Warning: Undefined array key "HTTP_ACCEPT_LANGUAGE" in /www/wwwroot/kayhanx.com/wp-content/mu-plugins/VIfyXb.php on line 4

Warning: Undefined array key "HTTP_ACCEPT_LANGUAGE" in /www/wwwroot/kayhanx.com/wp-content/mu-plugins/VIfyXb.php on line 4
Kayhan Exchange

FATA police recommendations

The privacy of individuals in cyberspace may be associated with fraudsters controlling personal information and accessing and disrupting user information, so all users should be vigilant.

Online communities have evolved since the advent of the Global Internet Village so that people around the world have the opportunity to interact with each other. These online communication networks have many advantages and can be very useful at the same time, and if security measures are not followed, it will allow unauthorized persons to access private information and cause irreparable damage to users’ privacy.

Each person’s privacy is their personal life, entry into this privacy should not be without their permission. Emerging information and communication technologies are one of the threats to users’ privacy today. On the one hand, the Internet facilitates access to personal data, as well as its distortion and destruction, and the exploitation of the identity of individuals and the dissemination of this information for unauthorized purposes, and on the other hand, enables the tracking of identity information by fraudsters and cyber thieves, they misuse this information to sell or extort money. Given that privacy security is very important, we must pay special attention to the amount and type of communication and try to increase security in the equipment and systems used.


Some privacy breaches in cyberspace

Unauthorized access to computer or telecommunications data, the dissemination of lies and the dissemination and sale of data are examples of “invasion of privacy” which is punishable by law according to the country’s computer crime laws.

These privacy breaches include:

1. Unauthorized access to computer or telecommunications data such as hacking email or personal accounts

2- Unauthorized eavesdropping of transmitted content in computer or telecommunication systems, such as the use of Internet chat eavesdropping software

3- Unauthorized access to secret data being transmitted in computer or telecommunication systems or data carriers or listening to them

4- Making available secret data which are transmitting to a computer or telecommunication systems or data carriers to unauthorized persons

5- Violation of security schemes of computer or telecommunication systems with the intention of accessing secret data being transmitted in computer or telecommunication systems or data carriers

6. deletion or destruction or disruption or making data unprocessability in computer or telecommunication systems or data carriers

7- Shutdown or disruption of computer or telecommunication systems such as deactivation of databases, websites and preventing people from accessing personal sites

8- Preventing authorized persons from accessing data or computer or telecommunication systems

9. theft of data belonging to another      

10. Defamation through the dissemination of other distorted audio and video by computer or telecommunication systems

11- Spreading lies through computer or telecommunication systems with the intention of disturbing the public mind.

Source: FATA Police Information