Cyber Law

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, cyber law is the law which is used for stopping computer crime and abuse .

The First cyber crime

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced a loom. The device allowed the repetition of series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Cyber law of Nepal was established on 30th Bhadra , 2061 B.S or 15th September, 2004 A.D

Importance of Cyber law

It is important because it helps to control crime related to internet.

Provision of cyber law of NEPAL

  • It has strong provision for punishment against cyber crime.
  • It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce.
  • It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Areas of Cyber law

  • Computer crime

    It is very common in computer society . The hacking of data is more profitable than robbing a bank . Some destructive brain design computer virus and link to internet for everyone's access . These viruses damage the file system of computers . They also collect important information such as username and passwords and are delivered to the person who created the virus.

    Hacking :Internationally gaining unauthorized access to an important system is known as hacking .

    Cracker :A cracker is a computer user who attempts a break into copyright software or an information system .

  • Telecommunication law

    It is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc. through wires, radio, electric media , optic cables or other electro-magnetic system .

  • Digital signature

    A digital signature is the digital identity of the sender that uniquely identifies the particular sender electronically.

  • Cyber law was established on 30th Bhadra , 2061 B.S for stopping computer crime and abuse.
  • Areas of Cyber law are Computer crime, Telecommunication law, Data protection and Digital signature
  • Telecommunication law is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc . through wires, radio, electric media.

The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner etc. which affects the computer system and other properties is referred as cyber crime.

List of any four cyber crimes are as follows:

  • Unauthorized access to computer systems and networks
  • Email bombing
  • Hacking
  • Cyber-stalking

The effects of computer crime are:

1) Security problems
2) Physical theft of the computers and other devices
3) very less privacy
4) computer virus easily attack software and programs

Digital signature is a security mechanism system in the cyberspace for digital data transformation by attaching a code on the document of electronic records. It uses two keys, one public and another is private, which are used to encrypt and decrypt the messages.

The method of making the data or message unreadable by unauthorized people while transferring through the internet is called encryption. The method of converting encrypted data back into its original form to make understandable to the receiver is known as decryption.
After 2061 the cyber law of Nepal was promulgated and revised in 2063.
It is divided into 12 sections and 80 clauses wit detailed information on role and rights of regulator,certification authority,consumer,government and all the concerned stake holders.
The action and punishment against such crimes will be in the range of a minimum RS.50,000 to maximum RS.3,00,000 in cash and six months to three years imprisonment.
0%
  • Virtual space created by computers networks , internet and telecommunication is called________.

    cyber Space
    cyber Crime
    cyber law
    digital Signature
  • When was cyber law established in Nepal?

    30th Chaitra, 2060 B.S
    30th Bhadra , 2061 B.S
    30th Bhadra, 2060 B.S
    30th Chaitra, 2061 B.S
  • Which of the following does not fall under areas of cyber law?

    Digital Signature
    Telecommunication Law
    Data Protection
    Data Management

  • A __________ is the digital identity of the sender that uniquely identifies the particular sender electronically.

    digital signature
    computer crime
    cyber space
    hacking
  • Which of the following statement is correct for cracker?

    A cracker is virtual space created by computers networks , internet and telecommunication
    A cracker is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc .
    A cracker is a computer user who attempts a break into copyright software or an information system .
    A cracker is internationally gaining unauthorized access to an important system.
  • A generic term that is concern with the legal and regulatory aspect of internet and computer technology is called ______.

    Computer crime


    Copyright law


    Cyber crime


    Cyber law


  • Cyber law encompasses laws relating to _______.

    Digital signature law


    Cyber crime law


    Telecommunication law


    All of them


  • A criminal activity within the information technology infrastructure is ______.

    digital crime


    cyber crime


    cyber law


    intellectual infrastructure


  • The term computer crime refers to _______.

    hacking
    information theft
    plagiarism
    all of them
  • Cyber law of Nepal was enacted in Nepal in _____.

    2064
    2062
    2061
    2063
  • The common name for the crime of stealing password is:

    identity theft
    hacking
    spoofing
    spooling
  • Collecting personal information and effectively posing as another individual is known:

    spoofing
    identity theft
    hacking
    spooling
  • The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium is:

    Digital signature law
    Intellectual property law
    None of them
    Telecommunication law
  • Creating strong computer security to prevent computer crime is :

    antivirus policy
    privacy rights
    personal ethics
    firewall policy
  • Most common tool used to prevent access to a computer system is :

    user login
    access control software
    computer keys
    password
  • Hardware /software designed to guard against unauthorized access to a computer network is known as:

    hacker wall
    firewall
    hacker programs
    anti hacker server
  • Monitoring and implementation of cyber act in Nepal is done by:

    HLCIT
    NITC
    Ministry of technology
    OCCA
  • __________is the moral principal that regulates the use of computers.

    Cyber act
    Cyber crime
    Cyber ethics
    Cyber crime law
  • Property right given for computer software sources code is known as:

    cyber act
    copyright act
    intellectual property act
    digital signature act
  • Fraud that involves copying another persons intellectual property and presenting it as if it is your own ___________.

    hacking
    plagiarism
    all of them
    information theft
  • You scored /20


    Take test again

Any Questions on Cyber Law ?

Please Wait...

Discussions about this note

Forum Time Replies Report
nabin

how is hacking done?