Ethical And Social Issues In ICT Class 10 Computer Science New Syllabus
Ethical and social issues in ICT |
Introduction
ICT stands for Information and Communication Technology. It refers to the technologies that provide access to information through telecommunications. It is the combined form of IT and communication but focuses primarily on communication technologies. ICT is the technology of collecting, organizing, storing, and transferring
Information and communication technology |
information from one place to another with the help of computers and the internet. ICT has changed the way and the life of people by providing unlimited access to information easily however, ICT has created some of the social issues in society. Some of the social issues in ICT are discussed below:
1.
Communication break
2.
Harassment
3.
Cyberbullying
4.
Gambling addiction
5.
Health and fitness
6.
Identity theft
7.
Privacy
8.
Terrorism and crime
1. Communication Breakdown
Socializing within a family unit has always been important, as it strengthens the bonds between us and ensures cohesion within the group. But with more and more households owning several computers and numerous portable devices granting access to information and entertainment, some argue that this is leading to a lack of family communication.
If each member is engrossed in their laptop, smartphone or tablet each evening, even communal things like watching television are compromised. Meanwhile, you can see whole families who are out to dinner and still staring into a touchscreen rather than talking to one another.
2. Harassment
The only means of getting in touch with major corporations or famous people in the public eye prior to the advent of digital communication was via a stiffly written letter. This was, of course, accessible only to the intended recipient and thus a very private way for the disgruntled to vent their spleen. But first message boards and now social media services like Facebook and Twitter are being used to defame people and businesses in a public manner.
3. Cyber Bullying
As with the defamation of public figures, the internet and computers have also made it easier for hurtful people to attack people they know personally as well as perfect strangers via the anonymous platforms that are available to them.
This has led to serious incidents of cyberbullying involving both children and adults, sometimes with tragic consequences. The problem with these techniques is that they tend to go under the radar to an even greater degree than traditional bullying, which makes it harder to detect and correct.
4. Gaming Addiction
Whilst computers and the internet have made it easier for gambling addicts to get their fix, a new type of addiction has also arisen, in the form of addiction to video games. This is something that can impact people of all ages and leads inevitably to a number of problems, from the social to the financial.
Professionals are beginning to take gaming addiction seriously and combat it in the same way as other diseases.
5. Privacy
Whilst high profile cases of online identity theft and fraud should have caused people to become more careful about how they use their personal information, issues of privacy, and a lack of appreciation for the risks are still widespread. This extends beyond simply giving away private data via chat rooms, message boards, and e-commerce sites and extends into the compromising the world of social media.
Employers are now combining Facebook and Twitter to effectively do background checks on potential employees, paying particular attention to those that have not chosen to use privacy settings to prevent anyone from getting a look at their details.
6. Identity Theft
Fraud is another spurious activity that has been able to evolve in the wake of easily accessible computers and the internet.
Perhaps the most problematic and prevalent of the various fraudulent activities is identity theft, in which personal details of innocent people are harvested by a third party so that they can be used for malicious purposes. This includes carrying out illicit online transactions and other damaging activities that can have serious ramifications.
7. Health & Fitness
We are living increasingly sedentary lifestyles, because computers are removing the need for us to physically carry out many tasks, as well as keeping us rooted to one spot throughout our working days and during our leisure time.
8. Terrorism & Crime
Computers have been a positive force in allowing for the creation of global movements and righteous activism in a number of forms. However, the other side of the coin is that terrorists and organized criminals also exploit the web for their own nefarious purposes.
Businesses, governments, and individuals are all at risk of cyber-attack and the perpetrators can often act anonymously from a country with no extradition agreements.
Digital Citizenship
Digital Citizenship |
A digital citizen refers to a person who has the knowledge
and skills to effectively use digital technologies to communicate with others,
participate in society and create and consume digital content. Digital
citizenship is about confidence and positive engagement with digital
technologies. Digital citizenship is a concept which helps teachers, technology
leaders, and parents to understand what students, children, technology users
should know to use technology appropriately. By educating students about
digital citizenship they will have the opportunity to develop an understanding
of the concepts of digital and information literacy, internet safety,
privacy and security, and digital footprint.
Following are the key concept to be understood for being the
good digital citizen:
1.
Proper use of the internet
2.
Understanding user data
3.
Practicing digital literacy
4.
Acknowledging the digital
divide
5.
Practicing digital Wellness
6.
Securing digital devices
Digital Footprint
Digital footprint refers to one's unique set of traceable
digital activities, actions, contributions, and communications manifested on the
Internet or digital devices. They are also called digital records. Digital
footprint usually applies to a person, a digital footprint can also refer to a
business, organization, or corporation. Digital footprints can be
classified as either passive or active. Active data traces are the ones that
the user leaves intentionally. Facebook user and blog post social network
connections image and video uploads email phone cause and sets are among the
ways people create Active digital footprints
The use of a digital footprint has both positive
and negative consequences. On the one hand, it is the subject of many privacy
issues. For example, without an individual’s authorization, strangers can piece
together information about that individual by only using search engines.
Corporations are also able to produce customized ads based on browsing history.
On the other hand, others can reap the benefits by profiting off their digital
footprint as social media influencers. As technology usage becomes more
widespread, even children generate larger digital footprints with potential
positive and negative consequences such as college admissions. Since it is hard
not to have a digital footprint, it is in one’s best interest to create a
positive one.
Digital Footprint Risks
The number of public digital actions online per person can
reach millions. And, depending on the age of the individual, these digital
actions could have been done years ago when awareness about information
security and enterprise data protection services were virtually nonexistent.
Each of these details by themselves presents some security risk but combining
information about an individual, such as his birth date, mother’s maiden name,
address and references of this information crossed with numerous apps and
services that offer individual public data on the Internet allows attackers to
create a very accurate profile of that person. This profile, combined with
resources available on the dark web could help a hacker to impersonate someone
and take advantage of his/her information.
For example, knowing the middle name, the year, and the place
of birth of a person would be enough to locate and buy a social security number
on the dark web. This hacker can now access corporate systems and divisions
that request a social security number for identification.
Digital Footprint Management
People should be aware of the management of their
digital footprints, companies too need processes and tools to manage their own.
A large company has numerous websites, social media accounts, servers, IP ranges,
ASN, databases, repositories, cloud storage servers, and other Internet-oriented
assets. There are generally many more assets that the company does not know,
such as ad-hoc sites and services, temporary quality control environments
(which often remain permanent) and all kinds of Internet-oriented services,
which were probably created by old employees, but now they’re forgotten.
The digital footprints that people leave on the internet make it easier for hackers to bypass security systems. And while companies continue to impose stricter security policies each year, the human factor requires specialized training in enterprise data protection services. Companies need to find ways to monitor and reduce digital footprints so that hackers have less information than they can leverage to get into their systems.
Some of the ways of managing the risk of digital footprint are listed below:
- Limit the data you share.
- Delete old accounts and data.
- Don't use third-party logins.
- Use secure websites.
- Avoid public Wi-Fi.
- Keep your software updated.
- Update privacy settings for platforms and apps.
- Limit social media sharing.
Ethics in ICT
Ethics is a moral principle that
governs a person's behavior or the conduct of an activity. Computer ethics
is the application of moral principles to the use of computers and the
Internet. Some of the ethics in ICT are listed below:
1.
Recognition for personal and
corporate ethics associated with ICT
2.
Intellectual Property Rights issue (Trademark,
patent, copyright, trade secrets)
3.
Non-violation of privacy and
associated rights against electronic information data mining
4.
Opportunity to control crime with
ICT
5.
Legal issues and limitations
6.
Consequences of using ICT
7.
Professional responsibilities
Ethical challenges and their issues
Information Communication Technology has a
wide area of applications in education, business, health, Industries, banking,
sector and scientific research at a large level. With the leading advancement
in information communication technology, it is necessary to have the knowledge
of important ethical issues some of them are discussed below:
Security issues
There are many current issues concerning
Information Systems security. Some of these issues include spamming,
hacking, jamming, malicious software, sniffing, spoofing, and identity theft;
each one of these problems fit under one of two headings, computer abuse or
computer crime.
Privacy issues
As much as computer technology has enabled us
to seek and find relevant information online it has also explored our freedom
of privacy. There are so many ways our privacy is exploited by the use of the internet
webcams and closed-circuit cameras which an experienced computer user can turn
on any webcam of any computer online and you will have access to the privacy e
of people's lives.
Copyright issues
Computer technology has made it easier for users
to access any information at any given time. With the increased development of
music sharing networks and photo-bookmarking sites, many original creators of
these words are losing the credibility of their works because users of
computers can easily get access and share their data with friends.
Digital divide issues
Computer technology has many opportunities in
urban areas but in remote areas, they do not ever have power. There is a huge
gap between have and have not. Information Technology tools like computers
cannot be used there. In other sectors like education, most of these developing
countries have poor old education systems so a student will not be aware of new
Information Technologies.
Social Media
Social media are the particular websites and
applications that are designed to allow people to share data, information, and
content quickly, effectively, and in real-time. Social media is Computer Based
technology that facilitates the sharing of ideas, thoughts, and information
through the building of virtual networks and communications. By design social
media is internet-based and gives users quick electronic communication of
content and includes personal information documents videos and photos. Users
engage with social media via computer, tablet, smartphones with web-based
software and web applications. Some of the popular social media are Facebook,
Twitter, Instagram, YouTube, Tiktok, WhatsApp, WeChat, Messenger, etc.
Facebook is a popular free social media that
allows registered users to create profiles, upload photos and videos, send
messages and keep in touch with friends and family. It is the biggest social
media site around with more than 2 billion people using it every month.
Facebook was developed by Mark Zuckerberg and Edward Savarin in February 2004
A.D.
Twitter is a social media site for news
entertainment, sports for politics, and more. What makes Twitter different from
most social media sites is that it has a strong emphasis on real-time
information, things that are happening right now. It was created by Jack
Dorsey, Noah Glass, Biz Stone, and Evan Williams in July 2006 A.D.
YouTube
Youtube |
YouTube is a video-sharing platform where users
watch billions of hours of videos every day. To get started we can create a
YouTube channel for brands where we can upload videos for our subscribers to
view, like, comment and share. This site was developed by Chad Hurley, Steve
Chen and Jawed Karim in February 2005 A.D.
WhatsApp is a messaging app used by people in
over 180 countries. Initially, WhatsApp was only used by people to communicate
with their family and friends. Gradually people started communicating with
businesses Via WhatsApp. It was developed by Jan Koum and Brian Acton in
January 2009 A.D.
Instagram is a photo and video sharing social
media app that allows sharing a wide range of content such as photos, videos,
stories, and live videos. It is owned by Facebook Inc. and created by Kerin
Systrom and Mike Kridger.
TikTok |
Tik Tok
Tik Tok is a rising music video social network.
It was the world's most downloaded app in the first quarter of 2018 beating
Facebook, Instagram, and other social media apps. It is owned by Byte Dance, a
Beijing-based company and founded by Zhang Yiming in 2012 A.D.
WeChat grew from a messaging app just like
WhatsApp and Messenger into all in one platform. Besides, messaging and calling
users can now use WeChat to shop online and make payments offline, transfer
money, make reservations, book taxis, and more.
Opportunities of social media
1.
Worldwide connectivity
2.
Real-time information sharing
3.
Targeted advertising
4.
Increased new cycle speed
5.
Trusted reference
6. Professional growth
Risk of social media
1.
Counterattack
2.
Risk of fraud
3.
Corporate attack of privacy
4.
Decrease in civil behavior
5. Depression and loneliness
Electronic
Transaction Act 2063
ETA (Electronic Transaction and Digital
Signature Act - Ordinance) is also known as the cyber law of Nepal. It was
formulated in 30th Bhadra 2061 BS (15th September 2004 AD) but the Government
of Nepal (House of Representative) approved the Electronic Transaction Act -
2063 only on 4th December 2006 AD. The electronic transaction is a transaction
of electronic records data by using any type of electronic means. It contains
electronic records and valid digital media and the exchange of all types of
records which are in the form of electronic. An act that is related to
electronic transactions is called the electronic transaction act.
Objectives
of the Electronic Transaction Act 2063
1. To make legal provisions for authentication and
regulation of electronic data.
2. To make a reliable date generation,
communication, and transmission.
3. To make a secure and authentic means of
electronic communication.
4. To regulate all the relating matters of
electronic transactions.
Scopes
of the Electronic Transaction Act 2063
1. Creation and use of digital signature
2. Control cyber/computer-related crimes.
3. Protection of intellectual property.
4. Protection of confidentiality.
5. Regulations of an electronic transaction by establishing
regulating bodies such as
– Office of Certificate Control (OCC)
– Certificate Agencies (CA)
– Subscribers
Major
provisions of the Electronic Transaction Act 2063
1. It has the provision relating to electronic
records and digital signature.
2. It has the provision relating to dispatch,
receive an acknowledgment of electronic records.
3. It has the provision of few regulating
bodies and their functions, rights, and duties such as –
– Office of Certificate Control (OCC)
– Certification Agencies (CA)
– Subscriber
4. It has the provision relating the use of
digital signature and certificate.
5. It has the provision relating to government
use of the digital signature.
6. It has a provision relating to the computer
network and network services providers.
7. It has the provision relating to
computer-related crimes and punishments.
8. Provision of IT tribunal is defined as the
first jurisdictional and appellate jurisdiction.
IT tribunal
– First Jurisdictional
– Appellate Jurisdictional
9. It defines a few documents which this act is
not applicable for
– All the negotiable instruments defined by the
“Negotiable Instrument Act 2034”
– All the documents related to the ownership of
properties (dhanipurja, laalpurja ect).
– Any documents which are used as a primary
document in the court process
Cyber
Crime
Any illegal activities committed with the help of a computer and the internet is known as cybercrime. Cybercrime is a crime committed by using cyber
means/computer technology. Cybercrime is also known as computer-related crime.
All the illegal activities committed by using or with the application of computer technology are cybercrime such as –
1. Damage to computer and computer system.
2. Acts to gain illegal access into the system.
3. Use as weapons to commit other crimes.
4. Acts against the provision of cyber law.
Some
examples of cyber/computer crimes are
• Creating fake documents
• Blackmailing/social media
abuse
• Distribution of pornography
materials
• Misuse of electronic cards
• Piracy of intellectual
properties
• Spreading computer
viruses/malware
Major
computer-related crimes and punishments
Crime |
Punishments |
Pirate/ Destroy/Alter computer source code Unauthorized access to the computer
system Damage to computer and computer system |
Up to 3 years of imprisonment, or up to 2
lakh fine or both |
Distribution of electronic materials in
electronic form – Not to publish the prohibited materials which are
prohibited by prevailing laws, the materials which may create jeopardy in
social harmony, spread hate, and jealousy, materials which may create
harassment to women trafficking, pornography materials |
Up to 5 years’ imprisonment or up to 1 lakh
or both |
Disclose of Confidentiality Deform false statements by parties at the time
of the electronic transaction |
Up to 2 years’ imprisonment or 1 lakh fine of
both
|
Display and submit false licenses for
electronic means |
Only display 1 lakh fine
Display + submit and perform = 2 years’
imprisonment or 1 lakh fine or both |
Non-submission of prescribed statements
|
Up to 50,000 fine |
Computer fraud
|
Fine up to 1 lakh and 2 years of imprisonment
or both
|
Nepal's National Information and Communication Technology (ICT) Policy,
2015 (2072 BS)
Nepal’s National
Information and Communication Technology (ICT) Policy, 2015
This ICT Policy was announced in August 2015.
Background
Information and Communication Technologies are
increasingly at the core of strategies aimed at securing the goals of
sustainable development and stimulating economic growth in countries around the
world. Among others, these technologies are shaping the way social interaction
takes place and public services are delivered in some fundamental ways. It is
precisely along these lines that the Government of Nepal has placed a great
deal of importance on the transformative potential of ICTs and
positioning these technologies within the larger context of its far-reaching
developmental aspirations premised around poverty reduction as an overarching
goal.
ICTs assume particular significance in the light
of fact that efficiency more than ever is now an indicator of competitiveness.
As such, nations, private sector entities, and people that find the means to
become more efficient will advance and prosper. Among others, ICTs hold
the potential to help create conditions for better governance, with more
transparent and efficient bureaucracies. Similarly, ICTs can help address
structural problems in education systems enabling expanded access to education
services as well as help bridge quality gaps in education. ICTs can also
significantly improve the health sector by enabling expanded outreach to
health care services and driving efficiency through the system.
In addition to the roles these technologies
play in development, the sector also offers tremendous prospects for
economic growth and employment creation through the enablement of IT-ITeS/BPO based
business models.
It is within these contexts that the Government of Nepal has
accorded a high level of policy emphasis for the development ICT sector. Nepal
has the opportunity to make a difference by adopting and using ICT as a tool
available to reduce the development divide and increase the chances of
improving the quality of life of the citizens.
Apart from opportunities, however, the ever-evolving nature of ICTs also offers a host of challenges from policy
perspectives. For one, fast-paced technological innovations in the ICT domain come
attendant with far-reaching policy implications that traditional policy
formulation approaches fail to address properly. As a result, existing policy
provisions in Nepal need to be revisited in the light of the dynamism that
characterizes the sector.
This policy is premised around the realization
that there is an urgent need to formulate strategic responses to account for
technological trends shaping the ICT sector. Formulating policy responses in
alignment with the dynamism of the sector becomes all the more important given
the need to adequately factor in key strategic imperatives impinging on faster
uptake of ICTs in the country, namely issues surrounding cybersecurity, data
protection, privacy, and respect for intellectual property rights. Equally
important is the need to address the challenges posed by technological
convergence especially from regulatory and governance perspectives. Given that
telecom connectivity is fast expanding across the country, inching closer to
saturation point, the focus should now also shift on demand-side
fundamentals that need to be strengthened in order to ensure strategically
alignment of resourcefulness offered by ICTs with our growth and development
aspirations.
Vision of IT Policy of Nepal 2072
"To transform Nepal into an information and knowledge-based
society and economy."
Mission of IT Policy of Nepal 2072
To create conditions for the intensified development and growth of
ICT sector as a key driver for Nepal's sustainable development and poverty
reduction strategies.
The implementation of this Policy shall be guided, among other things by the right of access to information as well as the need to promote transparency, fairness and accountability in the delivery of government services and execution of roles and responsibilities of government agencies.
1. This policy is intended to create the foundational groundwork for an overarching vision of “Digital Nepal”. As per this vision, Information and Communication Technology will be a key driving force in transforming Nepali society into knowledge and information based society and strengthening Nepal's pursuit of equality and sustainable growth by leveraging Information and communication technology.
2. The implementation of this policy will be Government-led and Private Sector-driven. Public-Private Partnerships (PPP) shall form one of the bases for the implementation of this policy especially in matters and projects of national character and importance. Government shall take leadership mainly in facilitating the mobilization of investment and resources required for the development of national telecommunications infrastructure backbones with a particular focus on expanding access to broadband, as well as the full implementation of this policy.
3. This policy is primarily designed to guide and mainstream the use of ICTs in all sectors of the Nepalese economy within the overall context of socio-economic development and poverty reduction agenda pursued by the country.
4. In order for this policy to make a meaningful impact on social and economic development of the country, the policy goals, objectives and strategies shall also be linked with the overall national developmental objectives, priorities, and programs such as the periodic development plans formulated by National Planning Commission. This policy will therefore form a basis for all sectors to draw their respective ICT strategies from.
5. Infrastructural synergies shall be promoted while upgrading existing and developing new infrastructure such as roads and electric power and facilitating the cost-effective roll-out of telecommunications and broadband infrastructure aimed at supporting the goals of the policy.
6. This policy shall be supported by appropriate legislation/directives aimed at effective separation of roles and responsibilities for policy formulation/guidance, regulation, and operation in order to ensure transparent and effective regulatory functions based on emerging trends of convergence and establish institutional mechanisms for policy implementation.
7. The implementation of this policy shall take into account relevant regional and global strategies and best practices in transforming the nation into a knowledge-based society by cultivating strong linkages with the UN Millennium Development Goals (MDGs), WSIS beyond 2015, WTO, Broadband Commission, UN-ESCAP, post-2015 sustainable development agenda, etc.
8. Nepal will continue to uphold the principle of freedom of expression on the Internet and net neutrality.
9. The policy intends to promote platform-neutral services in e-governance.
Objectives of National Information and Communication
Technology Policy
1. To empower and facilitate Nepal’s participation in the
Global Knowledge Society.
2. To transform the Government service delivery regime by
promoting transparency, efficiency, inclusiveness, and participation
through effective utilization of information and communication
technologies.
3. To promote ICT to further productivity among the
sectors that are key drivers of the national economy.
4. To foster efficient, interoperable, secure, reliable
and sustainable national ICT infrastructure in alignment with grass-root needs,
and compliant with regional and international standards.
5. To promote research and innovation on the role of ICT
on the resilience of low-income communities amid potential environmental,
economic and social shocks.
6. To further streamline clear strategies and obligations
for licensed ICT service providers with respect to universal access/service
goals and Quality of Service (QoS) and ensure cost-effective connectivity to
ICT services such as Internet, E-Commerce and E-Government services.
7. To promote cost-effective and qualitative last-mile
access technologies for providing secure access to the internet including
commercial and public information services, E-Government applications by
communities (including the disadvantaged and physically challenged) especially
in rural and underserved areas.
8. To create easily accessible, affordable, and
innovative public access points under a comprehensive E-Community/ Village
network initiative.
9. To create a favorable environment for cooperation and
partnership in ICT among public and private sectors, civil society, and between
all stakeholders at local, national, regional, and international levels.
10. To increase the institutional capacity along with
infrastructure and human resource dimensions in public and private educational
institutions including schools, colleges/ universities that offer ICT courses
and use ICTs for pedagogical purposes; To create a conducive environment
for increasing annual enrolment and output of students in key professional
skills areas such as telecommunications/electronics engineering, computer
science/IT, etc. and promote market-driven skills development initiatives in
ICT.
11. To deploy ICTs at all levels of Nepali the educational
system in order to improve educational outcomes while expanding access to
education and training facilities.
12. To support local and indigenous content development as
well as applications targeting the capturing, archiving and dissemination of
local and indigenous knowledge, content, and information resources as well as
the promotion of diverse linguistic and cultural heritage of Nepal.
13. To facilitate the participation of youths and women in
ICTs particularly in media and content development initiatives.
14. To address gender-based inequalities and promote
gender-sensitive measures to encourage the active participation of women in
national and community-based ICT initiatives.
15. To promote the use of free and open-source software as
well as an open standard in software development for government agencies.
16. To create an innovative, market-responsive, highly
competitive, and well-regulated ICT industry.
17. To promote joint venture initiatives for local
entrepreneurs with international private investors in the provision of public
ICT goods and services in order to catalyze the growth of the sector.
18. To help develop ICT business incubators and promote
start-up projects in close coordination with the private sector through the
creation of a supportive eco-system.
19. To create a favorable business environment and promote
Nepal as an attractive destination for ICT-related investments, especially in
the area of IT-ITES/BPO, within the region and on the international market.
20. To restructure the ICT market and technological base
with a view to making the ICT sector a significant contributor to the social
and economic development of the country.
21. To create conditions for the intensified roll-out of
national telecommunications infrastructure backbone as a way to expand
broadband-based ICT services across the country.
22. To ensure an integrated, coordinated and synergistic
approach towards the development and deployment of ICTs including other
supporting physical infrastructures such as electricity and transport
infrastructure.
23. To minimize duplication and costs through
infrastructure sharing among public and private sector investment projects and
to create an efficient and cost-effective Government-wide communications
network infrastructure linking national, provincial, and district
administration.
24. To facilitate regional economic integration by
utilizing regional and international telecommunications infrastructure projects
and Asian Information Superhighway infrastructure initiatives.
25. To safeguard public sector information and investment
against negative impacts of deploying and using ICTs.
26. To promote a stable, fair, and competitive investment
climate to facilitate the development of e-Trade and E-Commerce activities in
the country.
27. To develop a highly competitive ICT industry capable
of serving as the engine for driving Nepal's active participation in global
trade;
28. To facilitate the adoption of E-Commerce especially by
SMEs in agriculture, tourism, and manufacturing as well as non-traditional
exports to ensure productivity and growth.
29. To increase the competitiveness of farmers in
production, processing, and marketing of agricultural products and services
through the effective and outcome-oriented utilization of ICTs.
30. To promote the development of ICT entrepreneurs at SME
level as part of the rural agro-business industry development and strengthen
the development, application of ICTs in agriculture.
31. To improve communication systems across the country
especially in areas of touristic interest to support tourism development in the
country.
32. To use ICTs in the documentation, promotion and
effective marketing of the full potential of Nepal's world-class and niche
tourist destinations to the local, regional and international market.
33. To ensure that all ICT related activities have very
minimal negative environmental impact during construction, operation and
disposal/de-commissioning.
34. To conserve natural resources and safeguard Nepal's
heritage using ICT tools.
35. To support the development of the mid-to-long term
basic planning that provides policy direction and tasks for e-Government.
36. To support the formulation of development strategy for
ICT converged services to support and plan for mid-to-long term resolution for
overcoming the digital divide.
37. To ensure all installed ICT infrastructure and capacity is utilized effectively and contributes to resilience and redundancy.
Strategies of IT Policy
of Nepal 2072
1. Human Resource Development
2. ICT in education, research & development
3. Access, media, and Content
4. ICT Industry
5. ICT for Government service innovation and good governance
6.
SME (Small and Medium Enterprises) and e-Commerce
7. Telecommunications infrastructure
8. ICT in agriculture
9.ICT in Health
10. ICT in Tourism
11. Telecommunication/ICTS in mitigating the impact of climate
change
12. ICT in the environment and natural Resources
13. Telecommunication/ICTS for natural disaster preparedness,
mitigation, and relief
14. Human exposure to Electromagnetic fields and safe disposal of
electronic waste
15. Conformance, Interoperability, and Standards in
telecommunications/ICT
16. Cloud Computing
17. Access to telecommunications/ICTS in rural and remote areas
18. Access to Telecommunications/ICT services for persons with
disabilities and specific needs
19. ICTs for Youth, women, and girls
20. Building confidence and Security in the use of ICTS
Institutional arrangement
A National Information and Communication Technology Policy Implementation Steering Committee will be formed at the Ministry of Information Technology and Communication with the following structure.
Hon. Minister, Ministry of Information and Communication
Technology -Chairperson
Member, National Planning Commission -Member
Secretary, Ministry of Education -Member
Secretary, Ministry of Health -Member
Secretary, Ministry of Agriculture -Member
Secretary, Ministry of Finance -Member
Secretary, Ministry of Local Development -Member
Secretary, Ministry of Information and Communication -Member
Chairman, Nepal Telecommunications Authority -Member
Representative Private Sector / Domain Expert -2 Members
Joint-Secretary (Policy and Program),
Ministry of Information and Communication Member-Secretary
The primary role of the Information and Communication Technology
Policy Implementation Steering Committee is to provide overall coordination
support for the effective implementation of policy provisions along with
monitoring and evaluation of policy interventions.
The Steering Committee will form an ICT Policy Implementation
Sub-Committee comprising of representation from the stakeholder community and
domain experts, including the private sector, to provide it with domain
specific expert advice and recommendations in relation to the execution of
policy provisions.
Formulation of National ICT Master Plan/National e-strategies
The policy and strategy framework will be implemented through
National ICT Master plan/National e-strategies to be developed and endorsed by
the Government of Nepal.
Resource Mobilization
The overall goals of Information and Communication Technology
Policy will be achieved through the mobilization of both public and private
sector resources. The proposed policy framework is expected to create
conditions for private sector investment in the sector complemented by public
sector resource mobilization based, among others, upon universal service
obligation commitments through the use of RTDF. The possible grants and
technical assistance from bilateral, multilateral, and other international
agencies could also be used.
Legal and regulatory arrangements
Appropriate Legal and regulatory arrangements will be made for the
implementation of this policy and provisions therein if deemed necessary.
Monitoring
and evaluation
A framework will be developed within the fiscal
year 2072/73 (2015/16) to serve as a basis for carrying out periodic monitoring
and evaluation of the execution of Information and Communication Technology
Policy and ICT master plan. It will be the primary responsibility of
Implementation Steering Committee to carry out monitoring and evaluation of
programs and policy provisions relating to ICT services and infrastructure
build-out.
Assumptions and Risks
The following constitutes key assumptions and
risk perceptions in relation to the proposed Information and Communication
Technology Policy.
Assumptions:
ICT as one of the core elements of development
agenda will enjoy high level of political commitment in the days ahead
resulting in significant resource commitments on harnessing ICTs to achieve
policy outcomes across sectors
There will be intensified demand for ICT services
driven by increased public sector deployment of ICT application and services,
thereby creating conditions for more private sector investment in the sector
Necessary legal and regulatory reforms in the area
of licensing and spectrum governance will be taken in an urgent basis to
promote investment in the sector
Risks:
Overall investment climate might be compromised
on account of delays in much needed legal, regulatory, and institutional reforms
The continuing challenges associated with chronic
power shortages could dampen the overall demand for ICT services and create
disincentive for investment
Lack of oversight giving rise to skewed, purely
market-driven expansion of ICT services resulting in the exclusion of the
communities outside urban areas resulting in a widening digital divide
Ethical and Social Issues in ICT Class 10 Computer Science Important Question And Answers
Comments
Post a Comment