Cyber Law And Cyber Ethics Class 10 Computer Science Chapter-4 Notes Old Syllabus

Cyber Law And Cyber Ethics Class 10 Computer Science Chapter-4

Cyber Law And Cyber Ethics, cyber crime

Cyber Law And Cyber Ethics



Introduction

The law that legalizes electronic transactions and boosts up the E-services is known as Cyber Law. Its main purpose is to control cyber crime and maintain secure online transactions. The cyber law of Nepal is also known as Electronic Transaction and Digital Signature Act (ETDSA). It was issued on 30th Bhadra 2061 B.S. (15 September 2004). It was revised in 2063 B.S. Cyber Law deals with the issues related to digital signature, intellectual property, cyber crime.


Importance of Cyber Law

  1.  To regulate and systemized the cyber society

  2.  To control and stock various cyber related crimes

  3.  To make legal punishment against cyber criminals

  4.  To legalize the Electronic transactions


Cyber crime

 Any illegal activity that is done with the help of computers and the internet is known as cyber crime. It is also known as computer crime and is one of the fastest-growing crimes around the globe.


Types of cybercrime

  1. Hacking: Hacking refers to an unauthorized access or control over someone's computer or network by breaking security intentionally for an illegal purpose. The one who does hacking is a hacker.


  1. Cracking: Cracking is also a popular type of cyber crime. It is an act of breaking into a computer security system.


  1. Identity theft: It is a type of cybercrime where a person claims to be someone else in order to do financial fraud. When it is done through the internet, it is called online identity theft.

.

  1. Pornography: It is an act of creating and distributing sexually exploited photos and videos over the internet. It is done with the purpose of creating sexual stimulation in people.


  1. Fishing: It is a cyber attack to steal money or data by showing greed for money and asking for bank details or other information from the people.


  1. Software piracy: It refers to the illegal copying and distributing of computer software without ownership or legal rights.


  1. Cyber stalking: It is a criminal act where an individual uses the internet to harass or threaten someone. 


  1. Forgery: It is a cybercrime of making fake documents, modification of existing documents, or unauthorized signing of a signature without authorization.


Cyber Ethics 

The set of moral principles that regulate the use of computers is known as cyber ethics.

The Commandments of Cyber ethics are listed below:

  1. We should not use a computer to harm other people

  2. We should not interfere with other people's computer work

  3. We should not snoop around in other people's files

  4. We should not use a computer to steal

  5. We should not use a computer to bear false witness

  6. We should not use or copy software for which you have not paid

  7. We should not use other people's computer resources without authorization

  8. We should not appropriate other people's intellectual output

  9. We should think about the social consequences of the program you write

  10. We should use a computer in ways that show consideration and respect



Comments