Safety norms for electronic banking: Book on cyber laws

Cyber Laws.  e-Banking.

This slideshow requires JavaScript.

Internet programming and Cyber Laws book written by Prof. Jyotindra Zaveri – second edition published.

“I have gone through the pages of this learned treatise on Internet programming and cyber law. … Though India woke up much late —- as late as 2000—-when its Parliament passed Information Technology act—-it had the proud privilege of catching up with even the developed countries of the world. Prof.  Zaveri has poured his lifelong scholarship into bringing up this book. I commend this book to all those interested not only in Information Technology but also its legal aspects.”

Prof. D.  G. Kolhatkar, M.A (Eco),  LL-M.   Advocate.  Retired Export Manager,     Philips India Ltd., New Delhi.    23rd July, 2010.

This book is useful for professionals who are planning to use the internet for managing business, as well as for students who are specializing in Information Technology.

Excerpts of the book:

Follow these basic precautions while doing electronic banking:

  • Always access a bank’s internet banking website only by typing the correct website address into the browser.  Never click a link sent in an e-mail that is supposed to link to the bank’s website.  Always type the web address of your bank into the browser space.
  • A spurious link could be a fraudster’s phishing attack designed to collect personal information.  This information is then used for accessing accounts and making unauthorized transfer of funds
  • When in doubt, immediately contact the bank.
  • Always log off completely when you have finished your internet banking activity.  Simply closing the window may not close the banking session
  • If your computer is virus infected, your session may be hijacked by a fraudsters and financial transactions can be made without your knowledge.
  • It is also recommended to disconnect  from the Internet when you are not using it.
  • Never do online banking transactions on a shared or public computer – e.g. Cybercafé.
  • Deploy anti-spy ware, Firewall, Anti-Phishing, Anti-Spam, Piracy protection software.
What is phising?
Phising pronounced ‘fishing’ refers to fishing out sensitive user information such as your credit card number.  • This is done by masquerading (Camouflaged) as a trustworthy entity.  This usually is an email with clickable hyper link.  This email comes to your inbox with a familiar bank name as a disguise.  Example: Say, you have account in ICICI bank.  The email will come as if from ICICI and ask you to click on a link.  This will take you to a similar website (as if it is ICICI bank) and ask you to enter credit card number.
Email such as, million dollar lottery or “want to transfer money to India, my friend, help me” are a sent to get all private information from the recipient.   Never reply such emails.

Educate people:

99% of people by and large think that e-mail address cannot be traced. But if they come to know that almost all the cases, no matter what wrong name they give, what e-mail address they open, they can still be traced. As a result, cyber crime rate will fall.  It is just a matter of education.

Read the book by Mr. Zaveri.  The first part of the book briefly introduces internet programming.  The second part of this book is focusing on the cyber law and cyber crime.  There is a shortage of internet professionals in this area. These chapters discuss briefly the challenges of using internet in our daily life, such as email and banking.   The shortage of cyber law specialists can be filled up by you.   Internet languages are exciting new Web development technologies that have taken the wide world by storm.

This book is written by Prof. Jyotindra Zaveri and published by Tech-Max Publications, Pune, India.

Affordable price Rs.175/-.   Email

%d bloggers like this: