Haryana

Participants
350

This training was aimed at helping government officials as well as school students in navigating the security threats faced online. We conducted the training in Hindi/English. Training was given on the following modules specifically aimed towards Government officials and students. 

1. Legal Basics:

Privacy and Freedom of Speech and Expression as a Fundamental Right

Reasonable restrictions placed on the Fundamental Rights

2. Data Breaches/Leaks:

De-marking identification and classification of Data and taking appropriate measures to protect it.

3. Data Profiling:

An in-depth look at how a user's internet activity is used to profile their virtual image for targeted attacks.

LEGAL: Legitimate use of Data Profiling and Data Retention, the safeguards around it. Threat Modelling:

4. Threat Modeling:

An exercise, where attendees gain better insight to understand how their digital footprints are tracked and the ways to manage it for safe browsing.

5. Safety Measures:

An instruction manual for users to keep them protected from the harms of the digital realm and developing healthy habits in using digital devices/services.

6. Privacy/Security Tools:

A toolkit developed for users to defend themselves on the internet with respect to their privacy and security.

7. Social Media Security:

Worried that everything you speak or search on social media becomes a targeted ad? This exercise is a walk-through of the privacy settings of different social media platforms/apps

LEGAL: Intermediary Liability and content management laws

8. Encryption:

Saves you from the snooping eyes of the internet by teaching you how to encrypt and protect your devices from external actors

LEGAL: The laws around encryption, how can the government intercept, decrypt and monitor your data.

9. Search and Seizure of Electronic Devices:

When they come knocking, what do you do? This module covers laws, legislation and procedures for Search and Seizure of electronic devices.

10. Online Gender Based Violence:

Navigates the laws and regulations around online gender-based violence. The resources one can take in case of such an occurrence.

11. Spyware and Stalk-ware:

This module covers security practices aimed at teaching early detection of spyware and stalk ware to the audience




Organisations we have worked with