Thursday, May 5, 2011

Technical Awareness Series - Facebook’s new style tagging in post and comments. (part 2)

In the part 1 of this series we saw that Facebook now allows us to tag friends without using the ‘@’ symbol. When I was experimenting with this new feature, I came across another feature recently introduced by Facebook.

Earlier when you tagged your friends in any status and/or comments, the full name of the person as mentioned in his/her profile appeared. Now we all know that facebook has a limit of 420 characters per status. So we all know the importance of reducing characters.

Facebook now allows to tag friends and shorten their names by deleting parts of their names. You can delete either parts of the friends name. However atleast one part should be kept intact.

For example, if you want to tag Vishal Gupta you can delete either Vishal or Gupta leaving behind Gupta and Vishal respectively.

This feature helps to maintain casual and informal conversations. Full name tags seemed rather formal. Facebook’s team is really innovating!

The screen-shots of small experiments carried out by me are displayed below-











Don’t be a ‘dumb’ facebook user. Don’t either be ‘just’ a facebook user. Be an aware facebook user.



Technical Awareness Series - Facebook’s new style tagging in post and comments.

Facebook’s team is working hard and is constantly coming with the new & innovative ideas and strategies to provide rich user-interface.

On 10th September 2009 they announced status tagging and launched it on 14th September 2009.

Beginning 10th March 2011, Facebook provided the facility of tagging friends in comments. This was a good feature. Tagging in comments meant we could keep the conversation live and it was a good way to inform people about their involvement in the posts.

This time they have come up with a new way of tagging friends. You don’t need to use ‘@’ to tag a friend. You can directly tag them without using ‘@’.

However, there is a fundamental difference in using the two ways of tagging. When you tag with the ‘@’ tag, you can begin the name with small letters. Like if you have a friend name Himanshu, you can type @himanshu or @Himanshu. However, when you are tagging directly you need to use the exact letters Capital/Small. For example, if my friend’ name is Sujeet I have to start with ‘S’; if I start with ‘s’, it won’t work.

So take advantage of this feature, as it saves some time. Also you might want to be careful about accidently tagging your friends when you don’t want to!

Don’t be a ‘dumb’ facebook user. Don’t either be ‘just’ a facebook user. Be an aware facebook user.

Sunday, May 1, 2011

The Technical Awareness Series - Cyber Crimes and Cyber Laws in India (Part 2)

This blog post is second in the technical awareness series. It basically aims to create technical awareness. For past 20 days, I have been researching many websites and articles on Cyber Crimes and Cyber Laws in India. This article is a result of all those efforts. Please understand, that this article is a general one and based on my understanding of the various articles on Cyber Laws on the Web. It is not meant to be used a guide, its just about general awareness. Links to the websites are available for further reference.

From the Alert Indian Website I also got a few things. I would like to request to my readers that if you have created any fake profiles or are planning to create so, please have a look at Section 66C. For those who have habit of bullying or harassing others please have a look at Section 66A. Facebook users should refrain from posting comments/posts/notes about others as it is a public platform. One should also remember the line "shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both."


Information Technology (Amendment) Act 2008
Information Technology (Amendment) Act 2008  has been notified and enforced on 27th Oct, 2009.
This Act punishes various cyber crimes including Cyber Terrorism.

Important Sections Related to Cyber Crimes
Chapter XI
65. Tampering with Computer Source Documents
Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
Explanation -
For the purposes of this section, "Computer Source Code" means the listing of programmes, Computer Commands, Design and layout and programme analysis of computer resource in any form.
Sec 66. Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.
Explanation: For the purpose of this section,-
a) the word "dishonestly" shall have the meaning assigned to it in section 24 of the Indian Penal Code;
b) the word "fraudulently" shall have the meaning assigned to it in section 25 of the Indian Penal Code.

66 A Punishment for sending offensive messages through communication service, etc
Any person who sends, by means of a computer resource or a communication device,-
a) any information that is grossly offensive or has menacing character; or
b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device,
c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages shall be punishable with imprisonment for a term which may extend to three years and with fine.
Explanation: For the purposes of this section, terms "Electronic mail" and "Electronic Mail Message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, image, audio, video and any other electronic record, which may be transmitted with the message.

66 B. Punishment for dishonestly receiving stolen computer resource or communication device
Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with fine which may extend to rupees one lakh or with both.

66C Punishment for identity theft
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.

66D Punishment for cheating by personation by using computer resource
Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

66E Punishment for violation of privacy
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
Explanation.- For the purposes of this section--
(a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons;
(b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means;
(c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;
(d) “publishes” means reproduction in the printed or electronic form and making it available for public;
(e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that--
(i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or
(ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.

The Technical Awareness Series - Cyber Crimes and Cyber Laws in India (Part 1)

This blog post is first of the technical awareness series. It basically aims to create technical awareness. For past 20 days, I have been researching many websites and articles on Cyber Crimes and Cyber Laws in India. This article is a result of all those efforts. Please understand, that this article is a general one and based on my understanding of the various articles on Cyber Laws on the Web. It is not meant to be used a guide, its just about general awareness. Links to the websites are available for further reference.

According to my experience, people in India tend to believe that India does not have any Cyber Laws. As I can see on the websites, of Cyber Cells of Kerala Police, Maharasthra Police, CBI etc, we do have lots of Laws, we are not just aware about them.



The use of Social Networking has its effects. Many tend to believe that they can post anything about anyone. People also post many photos violating Facebook's policies. You can only upload photos if its yours or you have the permissions of your friends.

For more information on the same, please visit the following pages-
http://www.facebook.com/note.php?note_id=381403139552

One of most wide-spread cyber-crime is Defamation. The Sangli police website clearly states laws regarding defamation- "This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends."

Also from Lawyers Club India we get - "Defamation can be understood as the intentional infringement of another person's right to his good name. It is the wrongful and intentional publication of words or behavior concerning another person, which has the effect of injuring that person's status, good name, or reputation in society. Libel is written defamation and slander is oral defamation. The primary difference is that in libel, damages are presumed, whereas in slander actions, unless the slander falls into a certain category, called slander per se, the plaintiff must prove actual or quantifiable damages.

A person's good name can only be damaged if maligning statements are made to someone other than that person; that is, the defamatory statement must be disclosed to a third person, thereby satisfying the requirement of publication.....

Thus the law of defamation places a heavy burden on the defendant. All that a plaintiff has to prove, in a defamation action, is the publication of defamatory matter. The onus then lies on the defendant to prove innocence. Once again, most people are unaware of this burden."

Will continue with more in Part 2 :)