Please scroll down to get to the study materials.
Cyber law is a term that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information system. Simply, cyber law is the law which is used for stopping computer crime and abuse .
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced a loom. The device allowed the repetition of series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
Cyber law of Nepal was established on 30th Bhadra , 2061 B.S or 15th September, 2004 A.D
It is important because it helps to control crime related to internet.
It is very common in computer society . The hacking of data is more profitable than robbing a bank . Some destructive brain design computer virus and link to internet for everyone's access . These viruses damage the file system of computers . They also collect important information such as username and passwords and are delivered to the person who created the virus.
Hacking :Internationally gaining unauthorized access to an important system is known as hacking .
Cracker :A cracker is a computer user who attempts a break into copyright software or an information system .
It is the technology process that entails the emission , transmission and reception of signals , representing symbol , text , images etc. through wires, radio, electric media , optic cables or other electro-magnetic system .
A digital signature is the digital identity of the sender that uniquely identifies the particular sender electronically.
The crime committed with the help of computers is known as cyber crime. The criminal activities like stealing or destroying data, information and files, accessing others files spreading computer viruses, transferring money without knowledge of owner etc. which affects the computer system and other properties is referred as cyber crime.
List of any four cyber crimes are as follows:
The effects of computer crime are:
Digital signature is a security mechanism system in the cyberspace for digital data transformation by attaching a code on the document of electronic records. It uses two keys, one public and another is private, which are used to encrypt and decrypt the messages.
The method of making the data or message unreadable by unauthorized people while transferring through the internet is called encryption. The method of converting encrypted data back into its original form to make understandable to the receiver is known as decryption.
After 2061 the cyber law of Nepal was promulgated and revised in 2063.
It is divided into 12 sections and 80 clauses wit detailed information on role and rights of regulator,certification authority,consumer,government and all the concerned stake holders.
The action and punishment against such crimes will be in the range of a minimum RS.50,000 to maximum RS.3,00,000 in cash and six months to three years imprisonment.
A generic term that is concern with the legal and regulatory aspect of internet and computer technology is called ______.
Cyber law encompasses laws relating to _______.
Cyber crime law
Digital signature law
All of them
A criminal activity within the information technology infrastructure is ______.