Ethical And Social Issues In ICT Class 10 Computer Science New Syllabus

  

Ethical And Social Issues In ICT Class 10 Computer Science New Syllabus

Ethical And Social Issues In ICT
Ethical and social issues in ICT


Introduction

ICT stands for Information and Communication Technology. It refers to the technologies that provide access to information through telecommunications. It is the combined form of IT and communication but focuses primarily on communication technologies. ICT is the technology of collecting, organizing, storing, and transferring

Information communication technology
Information and communication technology

information from one place to another with the help of computers and the internet.
ICT has changed the way and the life of people by providing unlimited access to information easily however, ICT has created some of the social issues in society. Some of the social issues in ICT are discussed below:

1.       Communication break

2.       Harassment

3.       Cyberbullying

4.       Gambling addiction 

5.       Health and fitness

6.       Identity theft

7.       Privacy

8.       Terrorism and crime

 

1.     Communication Breakdown
Socializing within a family unit has always been important, as it strengthens the bonds between us and ensures cohesion within the group. But with more and more households owning several computers and numerous portable devices granting access to information and entertainment, some argue that this is leading to a lack of family communication.
If each member is engrossed in their laptop, smartphone or tablet each evening, even communal things like watching television are compromised. Meanwhile, you can see whole families who are out to dinner and still staring into a touchscreen rather than talking to one another.
 
2.     Harassment
The only means of getting in touch with major corporations or famous people in the public eye prior to the advent of digital communication was via a stiffly written letter. This was, of course, accessible only to the intended recipient and thus a very private way for the disgruntled to vent their spleen. But first message boards and now social media services like Facebook and Twitter are being used to defame people and businesses in a public manner.
 
3.     Cyber Bullying
As with the defamation of public figures, the internet and computers have also made it easier for hurtful people to attack people they know personally as well as perfect strangers via the anonymous platforms that are available to them.
This has led to serious incidents of cyberbullying involving both children and adults, sometimes with tragic consequences. The problem with these techniques is that they tend to go under the radar to an even greater degree than traditional bullying, which makes it harder to detect and correct.
 
4.     Gaming Addiction
Whilst computers and the internet have made it easier for gambling addicts to get their fix, a new type of addiction has also arisen, in the form of addiction to video games. This is something that can impact people of all ages and leads inevitably to a number of problems, from the social to the financial.
Professionals are beginning to take gaming addiction seriously and combat it in the same way as other diseases.
 
5.     Privacy
Whilst high profile cases of online identity theft and fraud should have caused people to become more careful about how they use their personal information, issues of privacy, and a lack of appreciation for the risks are still widespread. This extends beyond simply giving away private data via chat rooms, message boards, and e-commerce sites and extends into the compromising the world of social media.
Employers are now combining Facebook and Twitter to effectively do background checks on potential employees, paying particular attention to those that have not chosen to use privacy settings to prevent anyone from getting a look at their details.
 
6.     Identity Theft
Fraud is another spurious activity that has been able to evolve in the wake of easily accessible computers and the internet.
Perhaps the most problematic and prevalent of the various fraudulent activities is identity theft, in which personal details of innocent people are harvested by a third party so that they can be used for malicious purposes. This includes carrying out illicit online transactions and other damaging activities that can have serious ramifications.
 
7.     Health & Fitness
We are living increasingly sedentary lifestyles, because computers are removing the need for us to physically carry out many tasks, as well as keeping us rooted to one spot throughout our working days and during our leisure time.
 
8.     Terrorism & Crime
Computers have been a positive force in allowing for the creation of global movements and righteous activism in a number of forms. However, the other side of the coin is that terrorists and organized criminals also exploit the web for their own nefarious purposes.
Businesses, governments, and individuals are all at risk of cyber-attack and the perpetrators can often act anonymously from a country with no extradition agreements.

 

Digital Citizenship

Digital citizenship
Digital Citizenship

A digital citizen refers to a person who has the knowledge and skills to effectively use digital technologies to communicate with others, participate in society and create and consume digital content. Digital citizenship is about confidence and positive engagement with digital technologies. Digital citizenship is a concept which helps teachers, technology leaders, and parents to understand what students, children, technology users should know to use technology appropriately. By educating students about digital citizenship they will have the opportunity to develop an understanding of the concepts of digital and information literacy, internet safety, privacy and security, and digital footprint. 

Following are the key concept to be understood for being the good digital citizen:

1.        Proper use of the internet

2.        Understanding user data

3.        Practicing digital literacy

4.        Acknowledging the digital divide

5.        Practicing digital Wellness

6.        Securing digital devices

 


Digital Footprint

Digital footprint refers to one's unique set of traceable digital activities, actions, contributions, and communications manifested on the Internet or digital devices. They are also called digital records. Digital footprint usually applies to a person, a digital footprint can also refer to a business, organization, or corporation.  Digital footprints can be classified as either passive or active. Active data traces are the ones that the user leaves intentionally. Facebook user and blog post social network connections image and video uploads email phone cause and sets are among the ways people create Active digital footprints

The use of a digital footprint has both positive and negative consequences. On the one hand, it is the subject of many privacy issues. For example, without an individual’s authorization, strangers can piece together information about that individual by only using search engines. Corporations are also able to produce customized ads based on browsing history. On the other hand, others can reap the benefits by profiting off their digital footprint as social media influencers. As technology usage becomes more widespread, even children generate larger digital footprints with potential positive and negative consequences such as college admissions. Since it is hard not to have a digital footprint, it is in one’s best interest to create a positive one.

 

 

Digital Footprint Risks

The number of public digital actions online per person can reach millions. And, depending on the age of the individual, these digital actions could have been done years ago when awareness about information security and enterprise data protection services were virtually nonexistent. Each of these details by themselves presents some security risk but combining information about an individual, such as his birth date, mother’s maiden name, address and references of this information crossed with numerous apps and services that offer individual public data on the Internet allows attackers to create a very accurate profile of that person. This profile, combined with resources available on the dark web could help a hacker to impersonate someone and take advantage of his/her information.

For example, knowing the middle name, the year, and the place of birth of a person would be enough to locate and buy a social security number on the dark web. This hacker can now access corporate systems and divisions that request a social security number for identification. The users should restrain from over-sharing digital footprint and be more vigilant in its usage as there is the possibility of risk of cyber bullying, identity theft, humiliation, and embarrassment besides violation of privacy

 

Digital Footprint Management

People should be aware of the management of their digital footprints, companies too need processes and tools to manage their own. A large company has numerous websites, social media accounts, servers, IP ranges, ASN, databases, repositories, cloud storage servers, and other Internet-oriented assets. There are generally many more assets that the company does not know, such as ad-hoc sites and services, temporary quality control environments (which often remain permanent) and all kinds of Internet-oriented services, which were probably created by old employees, but now they’re forgotten.

The digital footprints that people leave on the internet make it easier for hackers to bypass security systems. And while companies continue to impose stricter security policies each year, the human factor requires specialized training in enterprise data protection services. Companies need to find ways to monitor and reduce digital footprints so that hackers have less information than they can leverage to get into their systems. 

Some of the ways of managing the risk of digital footprint are listed below:

  1. Limit the data you share.
  2. Delete old accounts and data.
  3. Don't use third-party logins.
  4. Use secure websites.
  5. Avoid public Wi-Fi.
  6. Keep your software updated.
  7. Update privacy settings for platforms and apps.
  8. Limit social media sharing.

 

 

 

Ethics in ICT

Ethics is a moral principle that governs a person's behavior or the conduct of an activity. Computer ethics is the application of moral principles to the use of computers and the Internet. Some of the ethics in ICT are listed below:

1.       Recognition for personal and corporate ethics associated with ICT

2.       Intellectual Property Rights issue (Trademark, patent, copyright, trade secrets)

3.       Non-violation of privacy and associated rights against electronic information data mining

4.       Opportunity to control crime with ICT

5.        Legal issues and limitations

6.        Consequences of using ICT

7.        Professional responsibilities

Ethical challenges and their issues

Information Communication Technology has a wide area of applications in education, business, health, Industries, banking, sector and scientific research at a large level. With the leading advancement in information communication technology, it is necessary to have the knowledge of important ethical issues some of them are discussed below:

 

Security issues

There are many current issues concerning Information Systems security. Some of these issues include spamming, hacking, jamming, malicious software, sniffing, spoofing, and identity theft; each one of these problems fit under one of two headings, computer abuse or computer crime.

 

Privacy issues

As much as computer technology has enabled us to seek and find relevant information online it has also explored our freedom of privacy. There are so many ways our privacy is exploited by the use of the internet webcams and closed-circuit cameras which an experienced computer user can turn on any webcam of any computer online and you will have access to the privacy e of people's lives.

 

Copyright issues

Computer technology has made it easier for users to access any information at any given time. With the increased development of music sharing networks and photo-bookmarking sites, many original creators of these words are losing the credibility of their works because users of computers can easily get access and share their data with friends.

 

Digital divide issues

Computer technology has many opportunities in urban areas but in remote areas, they do not ever have power. There is a huge gap between have and have not. Information Technology tools like computers cannot be used there. In other sectors like education, most of these developing countries have poor old education systems so a student will not be aware of new Information Technologies.

 

Social Media

Social media are the particular websites and applications that are designed to allow people to share data, information, and content quickly, effectively, and in real-time. Social media is Computer Based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communications. By design social media is internet-based and gives users quick electronic communication of content and includes personal information documents videos and photos. Users engage with social media via computer, tablet, smartphones with web-based software and web applications. Some of the popular social media are Facebook, Twitter, Instagram, YouTube, Tiktok, WhatsApp, WeChat, Messenger, etc.

 

Facebook 

facebook
Facebook

Facebook is a popular free social media that allows registered users to create profiles, upload photos and videos, send messages and keep in touch with friends and family. It is the biggest social media site around with more than 2 billion people using it every month. Facebook was developed by Mark Zuckerberg and Edward Savarin in February 2004 A.D.

 



twitter
Twitter

Twitter

Twitter is a social media site for news entertainment, sports for politics, and more. What makes Twitter different from most social media sites is that it has a strong emphasis on real-time information, things that are happening right now. It was created by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams in July 2006 A.D.

 






YouTube 

Youtube
Youtube

YouTube is a video-sharing platform where users watch billions of hours of videos every day. To get started we can create a YouTube channel for brands where we can upload videos for our subscribers to view, like, comment and share. This site was developed by Chad Hurley, Steve Chen and Jawed Karim in February 2005 A.D.





 

WhatsApp
WhatsApp

WhatsApp

WhatsApp is a messaging app used by people in over 180 countries. Initially, WhatsApp was only used by people to communicate with their family and friends. Gradually people started communicating with businesses Via WhatsApp. It was developed by Jan Koum and Brian Acton in January 2009 A.D.

 






Instagram 

Instagram
Instagram

Instagram is a photo and video sharing social media app that allows sharing a wide range of content such as photos, videos, stories, and live videos. It is owned by Facebook Inc. and created by Kerin Systrom and Mike Kridger.

 






Tiktok
TikTok

Tik Tok 

Tik Tok is a rising music video social network. It was the world's most downloaded app in the first quarter of 2018 beating Facebook, Instagram, and other social media apps. It is owned by Byte Dance, a Beijing-based company and founded by Zhang Yiming in 2012 A.D.

 







WeChat 

Wechat
WeChat

WeChat grew from a messaging app just like WhatsApp and Messenger into all in one platform. Besides, messaging and calling users can now use WeChat to shop online and make payments offline, transfer money, make reservations, book taxis, and more.

 






Opportunities of social media

1.       Worldwide connectivity 

2.       Real-time information sharing

3.       Targeted advertising

4.       Increased new cycle speed

5.       Trusted reference

6.       Professional growth

 

 Risk of social media

1.       Counterattack

2.       Risk of fraud

3.       Corporate attack of privacy

4.       Decrease in civil behavior

5.       Depression and loneliness

 

Electronic Transaction Act 2063

ETA (Electronic Transaction and Digital Signature Act - Ordinance) is also known as the cyber law of Nepal. It was formulated in 30th Bhadra 2061 BS (15th September 2004 AD) but the Government of Nepal (House of Representative) approved the Electronic Transaction Act - 2063 only on 4th December 2006 AD. The electronic transaction is a transaction of electronic records data by using any type of electronic means. It contains electronic records and valid digital media and the exchange of all types of records which are in the form of electronic. An act that is related to electronic transactions is called the electronic transaction act.

 

Objectives of the Electronic Transaction Act 2063

1.       To make legal provisions for authentication and regulation of electronic data.

2.       To make a reliable date generation, communication, and transmission.

3.       To make a secure and authentic means of electronic communication.

4.       To regulate all the relating matters of electronic transactions.

 

Scopes of the Electronic Transaction Act 2063

1.       Creation and use of digital signature

2.       Control cyber/computer-related crimes.

3.       Protection of intellectual property.

4.       Protection of confidentiality.

5.       Regulations of an electronic transaction by establishing regulating bodies such as

– Office of Certificate Control (OCC)

– Certificate Agencies (CA)

– Subscribers

 

Major provisions of the Electronic Transaction Act 2063

1. It has the provision relating to electronic records and digital signature.

2. It has the provision relating to dispatch, receive an acknowledgment of electronic records.

3. It has the provision of few regulating bodies and their functions, rights, and duties such as –

– Office of Certificate Control (OCC)

– Certification Agencies (CA)

– Subscriber 

4. It has the provision relating the use of digital signature and certificate.

5. It has the provision relating to government use of the digital signature.

6. It has a provision relating to the computer network and network services providers.

7. It has the provision relating to computer-related crimes and punishments.

8. Provision of IT tribunal is defined as the first jurisdictional and appellate jurisdiction.

IT tribunal

– First Jurisdictional

– Appellate Jurisdictional

9. It defines a few documents which this act is not applicable for

– All the negotiable instruments defined by the “Negotiable Instrument Act 2034”

– All the documents related to the ownership of properties (dhanipurja, laalpurja ect).

– Any documents which are used as a primary document in the court process

 

Cyber Crime

Any illegal activities committed with the help of a computer and the internet is known as cybercrime. Cybercrime is a crime committed by using cyber means/computer technology. Cybercrime is also known as computer-related crime. All the illegal activities committed by using or with the application of computer technology are cybercrime such as –

1.    Damage to computer and computer system.

2.    Acts to gain illegal access into the system.

3.    Use as weapons to commit other crimes.

4.    Acts against the provision of cyber law.

 

Some examples of cyber/computer crimes are

             Creating fake documents

             Blackmailing/social media abuse

             Distribution of pornography materials

             Misuse of electronic cards

             Piracy of intellectual properties

             Spreading computer viruses/malware

 

Major computer-related crimes and punishments 

Crime

Punishments

Pirate/ Destroy/Alter computer source code

Unauthorized access to the computer system 

Damage to computer and computer system

 

Up to 3 years of imprisonment, or up to 2 lakh fine or both

 

Distribution of electronic materials in electronic form – Not to publish the prohibited materials which are prohibited by prevailing laws, the materials which may create jeopardy in social harmony, spread hate, and jealousy, materials which may create harassment to women trafficking, pornography materials

 

Up to 5 years’ imprisonment or up to 1 lakh or both

 

Disclose of Confidentiality 

Deform false statements by parties at the time of the electronic transaction

 

Up to 2 years’ imprisonment or 1 lakh fine of both

 

Display and submit false licenses for electronic means

 

Only display 1 lakh fine

 

Display + submit and perform = 2 years’ imprisonment or 1 lakh fine or both

 

Non-submission of prescribed statements

 

Up to 50,000 fine

Computer fraud

 

Fine up to 1 lakh and 2 years of imprisonment or both

 

 

 

 

Nepal's National Information and Communication Technology (ICT) Policy, 2015 (2072 BS)

Nepal’s National Information and Communication Technology (ICT) Policy, 2015
This ICT Policy was announced in August 2015.

Background

Information and Communication Technologies are increasingly at the core of strategies aimed at securing the goals of sustainable development and stimulating economic growth in countries around the world. Among others, these technologies are shaping the way social interaction takes place and public services are delivered in some fundamental ways. It is precisely along these lines that the Government of Nepal has placed a great deal of  importance  on the transformative potential of ICTs and positioning these technologies within the larger context of its far-reaching developmental aspirations premised around poverty reduction as an overarching goal.
 
ICTs assume particular significance in the light of fact that efficiency more than ever is now an indicator of competitiveness. As such, nations, private sector entities, and people that find the means to become more efficient will advance and prosper. Among others, ICTs hold the potential to help create conditions for better governance, with more transparent and efficient bureaucracies. Similarly, ICTs can help address structural problems in education systems enabling expanded access to education services as well as help bridge quality gaps in education. ICTs can also significantly improve the health sector by enabling expanded outreach to health care services and driving efficiency through the system.

In addition to the roles these technologies play in development, the sector also offers tremendous prospects for economic growth and employment creation through the enablement of IT-ITeS/BPO based business models.

It is within these contexts that the Government of Nepal has accorded a high level of policy emphasis for the development ICT sector. Nepal has the opportunity to make a difference by adopting and using ICT as a tool available to reduce the development divide and increase the chances of improving the quality of life of the citizens.
 
Apart from opportunities, however, the ever-evolving nature of ICTs also offers a host of challenges from policy perspectives. For one, fast-paced technological innovations in the ICT domain come attendant with far-reaching policy implications that traditional policy formulation approaches fail to address properly. As a result, existing policy provisions in Nepal need to be revisited in the light of the dynamism that characterizes the sector.

This policy is premised around the realization that there is an urgent need to formulate strategic responses to account for technological trends shaping the ICT sector. Formulating policy responses in alignment with the dynamism of the sector becomes all the more important given the need to adequately factor in key strategic imperatives impinging on faster uptake of ICTs in the country, namely issues surrounding cybersecurity, data protection, privacy, and respect for intellectual property rights. Equally important is the need to address the challenges posed by technological convergence especially from regulatory and governance perspectives. Given that telecom connectivity is fast expanding across the country, inching closer to saturation point, the focus should now also shift on demand-side fundamentals that need to be strengthened in order to ensure strategically alignment of resourcefulness offered by ICTs with our growth and development aspirations.

Vision of IT Policy of Nepal 2072

"To transform Nepal into an information and knowledge-based society and economy."

Mission of IT Policy of Nepal 2072

To create conditions for the intensified development and growth of ICT sector as a key driver for Nepal's sustainable development and poverty reduction strategies.

 

Guiding Principles of IT Policy of Nepal
 The implementation of this Policy shall be guided, among other things by the right of access to information as well as the need to promote transparency, fairness and accountability in the delivery of government services and execution of roles and responsibilities of government agencies.
The following constitutes some of the guiding principles of the policy:

1. This policy is intended to create the foundational groundwork for an overarching vision of “Digital Nepal”.  As per this vision, Information and Communication Technology will be a key driving force in transforming Nepali society into knowledge and information based society and strengthening Nepal's pursuit of equality and sustainable growth by leveraging Information and communication technology.  
 
2. The implementation of this policy will be Government-led and Private Sector-driven.  Public-Private Partnerships (PPP) shall form one of the bases for the implementation of this policy especially in matters and projects of national character and importance. Government shall take leadership mainly in facilitating the mobilization of investment and resources required for the development of national telecommunications infrastructure backbones with a particular focus on expanding access to broadband, as well as the full implementation of this policy.
 
3. This policy is primarily designed to guide and mainstream the use of ICTs in all sectors of the Nepalese economy within the overall context of socio-economic development and poverty reduction agenda pursued by the country.
 
4. In order for this policy to make a meaningful impact on social and economic development of the country, the policy goals, objectives and strategies shall also be linked with the overall national developmental objectives, priorities, and programs such as the periodic development plans formulated by National Planning Commission. This policy will therefore form a basis for all sectors to draw their respective ICT strategies from.
 
5. Infrastructural synergies shall be promoted while upgrading existing and developing new infrastructure such as roads and electric power and facilitating the cost-effective roll-out of telecommunications and broadband infrastructure aimed at supporting the goals of the policy.
 
6. This policy shall be supported by appropriate legislation/directives aimed at effective separation of roles and responsibilities for policy formulation/guidance, regulation, and operation in order to ensure transparent and effective regulatory functions based on emerging trends of convergence and establish institutional mechanisms for policy implementation.
 
7. The implementation of this policy shall take into account relevant regional and global strategies and best practices in transforming the nation into a knowledge-based society by cultivating strong linkages with the UN Millennium Development Goals (MDGs), WSIS beyond 2015, WTO, Broadband Commission, UN-ESCAP, post-2015 sustainable development agenda, etc.
 
8. Nepal will continue to uphold the principle of freedom of expression on the Internet and net neutrality.
 
9.
The policy intends to promote platform-neutral services in e-governance. 

Objectives of National Information and Communication Technology Policy

 

1.     To empower and facilitate Nepal’s participation in the Global Knowledge Society. 

2.     To transform the Government service delivery regime by promoting transparency, efficiency, inclusiveness, and participation through effective utilization of information and communication technologies. 

3.    To promote ICT to further productivity among the sectors that are key drivers of the national economy.

4.     To foster efficient, interoperable, secure, reliable and sustainable national ICT infrastructure in alignment with grass-root needs, and compliant with regional and international standards. 

5.    To promote research and innovation on the role of ICT on the resilience of low-income communities amid potential environmental, economic and social shocks. 

6.     To further streamline clear strategies and obligations for licensed ICT service providers with respect to universal access/service goals and Quality of Service (QoS) and ensure cost-effective connectivity to ICT services such as Internet, E-Commerce and E-Government services.

7.     To promote cost-effective and qualitative last-mile access technologies for providing secure access to the internet including commercial and public information services, E-Government applications by communities (including the disadvantaged and physically challenged) especially in rural and underserved areas. 

8.    To create easily accessible, affordable, and innovative public access points under a comprehensive E-Community/ Village network initiative.

9.     To create a favorable environment for cooperation and partnership in ICT among public and private sectors, civil society, and between all stakeholders at local, national, regional, and international levels. 

10.   To increase the institutional capacity along with infrastructure and human resource dimensions in public and private educational institutions including schools, colleges/ universities that offer ICT courses and use ICTs for pedagogical purposes; To create a conducive environment for increasing annual enrolment and output of students in key professional skills areas such as telecommunications/electronics engineering, computer science/IT, etc. and promote market-driven skills development initiatives in ICT. 

11.   To deploy ICTs at all levels of Nepali the educational system in order to improve educational outcomes while expanding access to education and training facilities. 

12.   To support local and indigenous content development as well as applications targeting the capturing, archiving and dissemination of local and indigenous knowledge, content, and information resources as well as the promotion of diverse linguistic and cultural heritage of Nepal. 

13.  To facilitate the participation of youths and women in ICTs particularly in media and content development initiatives. 

14.   To address gender-based inequalities and promote gender-sensitive measures to encourage the active participation of women in national and community-based ICT initiatives. 

15.   To promote the use of free and open-source software as well as an open standard in software development for government agencies. 

16.   To create an innovative, market-responsive, highly competitive, and well-regulated ICT industry. 

17.   To promote joint venture initiatives for local entrepreneurs with international private investors in the provision of public ICT goods and services in order to catalyze the growth of the sector. 

18.   To help develop ICT business incubators and promote start-up projects in close coordination with the private sector through the creation of a supportive eco-system. 

19.   To create a favorable business environment and promote Nepal as an attractive destination for ICT-related investments, especially in the area of IT-ITES/BPO, within the region and on the international market. 

20.   To restructure the ICT market and technological base with a view to making the ICT sector a significant contributor to the social and economic development of the country. 

21.  To create conditions for the intensified roll-out of national telecommunications infrastructure backbone as a way to expand broadband-based ICT services across the country. 

22.   To ensure an integrated, coordinated and synergistic approach towards the development and deployment of ICTs including other supporting physical infrastructures such as electricity and transport infrastructure. 

23.   To minimize duplication and costs through infrastructure sharing among public and private sector investment projects and to create an efficient and cost-effective Government-wide communications network infrastructure linking national, provincial, and district administration. 

24.   To facilitate regional economic integration by utilizing regional and international telecommunications infrastructure projects and Asian Information Superhighway infrastructure initiatives.

25.   To safeguard public sector information and investment against negative impacts of deploying and using ICTs.

26.   To promote a stable, fair, and competitive investment climate to facilitate the development of e-Trade and E-Commerce activities in the country. 

27.   To develop a highly competitive ICT industry capable of serving as the engine for driving Nepal's active participation in global trade; 

28.   To facilitate the adoption of E-Commerce especially by SMEs in agriculture, tourism, and manufacturing as well as non-traditional exports to ensure productivity and growth. 

29.   To increase the competitiveness of farmers in production, processing, and marketing of agricultural products and services through the effective and outcome-oriented utilization of ICTs. 

30.   To promote the development of ICT entrepreneurs at SME level as part of the rural agro-business industry development and strengthen the development, application of ICTs in agriculture. 

31.   To improve communication systems across the country especially in areas of touristic interest to support tourism development in the country.

32.   To use ICTs in the documentation, promotion and effective marketing of the full potential of Nepal's world-class and niche tourist destinations to the local, regional and international market. 

33.  To ensure that all ICT related activities have very minimal negative environmental impact during construction, operation and disposal/de-commissioning.

34.   To conserve natural resources and safeguard Nepal's heritage using ICT tools. 

35.    To support the development of the mid-to-long term basic planning that provides policy direction and tasks for e-Government. 

36.   To support the formulation of development strategy for ICT converged services to support and plan for mid-to-long term resolution for overcoming the digital divide. 

37.    To ensure all installed ICT infrastructure and capacity is utilized effectively and contributes to resilience and redundancy.

Strategies of IT Policy of Nepal 2072

1. Human Resource Development

2. ICT in education, research & development

3. Access, media, and Content

4. ICT Industry

5. ICT for Government service innovation and good governance 

6. SME (Small and Medium Enterprises) and e-Commerce

7. Telecommunications infrastructure

8. ICT in agriculture 

9.ICT in Health

10. ICT in Tourism

11. Telecommunication/ICTS in mitigating the impact of climate change

12. ICT in the environment and natural Resources

13. Telecommunication/ICTS for natural disaster preparedness, mitigation, and relief

14. Human exposure to Electromagnetic fields and safe disposal of electronic waste

15. Conformance, Interoperability, and Standards in telecommunications/ICT

16. Cloud Computing

17. Access to telecommunications/ICTS in rural and remote areas

18. Access to Telecommunications/ICT services for persons with disabilities and specific needs

19. ICTs for Youth, women, and girls

20. Building confidence and Security in the use of ICTS

 

Institutional arrangement

 

A National Information and Communication Technology Policy Implementation Steering Committee will be formed at the Ministry of Information Technology and Communication with the following structure.

 

Hon. Minister, Ministry of Information and Communication Technology -Chairperson

Member, National Planning Commission -Member

Secretary, Ministry of Education -Member

Secretary, Ministry of Health -Member

Secretary, Ministry of Agriculture -Member

Secretary, Ministry of Finance -Member

Secretary, Ministry of Local Development -Member

Secretary, Ministry of Information and Communication -Member

Chairman, Nepal Telecommunications Authority -Member

Representative Private Sector / Domain Expert -2 Members

Joint-Secretary (Policy and Program),

Ministry of Information and Communication Member-Secretary

 

The primary role of the Information and Communication Technology Policy Implementation Steering Committee is to provide overall coordination support for the effective implementation of policy provisions along with monitoring and evaluation of policy interventions.

 

The Steering Committee will form an ICT Policy Implementation Sub-Committee comprising of representation from the stakeholder community and domain experts, including the private sector, to provide it with domain specific expert advice and recommendations in relation to the execution of policy provisions.

 

Formulation of National ICT Master Plan/National e-strategies

The policy and strategy framework will be implemented through National ICT Master plan/National e-strategies to be developed and endorsed by the Government of Nepal.

 

Resource Mobilization

The overall goals of Information and Communication Technology Policy will be achieved through the mobilization of both public and private sector resources. The proposed policy framework is expected to create conditions for private sector investment in the sector complemented by public sector resource mobilization based, among others, upon universal service obligation commitments through the use of RTDF. The possible grants and technical assistance from bilateral, multilateral, and other international agencies could also be used.

 

Legal and regulatory arrangements

Appropriate Legal and regulatory arrangements will be made for the implementation of this policy and provisions therein if deemed necessary.

 

Monitoring and evaluation

A framework will be developed within the fiscal year 2072/73 (2015/16) to serve as a basis for carrying out periodic monitoring and evaluation of the execution of Information and Communication Technology Policy and ICT master plan. It will be the primary responsibility of Implementation Steering Committee to carry out monitoring and evaluation of programs and policy provisions relating to ICT services and infrastructure build-out.

 

Assumptions and Risks

The following constitutes key assumptions and risk perceptions in relation to the proposed Information and Communication Technology Policy.

 

Assumptions:

ICT as one of the core elements of development agenda will enjoy high level of political commitment in the days ahead resulting in significant resource commitments on harnessing ICTs to achieve policy outcomes across sectors

 

There will be intensified demand for ICT services driven by increased public sector deployment of ICT application and services, thereby creating conditions for more private sector investment in the sector

 

Necessary legal and regulatory reforms in the area of licensing and spectrum governance will be taken in an urgent basis to promote investment in the sector

 

Risks:

Overall investment climate might be compromised on account of delays in much needed legal, regulatory, and institutional reforms

 

The continuing challenges associated with chronic power shortages could dampen the overall demand for ICT services and create disincentive for investment

 

Lack of oversight giving rise to skewed, purely market-driven expansion of ICT services resulting in the exclusion of the communities outside urban areas resulting in a widening digital divide

 

Ethical and Social Issues in ICT Class 10 Computer Science Important Question And Answers

Comments