C M Announcements Monitoring System
Toggle navigation
Home
How to use Hindi
Screen Reader Access
Important Links
Government of India
Haryana Goverment
National Informatics Center
Sign In
Click 'Sign In' to start
Forgot Password
News
Respect other privacy online
|
Always follow ethical practices while using internet
|
Ensure to be polite and kind while interacting online
|
Ensure to have policies in place for email and internet usage
|
Never engage in unauthorized access to others' email accounts
|
Do not misuse other mail box
|
Ensure to use of computers by strictly following ethical practices
|
Use your digital devices / gadgets for good
|
Do not use copyrighted software whitout the permission of copyright holder
|
Consult your authorities when unsure about permissible use of a software product
|
Be aware of copyright
|
Do not access unauthorized computer resources
|
Check CERT-In advisories on a regular basis
|
Ensure to guide and supervise children while they use internet
|
Never snoop around in others' computer files
|
Ensure to change your passwords regularly
|
Follow safe online practices and protect yourself from internet attacks
|
Do not share your personal information with strangers
|
Naver share your organization's sensitive information over internet
|
Ensure to report any unauthorized access of computer resources / online services to the appropriate authorities
|
Secure your internet connectivity with strong password
|
Educate and help your family be safe online
|
Never upload sensitive files over internet
|
Ensure reporting to appropriate authorities any loss or theft of digital device / gadget
|
Avoid interacting with strangers online
|
Naver meet online friends in person without family permission
|
Avoid using bad language and never misbehave while interacting online
|
Do not download files sent by strangers while interacting online
|
Read the 'Terms and Conditions carefully before proceeding online
|
Never download files with double extension/ misleading file names especially from strangers
|
Ensure to take regular backup of valuable data to avoid data loss due to malware attacks
|
Do not open emails received from unknown sources
|
Never share sensitive and personal details like passwoed/ credit card/ debit card details to anyone
|
Enable spam filter for email
|
Always scan downloaded file irrespective of life type with updated antivirus before using
|
Report spam emails, harassment and stalking kind of security incidents to concerned auhorities
|
Monitor your child's online activities through parental control software
|
Ensure to enacle browser security settings to block pop-ups and also uncheck auto execution of downloaded software
|
Enable multi-factor authentication along with strong password for your online accounts
|
Educate yourself and practice safe internet usage guidelines
|
Never forward chain messages. Break the chain
|
Never download executable files such as .vbs, .shs, .pif etc., recevied over email or chat box
|
Ensure to check the 'view file name extensions' option to have visibility of type of files under a given folder
|
Do not publish your whereabouts on social media platforms
|
Never open files with double extension such as bmp.exe.exe.doc and so on
|
Beware of malicious attachments with file names such as porno.exe, Nude.exe and so on
|
Know the signs of malware affected computer and disconnect/ unplug immediately
|
Do not click weblinks in email messages, perfer to type them in beowser
|
Report suspicious emails to concerned authorities without opening attachments
|
Ensure t use legitimate and secured websites for email / to perform financial transactions
|
Ensure the search engine security settings for safe search results
|
Be careful while uploading personal pictures over social media. Once uploaded it can never be deleted
|
Beware of fake/ scam phishing messages
|
Beware of phishing e-mails
|
Delete suspicious emails without opening/ forwarding
|
Beware of phishing and fraud messages
|
Regularly check and empty your spam folder
|
Beware of fake news, Break the chain
|
Beware of online requests for personal information. Think before you act
|
Remember to close all other unused applications before performing any online financial transactions
|
Ensure to shred sensitive documents immediately after use
|
Ensure to read privacy policy before choosing "accept and agree"
|
Use trusted and secured websites which has https:// with lock symbol in URL
|
Ensure https:// in URL for all online transactions
|
Always type the URL instead of clicking on links
|
Ensure to regularly update / patch your web browser
|
Never share your personal / sensitive infprmation online
|
Never click links received through emails or messaging software to evade landing on fraudulent sites
|
Ensure "block popup windows" is enabled in your browser settings
|
Ensure to disable "remember / save passwords" option In your browser settings
|
Ensure to clear browsing history after using piblic computers
|
Close the popup window using 'X' mark at the top right corner and not by clicking any buttons on window
|
Beware of software that are available for free
|
Avoid unknown links that offer anti-virus or anti-spyware services online
|
Ayways check the authenticity of the person before accepting friend requests online
|
Do not install unauthorized software
|
Ensure that auto updates are happening regularly for your anti-virus software
|
Use trusted and authentic websites for downloading any software
|
Be cautions while downloading any software received through email attachment
|
Check the validity of the certificate for a website and its issuer before proceeding with downloads
|
Beware of the files recevied through Bluetooth
|
Activate safe search in your browser settings
|
Beware of posting critical personal information while accessing online services
|
Remember to track and unsubscribe unwanted online services which have auto renewals enabled
|
Avoid using currency symbols in text based emails, instead use three-letter currency indicators like ( USD,INR) to avoid spam filters
|
Always perfer the maximum key size supported for encryption by access point
|
Avoid sending sensitive data in emails
|
Ensure to check security certificate details of website while carrying out critical transactions
|
Never reply to lottery e-mails
|
Use strong passwoeds and never share them
|
Ensure using different passwords for different online services
|
Avoid saving credit details while shopping online
|
Ensure to read vendor's privacy policy to be aware of how your personal data will be used
|
Ensure to keep your billing and shipping address same for high-value items ordered online
|
Ensure having security with https:// for websites while doing online payments
|
Avoid doing financial transactions by clicking links recevied through emails
|
Before proceeding with online shopping ensure to read the disclosure and privacy policy of website
|
Ensure to enable and use two factor Authentication for financial websites
|
Always memorize your PIN and do not write down anywhere
|
Ensure having https:// with lock symbol in URL in securing your credentials used online
|
Never leave your computer unattended when logged in to any internet banking site
|
Ensure to regulary verify your bank statements to act early in case of any fraudulent transaction
|
Prefer using separate credit card with lower limit for online transactions
|
Do not reveal your CVV number which is behind credit card/ debit card
|
always properly logout after completing online transactions
|
Never access other websites while performing online transctions
|
Ensure to properlt shred the printout of the account statement accessed at the ATM to avoid any misuse
|
Never respond to emails requesting for your personal / account information on any pretext
|
Ensure to properly destroy the magnetic stripe of the bank card once it expires
|
Protect your personal computer from viruses and other mailicious programs using antivirus software
|
Avoid using PIN numbers that match your personal information as they can be easily guesses by hackers
|
In case of theft or loss of credit card, immediarely block the card and inform the concerned authority
|
Never disclose PIN or other bank account related information to anyone
|
Never send credit card number, CVV, PIN or other sensitive details through e-mail
|
Ensure to take proper care while typing Password / PIN to protect from shoulder surfers
|
Never leave your credit / debit cards unattended and always keep an eye when shared for swiping
|
Always ensure to take your credit / debit card back after completing the payment
|
For safer internet banking, use virtual keyboards
|
Never take assistance from strangers for internet banking
|
Never use unprotected / public computer for internet banking
|
Ensure to use strong passwords that are difficult to guess and change them regularly
|
Update your browser to latest version for safe and secure online transactions
|
Make it a habit to always remember your password and do not write down anywhere
|
Ensure to change your passwords at regular intervals
|
Avoid writing down passwords or saving them on your computer / email
|
Ensure to change your password immediately in case it has been revealed accidentally to someone
|
Avoid using the same password for different accounts
|
Beware of shoulder surfing while entering your PIN at an ATM
|
Your brain is the best place to store your passwords
|
Do not reveal your passwords to anyone. Not even to your system administrator / family member
|
Always use encryption utility to securely store senitive data on your computer
|
Avoid using personal details such as name, birthplace, surname and so on while creating a password
|
Never send a password by email, instant message, or any other means of communication
|
Aviod using dictionary words as a password
|
The stronger your password, the more secure your information
|
Be sure that you don't use personal identifiers in your password
|
Use a passphrase for creating a strong password that is easy to remember but difficult to guess
|
Never share your passwords or account related information with anyone
|
Ensure to monitor your account regularly for any suspicious activity to take immediate action
|
Never save your passwords in the web browser as they can be misused
|
Run a virus scan before launching any program on your device to safeguard from virus infection
|
Use a password that is easy for you to remember and hard for others to guess
|
Ensure that s password has a minimum of 12 to 16 characters
|
Avoid using public / open Wi-Fi for accessing sensitive accounts by typing in password and PINs
|
Never reveal paeewords on forums / blogs / social networking sites
|
Ensure to never mention your passwords to others
|
Don't write down your password and leave it near your computer
|
Secure your computer with BIOS/ UEFI password
|
Disable the auto login facility in your computer
|
Never reuse your old passwords
|
Always clear the temporary files/ browsing histroy in your browser after usage
|
Password is secret key and it is personal, so protect it
|
Do not get trapped by email phishing frauds
|
Ensure visited website is secure ( https:// ) before sharing personal informatiion
|
Share or tear documents with sensitive information before disposal
|
Never store busniess data on personal drives. Always use organization's storage
|
Use only known, trusted and secure websites while sharing sensitive information
|
Never respond to calls seeking sensitive information
|
Avoid filling forms received from unknown sources
|
Never click web links received through e-mails. Copy & paste/ type the URL in the address bar to view it
|
Always scan email attachments before use
|
Configure email client by enabling security features
|
Beware of fraudulent websites that leak personal information
|
Strictly adhere to email policy of your organization
|
Avoid clicking suspicious links
|
Be alert of any urgent requests for personal information
|
Never enter your personal infromation in a popup screen
|
Be aware …. Phishing can happen through a phone call too!!
|
Ensure to safeguard your identity and sensitive details while online
|
It is always a best practice to ensure email communication is encrypted
|
Do not open / forward link /attachments of unsolicited emails
|
Disable web browser from auto display of pdf / image files
|
Beware of popuos luring you with gifts
|
Be cautious while using public Wi-Fi hotspots
|
Do not access sensitive information from an unsecured network / computer
|
Clear browser history after using any public computer
|
Keep your web browser set to its highest security level
|
Be aware of fake anti-virus popup alert scams
|
Always use Alt+F4 or 'X' symbol to close popup message windows
|
Spread yiur web activity across different browsers for better privacy
|
Beware of spam emails
|
Never forward chain messages to avoid spam
|
Do not trust all that you view online
|
Do read the privacy policy of websites and online services you visit
|
Educate children on safe and secure internet usage practices
|
Exercise parental controls to ensure online safety of children
|
Be cautious while sharing sensitive information on public hotspots and computers
|
Always keep your antivirus updated
|
Beware of shoulder surfing in public places
|
Ensure to scan the downloaded files before use
|
Enable macro security settings in all document files
|
Secure your computer using antivirus solution with regular updateds
|
Ensure Operating system is updated with latest patches
|
Disable auto preview options on your mail clinets
|
Do not open or run an executable program received through unverifies source
|
Looks out for symptoms like system slowdown… it could be a malware attack
|
Disconnect an infected machine immaediately from the network
|
Enable desktop firewall to permit legitimate communication only
|
Watch out for spam instant messages ( SPIM )
|
Do not open attachments received from unknown sources
|
Always scan the external storage devices ( pendrives, harddisks…) before use
|
Switch off the internet modem when not is use
|
Verify system security settings regulary
|
Be aware of internet etiquette
|
Regularly check for inintended software installations on your system
|
Manage cookies for effective data protection
|
Avoid sharing personal details while using chat rooms
|
When online, do not share your personal images with strangers
|
Avoid clicking on links / transfer of files while chatting online
|
On receipt of inappropriate online messages report to concerned authority or inform parents
|
always save online conversations for future reference
|
Never agree to personally meet someone you only got to know online
|
While online, value the privacy of other users
|
Be cautionus while posting photos online
|
Avoid interacting with strangers while chatting online
|
Restrict access to sensitive information using apporopriate privacy settings on whatsapp
|
Never oen your whatsapp web on organization's computers / laptops
|
Be cautious while using external devices to share files
|
Ensure to take backup of all important documents and data
|
Always maintain backup of critical data to ensure availability in case of computer issues
|
Ensure continuous power with uninterruptable power supply (UPS) to prevent data loss / system damage
|
Safeguard your data with appropriate security measures
|
Verify and validate your critical documents / data at regular intervals
|
Regularly delete obsolate documents and data from your system / storage devices
|
Share unwanted hard copies of documents with sensitive personal information before disposal
|
Ensure protected access of sensitive data stored on external storage devices
|
Ensure protection of sensitive documents / data stored on portable storage devices
|
Maintain multiple copies of critical documents / data backup on different storage devices
|
Backup your data regularly as per the organization backup policy
|
Ensure secure disposal of data before recycling storage devices
|
Be judicious in posting personal information online
|
Ensure to securely erase unwanted sensitive data
|
Make a boot CD / flash drive in case your computer in compromised
|
Ensure to enforce right kind of mechanisms for databackup and restoration
|
Connect your computer to the internet only when needed
|
Be aware of latest online scams and frauds
|
Be cautions while clicking on weblinks / URLs
|
Ensure operating system is patched with the latest updates
|
Configure operating system to display file extensions
|
Ensure that desktop fire firewall is always enabled
|
Trun off your computer when not in use
|
Always check if the downloaded file / software is safe before using it
|
Be aware that your computer can be used to attack other connected computers
|
Be aware of dangers of posting personal pictures online
|
Do read the user license agreement of software, before you install it
|
Use computer locks to secure your computer resources
|
Use computer hard locks to prevent unauthorized system boot
|
Set a BIOS password to prevent unauthorized system manipulation
|
Place computers in dust-free and well-ventilated setting to avoid overheating
|
Do not leave your PC/ Laptop unattended
|
Beware of shoulder surfing
|
Enable secure boot to protect from malware infections at boot-up
|
Never leave a logged in email account unattended
|
Regularly delete unwanted/ obsolete emails from your mailbox
|
Configure your desktop firewall effectivaly
|
Always keep your antivirus software updated
|
Secure personal gadgets ( Mobile/ Tablets) from unauthorizes access
|
Regularly check installed computer programs to avoid sudden system slow down
|
Secure your wireless communiaction with strong user authentication
|
Do properly lable the computer / laptop for easy identification
|
Always maintain an updated version of PDF Reader
|
Regularly delete temporary files to avoid misuse of personal information
|
Regularly update mobile with latest software patches
|
Ensure to share vital security tips with colleagues and friends
|
Never install unknown or unsolicited software
|
Be cautious while using online file sharing software
|
Delete unsolicited e-mails after informing appropriate authorities
|
Avoid sharing sensitive information while using public Computers
|
Aviod charging devices using public cables
|
Always enable pop-up blocker on browser for security
|
Immediately disconnect infected computers from internet
|
Shop only at trusted e-commerce websites
|
Replace obsolete / old systems regularly
|
Report cybercrimes at www.cybercrime.gov.in
|
Monitor online accounts regularly to identify fraudulent transactions if any
|
Ensure to run anti-virus scan before executing any program on your PC
|
Enable sdesktop firewall for effective protection against remote spyware installation
|
Enable Bluetooth only when needed
|
Use Blutooth in a hidden / non-discoverable mode
|
Set a strong PIN for pairing Bluetooth devices
|
Avoid accepting unknown bluetooth pairing requests
|
Monitor paired Bluetooth devices to avoid unauthorized usage
|
Never postpone or delay the mobile device firmware updates
|
Trun off Bluetooth when not in use
|
Ensure secure configuration of all Bluetooth connections
|
Disable auto download of graphics in HTML email
|
Disable booting from external media in PC and enable BIOS password
|
Beware of social engineering attacks on wireless devices
|
Avoid pairing Bluetooth in public places, especially for the first time
|
Set a strong alphanumeric PIN to secure wireless devices
|
Regularly check security settings of your Bluetooth devices
|
Ensure to change default credentials of your Wi-Fi router
|
Do enable strong encryption option s in Wi-Fi router
|
Ensure to change defauit SSID in access point and routers
|
Enable MAC address filtering on Wi-Fi devices
|
Always disable SSID broadcasting in wireless access point
|
Disable auto-connect while use open Wi-Fi networks
|
Control / Whitelist the devices that can connect to your Wi-Fi Router
|
Encrypt sensitive data while using wireless networks
|
Set Security best practices and follow to safeguard your PC
|
Trun off wireless networks when not in use
|
Enable desktop firewall while using wireless networks
|
Keep your wireless devices updated with latest patches
|
Regularly change PIN on your mobile devices
|
Be cautious while using handheld devices in public places
|
Use Bluetooth in invisible mode / trun off unless its required to connect with known devices
|
Delete the MMS (Multimedia Messaging Services) message received from unknown users without opening them
|
Ensure to encrypt the contents of USB flash drive for better data security
|
Maintain separate USB storage devices for office use and for personal use
|
Never connect or use unknown USB Devices / Pen Drives
|
Ensure to lock / Iogout your computer while you are away
|
Do not leave your computer in logged in mode
|
Do not leave your online accounts logged in unattenede
|
Ensure to properly read your mobile phone's security settings and enable them appropriately
|
Set a PIN / Password for your mobile, that is easy to remember but difficult to guess
|
Utilize the restriction and call baring supplementary services provided by mobile operators
|
Avoid storing sensitive personal data in the mobile, which can be misused if it falls prey to fraudsters
|
Note down and keep the international Mobile Equipment identity (IMEI) number safely to help tracing the mobile phone if stolen
|
Define and monitor trusted devices to connect your mobile phone and laptop through Bluetooth
|
Be aware that even smart phones need anti-virus software
|
Never open e-mail attachments in mobile devices received from unknown persons
|
Always have "pop-up block" enabled in your browser
|
Remember to backup your data before doing any hardware troubleshooting
|
Educate your family members on the malware issues and security malware to be taken if a device is infected
|
Never share your mobile device with strangers
|
Your password / PIN is considered secure until thry are in your memory and not noted paper or device
|
Disable auto download / open feature in computer / mobile devices
|
Always allow auto update of Anti-Malware software
|
Enable mobile device auto lock when it is idle
|
Never install unknown / unsolicited software on your digital devices
|
Avoid accessing sites with questionable content, as it often results in spam or spreading virus
|
Ensure to secure your laptop with cable lock to prevent theft
|
Cite your sources and paraphrase on your own to avoid plagiarism
|
Never keep any of your sensitive documents or data on your desktop
|
Never use pirated software
|
Always close all other open windows / applications while initiating any online transaction
|
Remember to logout after you finish accessing your email account
|
Do not open an email attachment that has objectionable or unexpected subject line
|
Ignore and delete all chain / junk emails from your inbox
|
Never download any files received from strangers
|
Passwords are your personal keys, always protect them
|
Beware of Skimmers and Shimmers
|
Remember to report immediately suspicious system behaviors to concerned authorities
|
Limit your email assress exposure and enable spam filters
|
Avoid clicking 'unsubscribe' or 'remove link' options which may lead to malicious websites
|
Avoid using personally identifiable information while creating email
|
Perfer using contact form in your website instead of publishing email address
|
Always ensure to delete spam emails without repling and also block the sender
|
To avoid spam, perfer using [dot] and [at ] as part of domain name while publishing email address
|
Monitor your server and firewall logs regularly for suspicious access attempts
|
Remove USB storage devices / pen drive from your computer when you are away
|
Protect your sensitive documents and portable storage devices physically by storing them securely
|
Ensure to use different passwords for different accounts
|
Delete or disable unnecessary or guest user accounts on your system
|
Always protect your backup media / devices
|
Regularly take backup and keep storage devices securely at a different location
|
Never disclose your password over phone or by any other means to anyone
|
Ensure to close your tampered accounts to prevent identity theft
|
Always be vigilant while online and any insecure activities that can cost you financially
|
Always use secure communication while carrying out financial transactions
|
Be aware of peer to peer network risks and obligations
|
Ensure that your transaction has ended completely before leaving an ATM center
|
Beware of hardware and software keyloggers
|
Be aware and comply with IT Law
|
Beware of external cables / devices connected to swiping machines
|
KINDLY CHANGE YOUR PASSWORD PERIODICALLY AS IT GETS EXPIRED IN 90 DAYS
|
IF YOU HAVE ANY QUERIES , PLEASE CONTACT - cm.announcement-hry@nic.in
|
HARYANA- ALWAYS AHEAD
|
WOMEN EMPOWERMENT
|
STRENGTHENED PANCHAYATI RAJ SYSTEM-DEVELOPED VILLAGES
|
No 1 HARYANA
|
Skip Navigation Links
Menu
:
Important Links
English (India)
Hindi (India)
Urdu (PK)
Gujarati (India)
Kannada (India)
Konkani (India)
Marathi (India)
Punjabi (India)
Sanskrit (India)
Tamil (India)
Telugu (India)
Government of India
Haryana Goverment
National Informatics Center