mid regional police hetauda cyber crime regualtion in nepal & regualtion in nepal presented by :...
TRANSCRIPT
Mid Regional PoliceHetauda
Cyber Crime& Regualtion in NepalRegualtion in Nepal
Presented by :Suresh Kumar ThapaInspector of Police
In general words, we can refer to cyber crime as a crime performed using computers or a network.
Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.
What is Cyber Crime ?
Hacking
Software piracy
Harassment via e-mail
Cyber pornography
Defamation
Morphing
Phishing
Impostor
Types of Cyber Crime ?
Hacking
Unauthorized access to a computer system or network without the permission of the computer owner/user.
Software piracy
Theft of software through the iillegal copying/cracking of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
Harassment via e-mails :
Regular sending of harrassing/ Threatening/ Unneccessary emails to someone's email account.
Cyber Pornography
Login into porno sites, publish, Print, download and transmit pornographic pictures, photos, writings etc).
Defamation
The action of damaging the good reputation of someone; an abusive attack on a person's character or good name
Morphing
Change or cause to change smoothly from one image to another by small gradual steps using computer animation techniques
Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by trustworthy entity in an electronic communication.
Impostor
A person who pretends to be someone else in order to deceive others, esp. for fraudulent gain by creating others profile in social network sites like Facebook, twitter, hi5 etc.
Electronic Transaction Act - 2006
To secure and make reliable electronice Transaction, Electronic Transaction Act 2006 was introduced, which states the types of cyber crime in Chapter-9, Section 44-59 :
44. To Pirate, Destroy or Alter computer source code (sDKo'6/ >f]t ;Í]tsf] rf]]/L, gi6 jf kl/jt{g ug{] )
45. Unauthorized Access in Computer Materials (sDKo'6/ ;fdu|Ldf cglws[t kx'Fr )
46. Damage to any Computer and Information System (sDKo'6/ / ;"rgf k|0ffnLdf Iflt k'¥ofpg )
47. Publication of illegal materials in electronic form (ljB'tLo :j?kdf u}/sfg"gL s'/f k|sfzg ug]{)
48. Confidentiality to Divulge (uf]kgLotf eË ug]{ )52. To commit computer fraud (sDKo'6/ hfn;fhL ug]{ )
Complaint :
The Electronic Transaction Act (ETA)(cyber law) 2006 dictates the limitation for complaint with in 35 days of first know-how of crime or being victimized.
Prosecution :
District Police Office Or the Police Office that has authority to prosecute will furnish initial investigation and forward the case to respective District Court (right now, only Kathmandu District Court )
Legal Issues – Complaint, Investigation and Prosecution
Legal Issues – Complaint, Investigation and Prosecution
Punishment and Penalty :
In an attempt to discourage the cyber crime the prevailing law ETA -2006 explains the punishment of at least 6 months to 5 years of jail term and fine of NRs.50,000 to NRs.2,00,000 or both depending on the severity of the crime.
Efforts of Nepal Police to combat Cyber Crime
Installation of dedicated ICT Crime Investigation Cell
Establishment of Digital Forensic Lab at PHQ, Computer
Directorate
Public awareness programs
Deployment of IT police personnel (Cyber Cops)
Coordination with Cyber Cafe's to keep the details of the users
Networking with Interpol and other High-Tech Crime Control
Centers
Cyber Crimes Complaint Recorded In Crime Division
Many threat and extortion e-mails
Many renowned companies received spam mails from proxy hot
mails, yahoo, G-mail demanding money on the name of mainly
insurgents groups and so called armed groups.
Phishing
Hacking of newspaper's website by replacing the original content
with threat to attack.
Mutilation of a girl’s image and pasted on the porno site
Impostor or Impersonating Profile (Facebook)
Cyber security and ethics
Use anti-virus software and firewalls - keep them upto date
Keep your operating system up to date with critical security
updates and patches
Don't open emails or attachments from unknownsources
Use hard-to-guess passwords (use of symbolic and alpha numeric
letters). Don’t use words found in a dictionary.
Back-up your computer data on disks or CDs oftensources
Don't share access to your computers with strangers
If you have a wi-fi network, password protect it
Disconnect from the Internet when not in use
Sec_rity is not complete without 'U'
Online complaints and suggestions at [email protected]
Mid Regional Police Office, HetuadaMakwanpur
Office : 057-521499Fax : 057-521498
e-mail : [email protected]