Cyberlaw and ICT Policy in Nepal

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

Concept of

Cyber Law in
Nepal and ICT
Policy in Nepal
Presented By:
Dikesh Manandhar
Class: 11 ‘G’
Roll: 395
Table of Contents

Cyber Law in Principles &


Concept ICT Policy Conclusion
Nepal Objectives
Concept of Cyber Law

Applies to:
Law of the Internet
Internet and internet related
technologies

What?
Part of the overall legal
system that deals with the Provides
Internet, cyberspace, and their Legal Protection to
respective legal issues. people

Coverage
Fairly broad area, encompassing several Prevents
sub topics including freedom of
Internet crime
expression, access to and usage of
internet, online privacy etc.
Fields of cyber law
Cyber Law

Electronic Computer
Data protection crime
and digital
and privacy
signature

Cloud Tele-
Intellectual communcation
property computing
Law
Cyber law of Nepal

Due to rapid increase in internet users along


with the instances ofcybercrime the enactment
of cyber laws was needed.

Cyber Law/ETA was passed on 30th


Bhadra 2061 BS (15 September,2004)

HOR approved the ETA on 4th December,2006

After that rules regarding cybercrime is


passed known as ETA Rules 2064.
The laws

The main laws of the Electronic Transaction and


Digital Signature Act 2004 are:

The law covers most of the issues related with cyber activities and
1 is supposed to forecast to be landmark legislation for development
of IT industry in Nepal

Conducts such as hacking, deleting data, stealing,software piracy


2 and posting offensive info are capable of criminal & civil
sanctioning under the new cyber law.

The government can punish cyber offenders with up to 5 years


3 of imprisonment and /or fine of up to Rs. 50,000. However,
much depends on the harshness of the crime.
The laws
The law has tightened the security for banking transactions through
4 electronics means, which should boost the economic activities
across the internet via Nepal

It gives legal status to information posted on the websites of


5 government offices, government run corporations and local bodies.

It has also granted legal status to digital signatures sent through


6 the electronic media like e-banking, e-commerce

The law has also made a new judicial body to listen to

7 complaints, cases and matters concerning cyber


crime.
Policy?

A deliberate system of
guidelines to guide
decisions & achieve
rational outcomes.
Why we need ICT Policy ?
● Information and communication
technologies are increasingly at the core
of strategies aimed at securing goals of
sustainable development & stimulate
economic growth.

● Develop political norms and values.

● Uplift the economy.

● Formulate strategic responses account for


technological trends shaping the ICT
sector.

● Reduce poverty .
Guiding Principles

• ICT will be key driving force for transformation to Digital Nepal


• ICT will be mainstream for all sectors
• ICT will have Technology Neutrality
• Infrastructural synergies shall be promoted
• This policy shall be supported by appropriate legislation
• Extensive use of ICT in cross cutting issues
• Cultivating strong linkage with national & international agencies
ICT policy 2015

Vision
To transform Nepal into an information and knowledge-based society and
economy.

Mission
To create conditions for the intensified development and growth of ICT sector
as a key driver for Nepal’s sustainable development and poverty reduction
strategies.
Major Objectives

1. To make ICT accessible & affordable to all


2. To provide sustainable, comprehensive & inclusive socio-economic development through ICT
3. To develop & enhance ICT infrastructure
4. To encourage the exploration of technologies to address the challenges in environmental,
economic, social & technological sector
5. To develop the ICT human resource and recognize opportunities for their development through
ICT
6. To implement good governance through ICT
CONCLUSION

 In today’s rapidly digitalizing world, cybercrime has become an ever


increasing problem.
 For preventing such cyber crimes various cyber laws have been made
which protect us against various offences regarding computers.
 While these cyber laws may be useful, we have to take steps
ourselves to be aware of these crimes and take necessary action to be
safe from such crimes in the first place.
Thank You !

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy