Videos Related with Cyber Law

Note on Cyber Law

  • Note
  • Things to remember
  • Videos
  • Exercise
  • Quiz

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, cyber law is the law which is used for stopping computer crime and abuse .

The First cyber crime

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced a loom. The device allowed the repetition of series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Cyber law of Nepal was established on 30th Bhadra , 2061 B.S or 15th September, 2004 A.D

Importance of Cyber law

It is important because it helps to control crime related to internet.

Provision of cyber law of NEPAL

  • It has strong provision for punishment against cyber crime.
  • It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce.
  • It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Areas of Cyber law

  • Computer crime

    It is very common in computer society . The hacking of data is more profitable than robbing a bank . Some destructive brain design computer virus and link to internet for everyone's access . These viruses damage the file system of computers . They also collect important information such as username and passwords and are delivered to the person who created the virus.

    Hacking :Internationally gaining unauthorized access to an important system is known as hacking .

    Cracker :A cracker is a computer user who attempts a break into copyright software or an information system .

  • Telecommunication law

    It is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc. through wires, radio, electric media , optic cables or other electro-magnetic system .

  • Digital signature

    A digital signature is the digital identity of the sender that uniquely identifies the particular sender electronically.

  • Cyber law was established on 30th Bhadra , 2061 B.S for stopping computer crime and abuse.
  • Areas of Cyber law are Computer crime, Telecommunication law, Data protection and Digital signature
  • Telecommunication law is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc . through wires, radio, electric media.
.

Very Short Questions

The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner etc. which affects the computer system and other properties is referred as cyber crime.

List of any four cyber crimes are as follows:

  • Unauthorized access to computer systems and networks
  • Email bombing
  • Hacking
  • Cyber-stalking

The effects of computer crime are:

1) Security problems
2) Physical theft of the computers and other devices
3) very less privacy
4) computer virus easily attack software and programs

Digital signature is a security mechanism system in the cyberspace for digital data transformation by attaching a code on the document of electronic records. It uses two keys, one public and another is private, which are used to encrypt and decrypt the messages.

The method of making the data or message unreadable by unauthorized people while transferring through the internet is called encryption. The method of converting encrypted data back into its original form to make understandable to the receiver is known as decryption.

After 2061 the cyber law of Nepal was promulgated and revised in 2063.

It is divided into 12 sections and 80 clauses wit detailed information on role and rights of regulator,certification authority,consumer,government and all the concerned stake holders.

The action and punishment against such crimes will be in the range of a minimum RS.50,000 to maximum RS.3,00,000 in cash and six months to three years imprisonment.

0%
  • Virtual space created by computers networks , internet and telecommunication is called________.

    digital Signature
    cyber Space
    cyber Crime
    cyber law
  • When was cyber law established in Nepal?

    30th Chaitra, 2061 B.S
    30th Bhadra, 2060 B.S
    30th Chaitra, 2060 B.S
    30th Bhadra , 2061 B.S
  • Which of the following does not fall under areas of cyber law?

    Data Management

    Digital Signature
    Telecommunication Law
    Data Protection
  • A __________ is the digital identity of the sender that uniquely identifies the particular sender electronically.

    cyber space
    computer crime
    hacking
    digital signature
  • Which of the following statement is correct for cracker?

    A cracker is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc .
    A cracker is virtual space created by computers networks , internet and telecommunication
    A cracker is a computer user who attempts a break into copyright software or an information system .
    A cracker is internationally gaining unauthorized access to an important system.
  • A generic term that is concern with the legal and regulatory aspect of internet and computer technology is called ______.

    Cyber law


    Cyber crime


    Copyright law


    Computer crime


  • Cyber law encompasses laws relating to _______.

    Cyber crime law


    Telecommunication law


    Digital signature law


    All of them


  • A criminal activity within the information technology infrastructure is ______.

    cyber crime


    digital crime


    intellectual infrastructure


    cyber law


  • The term computer crime refers to _______.

    plagiarism
    hacking
    information theft
    all of them
  • Cyber law of Nepal was enacted in Nepal in _____.

    2064
    2063
    2062
    2061
  • The common name for the crime of stealing password is:

    spooling
    spoofing
    hacking
    identity theft
  • Collecting personal information and effectively posing as another individual is known:

    spoofing
    hacking
    identity theft
    spooling
  • The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium is:

    None of them
    Digital signature law
    Telecommunication law
    Intellectual property law
  • Creating strong computer security to prevent computer crime is :

    firewall policy
    privacy rights
    antivirus policy
    personal ethics
  • Most common tool used to prevent access to a computer system is :

    access control software
    password
    user login
    computer keys
  • Hardware /software designed to guard against unauthorized access to a computer network is known as:

    firewall
    hacker wall
    anti hacker server
    hacker programs
  • Monitoring and implementation of cyber act in Nepal is done by:

    HLCIT
    OCCA
    NITC
    Ministry of technology
  • __________is the moral principal that regulates the use of computers.

    Cyber ethics
    Cyber crime
    Cyber act
    Cyber crime law
  • Property right given for computer software sources code is known as:

    copyright act
    intellectual property act
    digital signature act
    cyber act
  • Fraud that involves copying another persons intellectual property and presenting it as if it is your own ___________.

    hacking
    all of them
    information theft
    plagiarism
  • You scored /20


    Take test again

DISCUSSIONS ABOUT THIS NOTE

You must login to reply

Forum Time Replies Report


You must login to reply

hacking

what is the punishment


You must login to reply

Cyber law

Cyber law


You must login to reply