Do Visit This Link To Get Other Materials Of Class 10 Computer Science:- Click Here
Cyber Law and
computer ethics
Meaning of cyber law : The law which deals /governs the
internet, network, computer hardware & software as well as electronic and
digital transaction is known as cyber law.
Objectives/ Purposes:
* To control and discourage the cyber crime.
* To regulate electronic and digital transactions.
International Cyber Law: In order to control computer crime and to
provide security, US Govt. has passed the different laws related to IT,, which
is called international cyber law. They are as follows.
(i)
Fair credit Reporting Act 1970 AD
(ii)
Freedom of Information Act , 1966 AD
(iii)
Video Privacy & Protection Act, 1974AD
(iv)
Computer Matching and Privacy Protection Act, 1988
(v)
Copyright Act, 1992 AD
Cyber crime : An unethical or illegal activities in computer
is known as cyber crime. It includes, hacking, cracking, email phishing, email
bombing, cyber stalking, software piracy etc.
Cyber Law of Nepal (
2061/05/ 30 BS.):
The electronic transaction and digital signature act is
known as cyber law of Nepal. The act was passed with view to regulate
electronic transaction in 2061/5/30 (15 Sept, 2004) and amended first time in
2061/11/28.
Purpose :
(i)
To promote e_ governance.
(ii)
To legalize electronic and digital transaction.
(iii)
To control cyber related crimes like hacking, software
piracy etc.
Important Provision of Cyber Law of Nepal :
(i)
Punishment to hackers ( both imprisonment and fine)
(ii)
Provision of providing license to IT Organization as
well as customers.
(iii)
Provision of
legalization of electronic signature
(iv)
Provision of formation of a judicial body to listen to
computer related crimes.
Cyber ethics
Cyber ethic is the
self guided rules / moral principles to be followed by the computer users and
professionals.
Points( commandments ) of cyber ethics:
·
Do not use computer to harm others
·
Do not use other computer resources without
permission or compensation.
·
Do not use computer to steal .
·
Do not snoop around others file and program.
0 Comments