Cyber Law

Subject: Computer Science

Find Your Query


Cyber law was established on 30th Bhadra , 2061 B.S for stopping computer crime and abuse.This note provides an information about cyber law including the introduction to cyber crime , hacking and so on
Cyber Law

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, cyber law is the law which is used for stopping computer crime and abuse .

The First cyber crime

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced a loom. The device allowed the repetition of series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Cyber law of Nepal was established on 30th Bhadra , 2061 B.S or 15th September, 2004 A.D

Importance of Cyber law

It is important because it helps to control crime related to internet.

Provision of cyber law of NEPAL

  • It has strong provision for punishment against cyber crime.
  • It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce.
  • It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Areas of Cyber law

  • Computer crime

    It is very common in computer society . The hacking of data is more profitable than robbing a bank . Some destructive brain design computer virus and link to internet for everyone's access . These viruses damage the file system of computers . They also collect important information such as username and passwords and are delivered to the person who created the virus.

    Hacking :Internationally gaining unauthorized access to an important system is known as hacking .

    Cracker :A cracker is a computer user who attempts a break into copyright software or an information system .

  • Telecommunication law

    It is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc. through wires, radio, electric media , optic cables or other electro-magnetic system .

  • Digital signature

    A digital signature is the digital identity of the sender that uniquely identifies the particular sender electronically.

Things to remember
  • Cyber law was established on 30th Bhadra , 2061 B.S for stopping computer crime and abuse.
  • Areas of Cyber law are Computer crime, Telecommunication law, Data protection and Digital signature
  • Telecommunication law is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc . through wires, radio, electric media.
  • It includes every relationship which established among the people.
  • There can be more than one community in a society. Community smaller than society.
  • It is a network of social relationships which cannot see or touched.
  • common interests and common objectives are not necessary for society.
Videos for Cyber Law
Computers, Internet and New Technology Laws
Computing Ethics & Society
cyber Crime in Nepal
Defining the legal and ethical boundaries at the cyber frontier
Face Book - Main source of Crime in Nepal
The Internet & Ethics
Questions and Answers

The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner etc. which affects the computer system and other properties is referred as cyber crime.

List of any four cyber crimes are as follows:

  • Unauthorized access to computer systems and networks
  • Email bombing
  • Hacking
  • Cyber-stalking

The effects of computer crime are:

1) Security problems
2) Physical theft of the computers and other devices
3) very less privacy
4) computer virus easily attack software and programs

Digital signature is a security mechanism system in the cyberspace for digital data transformation by attaching a code on the document of electronic records. It uses two keys, one public and another is private, which are used to encrypt and decrypt the messages.

The method of making the data or message unreadable by unauthorized people while transferring through the internet is called encryption. The method of converting encrypted data back into its original form to make understandable to the receiver is known as decryption.
After 2061 the cyber law of Nepal was promulgated and revised in 2063.
It is divided into 12 sections and 80 clauses wit detailed information on role and rights of regulator,certification authority,consumer,government and all the concerned stake holders.
The action and punishment against such crimes will be in the range of a minimum RS.50,000 to maximum RS.3,00,000 in cash and six months to three years imprisonment.

© 2019-20 Kullabs. All Rights Reserved.