problem. With the technology increasing, criminals don't have to rob banks, nor do they have to be outside in order to commit any crime. They have everything they need on their lap. Their weapons aren't guns anymore; they attack with mouse cursors and passwords.

Even  though internet users let out their personal data easily, it still remains the responsibility of the State to protect the interests of its people. It has been recently found that big companies like Facebook use personal information and data of its users and use this information to influence the political views of people. This is a serious threat to both individual’s privacy and the Nation’s interests. With the introduction of the I.T. Act, 2000, the issue of crimes in Cyberspace in India has been addressed very smartly, yet, the proper implementation of the Act is still lacking. The need for efficient cyber laws is very evident, considering the current scenario, but individuals should also be aware of such threats while surfing the internet.

Cybercrimes have been menacing social media since its inception. This is manifested in form of fraudulent transactions, hacking, virus attack, cyber defamation and cyber stalking. Even though India has effective laws to deal with these crimes, the conviction rate is negligible. Cyber Forensics is a growing area. It must be promoted to determine methods to detect Cyber Evidence. Further, necessary amendments must be made   in Indian law to be read harmoniously with the IT Act in order to control Cybercrimes.Last but not least it is not the work that plays the ways to success but ALMIGHTY .

 








REFERENCE



  1. Google

  2. Newspaper Cuttings

  3. Brochures

 

 

 

 

 

 

 


Comments

Popular posts from this blog

Internet of Things and its Applications