Cyber Law

Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, cyber law is the law which is used for stopping computer crime and abuse .

The First cyber crime

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced a loom. The device allowed the repetition of series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Cyber law of Nepal was established on 30th Bhadra , 2061 B.S or 15th September, 2004 A.D

Importance of Cyber law

It is important because it helps to control crime related to internet.

Provision of cyber law of NEPAL

  • It has strong provision for punishment against cyber crime.
  • It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce.
  • It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Areas of Cyber law

  • Computer crime

    It is very common in computer society . The hacking of data is more profitable than robbing a bank . Some destructive brain design computer virus and link to internet for everyone's access . These viruses damage the file system of computers . They also collect important information such as username and passwords and are delivered to the person who created the virus.

    Hacking :Internationally gaining unauthorized access to an important system is known as hacking .

    Cracker :A cracker is a computer user who attempts a break into copyright software or an information system .

  • Telecommunication law

    It is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc. through wires, radio, electric media , optic cables or other electro-magnetic system .

  • Digital signature

    A digital signature is the digital identity of the sender that uniquely identifies the particular sender electronically.

  • Cyber law was established on 30th Bhadra , 2061 B.S for stopping computer crime and abuse.
  • Areas of Cyber law are Computer crime, Telecommunication law, Data protection and Digital signature
  • Telecommunication law is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc . through wires, radio, electric media.

The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner etc. which affects the computer system and other properties is referred as cyber crime.

List of any four cyber crimes are as follows:

  • Unauthorized access to computer systems and networks
  • Email bombing
  • Hacking
  • Cyber-stalking
0%
  • Virtual space created by computers networks , internet and telecommunication is called________.

    cyber law
    cyber Crime
    cyber Space
    digital Signature
  • When was cyber law established in Nepal?

    30th Bhadra, 2060 B.S
    30th Chaitra, 2061 B.S
    30th Chaitra, 2060 B.S
    30th Bhadra , 2061 B.S
  • Which of the following does not fall under areas of cyber law?

    Telecommunication Law
    Digital Signature
    Data Protection
    Data Management

  • A __________ is the digital identity of the sender that uniquely identifies the particular sender electronically.

    computer crime
    hacking
    cyber space
    digital signature
  • Which of the following statement is correct for cracker?

    A cracker is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc .
    A cracker is a computer user who attempts a break into copyright software or an information system .
    A cracker is internationally gaining unauthorized access to an important system.
    A cracker is virtual space created by computers networks , internet and telecommunication
  • A generic term that is concern with the legal and regulatory aspect of internet and computer technology is called ______.

    Copyright law


    Cyber crime


    Cyber law


    Computer crime


  • Cyber law encompasses laws relating to _______.

    Digital signature law


    Cyber crime law


    Telecommunication law


    All of them


  • A criminal activity within the information technology infrastructure is ______.

    intellectual infrastructure


    cyber law


    cyber crime


    digital crime


  • The term computer crime refers to _______.

    hacking
    information theft
    all of them
    plagiarism
  • Cyber law of Nepal was enacted in Nepal in _____.

    2061
    2064
    2062
    2063
  • The common name for the crime of stealing password is:

    hacking
    spooling
    identity theft
    spoofing
  • Collecting personal information and effectively posing as another individual is known:

    hacking
    spooling
    identity theft
    spoofing
  • The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium is:

    Intellectual property law
    Digital signature law
    Telecommunication law
    None of them
  • Creating strong computer security to prevent computer crime is :

    antivirus policy
    personal ethics
    firewall policy
    privacy rights
  • Most common tool used to prevent access to a computer system is :

    user login
    access control software
    password
    computer keys
  • Hardware /software designed to guard against unauthorized access to a computer network is known as:

    anti hacker server
    firewall
    hacker programs
    hacker wall
  • Monitoring and implementation of cyber act in Nepal is done by:

    HLCIT
    OCCA
    NITC
    Ministry of technology
  • __________is the moral principal that regulates the use of computers.

    Cyber crime law
    Cyber act
    Cyber crime
    Cyber ethics
  • Property right given for computer software sources code is known as:

    digital signature act
    copyright act
    cyber act
    intellectual property act
  • Fraud that involves copying another persons intellectual property and presenting it as if it is your own ___________.

    hacking
    all of them
    plagiarism
    information theft
  • You scored /20


    Take test again

Any Questions on Cyber Law ?

Please Wait...

No discussion on this note yet. Be first to comment on this note