Cyber law and Ethical Issues

 


#Cyber law and Ethical Issues:

Cyber law: The law which includes rules and regulations established to govern, prevent and resolve disputes that arise from the use of computers and internet is called cyber law. OR,

The law formed and adopted by the government or organization to control computer crimes is known as cyber law.

Cyber law is important because it is very helpful and effective in controlling the cyber-crimes.

Cyber Crime (Computer Crime): It is a criminal activity done using computer and internet. Ex: Software piracy, hacking, cracking, pornography, plagiarism, harassment, data diddling, etc.

i. Data diddling: The false data entry during entry into computer system.

ii. Plagiarism: It is the act of taking another’s person’s writing, conservation, songs or even idea and passing it off as your own.

iii. Harassment: It is a behavior that is intended to annoy, disturb, torment, upset or terrorize someone.

 

The following laws are related to cyber law:

-Electronic and digital signature law.

-Computer Crime / Cyber Crime law

-Intellectual Property law: Any product of someone’s intellect that has commercial value; a piece of literature, a painting, an invention, a trade mark, etc.

(Intellect: faculty of thinking, judging, abstract reasoning and conceptual understanding.)

-Data protection and privacy law.

-Telecommunication law (transmission and reception of information of any type, including data, TV pictures, sound, fan, using electrical or optical signals sent over wires or through air is called telecommunication.)

 

#Cyber space: It is the electronic medium of computer networks, in which online communication takes place. In other word, it is the virtual space created by computer network, internet and telecommunication.

 

#International cyber law: International cyber law was basically started from 1970 A.D. by U.S.A. Some international cyber laws are as follows:

(i) Fair Credit Reporting Act-1970 A.D.: It controls the collection, use and redistribution of consumer information.

(ii) Freedom of Information Act-1970 A.D.: It allows any citizen to obtain federal documents.

(iii) Federal Privacy Act-1974 A.D.: It controls personal information.

(iv) Video Privacy Protection Act-1988 A.D.: It limits the disclosure of personally identifiable information regarding video rentals. It provides one of the strongest consumer privacy protections in federal law.

(v) Computer Matching and Privacy Protection Act-1988 A.D.: It ensures right of government to keep the personal key.

(vi) Copyright Act-1992 A.D.: It safeguards the authors right to make and sell copies of their work, the right to display their work publicly. Copyrights are subject to a limit & expires generally after 70 years after author’s death.

 

#Cyber law of Nepal: Cyber law of Nepal was established on 30th Bhadra,2061 B.S. (15th September, 2004 A.D.). It has strong provisions for punishment against cyber-crimes. It is implemented in all the government offices and related organizations. The cyber law of Nepal has the following major provisions:

-Digital signatures, e-banking, e-commerce, e-shopping are given legal status.

-Provision of punishment to cyber criminals.

-Provision of formation of a judicial body to listen to computer related crimes.

-Provisions of providing licenses to IT customers.

 

#Computer Ethics: Computer ethics is a set of moral principles that regulate the use of computers. OR,

It is a branch of practical principles that deals with how the computer experts should make decision in regard to the social and professional behavior.

Ethics: The study of principles relating to right and wrong conduct.

Some commandments (something that must be obeyed) of computer ethics are:

(i)You shall not use computer to steal.

(ii) You shall not use computer to harm other people.

(iii) You shall not use computer to search other files.

(iv) You shall not use computer to spread the illegal information.

(v) You shall not copy or use software for which you have not paid.

 

Full Forms:

CCA: Controller of Certification Authority

HLCIT: High Level Commission for Information Technology

ICT: Information of Commission Technology

ETDSA: Electronic Transaction and Digital Signature Act

NITC: National Information Technology Centre

NITDC: National Information Technology Development Council

MOST: Ministry Of Science and Technology

 

#Digital Signature: It is an electronic signature that can be used to authenticate the identity of the sender of a message or document, and possibly to ensure that the original content of the message or document that has been sent is unchanged.

Sender         Receiver            Hacker

                     Hacker  

Receiver creates both keys; Private and Public.

Public key: It is accessible to public, given through the website or other medias. Accessible to hacker as well.

Public key: Encrypt

Private key: Decrypt

-Symmetric uses one key (to encrypt and decrypt): fast

-Asymmetric uses two keys (private and public): slow

 

#Symmetric:

-Same key used to encrypt and decrypt

-Fast

-Key needs to be stored securely

-Secure channel is required to transfer the key (through telephone)

How are you: Hbc13c5y4

Hbc13c5y4: How are you

#Public key encryption:

-Uses a public and private key.

-Slower compared with symmetric key.

-Used to encrypt communication.

 

#Encryption algorithm is used (Hash algo)

-Windows file encryption used both techniques (symmetric / asymmetric)

 

#To secure PDF

-Tools (Sign and certify)

Procedure:

-Click on customize icon

**sign and certify

***sign document=ok

Command will be placed on top now.

 

 

 

 

 

Sujit Prasad Kushwaha

A Dedicated Blogger Sharing Insights and Making a Difference.

Post a Comment

The comment section is your chance to make your mark. Don't hold back - add to the discussion and let your personality shine through!

Previous Post Next Post