Haryana
This training was aimed at helping government officials as well as school students in navigating the security threats faced online. We conducted the training in Hindi/English. Training was given on the following modules specifically aimed towards Government officials and students.
1. Legal Basics:
Privacy and Freedom of Speech and Expression as a Fundamental Right
Reasonable restrictions placed on the Fundamental Rights
2. Data Breaches/Leaks:
De-marking identification and classification of Data and taking appropriate measures to protect it.
3. Data Profiling:
An in-depth look at how a user's internet activity is used to profile their virtual image for targeted attacks.
LEGAL: Legitimate use of Data Profiling and Data Retention, the safeguards around it. Threat Modelling:
4. Threat Modeling:
An exercise, where attendees gain better insight to understand how their digital footprints are tracked and the ways to manage it for safe browsing.
5. Safety Measures:
An instruction manual for users to keep them protected from the harms of the digital realm and developing healthy habits in using digital devices/services.
6. Privacy/Security Tools:
A toolkit developed for users to defend themselves on the internet with respect to their privacy and security.
7. Social Media Security:
Worried that everything you speak or search on social media becomes a targeted ad? This exercise is a walk-through of the privacy settings of different social media platforms/apps
LEGAL: Intermediary Liability and content management laws
8. Encryption:
Saves you from the snooping eyes of the internet by teaching you how to encrypt and protect your devices from external actors
LEGAL: The laws around encryption, how can the government intercept, decrypt and monitor your data.
9. Search and Seizure of Electronic Devices:
When they come knocking, what do you do? This module covers laws, legislation and procedures for Search and Seizure of electronic devices.
10. Online Gender Based Violence:
Navigates the laws and regulations around online gender-based violence. The resources one can take in case of such an occurrence.
11. Spyware and Stalk-ware:
This module covers security practices aimed at teaching early detection of spyware and stalk ware to the audience