Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, cyber law is the law which is used for stopping computer crime and abuse .
The First cyber crime
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced a loom. The device allowed the repetition of series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
Cyber law of Nepal was established on 30th Bhadra , 2061 B.S or 15th September, 2004 A.D
Importance of Cyber law
It is important because it helps to control crime related to internet.
Provision of cyber law of NEPAL
- It has strong provision for punishment against cyber crime.
- It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce.
- It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).
Areas of Cyber law
It is very common in computer society . The hacking of data is more profitable than robbing a bank . Some destructive brain design computer virus and link to internet for everyone's access . These viruses damage the file system of computers . They also collect important information such as username and passwords and are delivered to the person who created the virus.
Hacking :Internationally gaining unauthorized access to an important system is known as hacking .
Cracker :A cracker is a computer user who attempts a break into copyright software or an information system .
It is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc. through wires, radio, electric media , optic cables or other electro-magnetic system .
A digital signature is the digital identity of the sender that uniquely identifies the particular sender electronically.
- Cyber law was established on 30th Bhadra , 2061 B.S for stopping computer crime and abuse.
- Areas of Cyber law are Computer crime, Telecommunication law, Data protection and Digital signature
- Telecommunication law is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc . through wires, radio, electric media.
The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner etc. which affects the computer system and other properties is referred as cyber crime.
Virtual space created by computers networks , internet and telecommunication is called________.cyber law
When was cyber law established in Nepal?30th Bhadra, 2060 B.S
30th Chaitra, 2061 B.S
30th Chaitra, 2060 B.S
30th Bhadra , 2061 B.S
Which of the following does not fall under areas of cyber law?Telecommunication Law
A __________ is the digital identity of the sender that uniquely identifies the particular sender electronically.computer crime
Which of the following statement is correct for cracker?A cracker is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc .
A cracker is a computer user who attempts a break into copyright software or an information system .
A cracker is internationally gaining unauthorized access to an important system.
A cracker is virtual space created by computers networks , internet and telecommunication
A generic term that is concern with the legal and regulatory aspect of internet and computer technology is called ______.
Cyber law encompasses laws relating to _______.
Digital signature law
Cyber crime law
All of them
A criminal activity within the information technology infrastructure is ______.
The term computer crime refers to _______.hacking
all of them
Cyber law of Nepal was enacted in Nepal in _____.2061
The common name for the crime of stealing password is:hacking
Collecting personal information and effectively posing as another individual is known:hacking
The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium is:Intellectual property law
Digital signature law
None of them
Creating strong computer security to prevent computer crime is :antivirus policy
Most common tool used to prevent access to a computer system is :user login
access control software
Hardware /software designed to guard against unauthorized access to a computer network is known as:anti hacker server
Monitoring and implementation of cyber act in Nepal is done by:HLCIT
Ministry of technology
__________is the moral principal that regulates the use of computers.Cyber crime law
Property right given for computer software sources code is known as:digital signature act
intellectual property act
Fraud that involves copying another persons intellectual property and presenting it as if it is your own ___________.hacking
all of them
You scored /20
Any Questions on Cyber Law ?
No discussion on this note yet. Be first to comment on this note