Skip to main content

CYBER CRIME, LAW AND ETHICS

Cyber Crime / Computer Crime
Cyber crime also known as Computer crime is criminal activity done using computers and the Internet. The most prominent form of cyber crime is identity thief, in which criminals use the Internet to steal personal information from other users. Two of the most common ways to do such crimes are phishing and pharming. Both of these methods attracts users to fake websites, where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to “steal” another person’s identity. Using illegally obtained data, the criminal can open accounts, tires are wide range of goods and services, and then abandon the accounts. This leaves the victim in the position of having to deal with huge debts that he or she cannot generate. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. For this reason, it is better to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information.

Some of the common cyber crime are:
▪ Software Piracy: 
Software piracy is the act of illegally using, copying or distributing software without purchasing the software or having the legal rights. The majority of software purchased today is purchased as a one-site license, that means only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple licenses is illegal and considered as software piracy.

▪ Hacking:
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Computer hacking is most common among teenagers and youth adults.

▪ Cracking:
Cracking is the process of breaking into copyrighted software or an information system with the intend of releasing software so that it can be used without paying royalties. Cracking is done by the persons known as cracker who steal the confidential data, acquire free access to perform the malicious destructions of files.

▪ Pornography: 
Pornography refers to the material that illustrate sexual behavior and is intended to cause sexual excitement. In other word, Pornography is the explicit illustrate of sexual subject matter for the purpose of sexual satisfaction. Pornography on the Internet is available in different formats. These range from pictures and short animated movies, to sound files and stories. Internet also makes it possible to discuss sex, see live sex acts, and arrange sexual activities from computer screens.

▪ Plagiarism:
Plagiarism is the act oftaking another person’s writing, conversation, song, or even idea and passing it of as own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. It is not enough to just list the source in a bibliography at the end of the paper. Failing to properly quote, cite or acknowledge someone else’s words or ideas with an internal stating is plagiarism. 

▪ Harassment:
The harassment is any kind of behavior that is intended to upset, disturb, alarm or terrorize someone. The person carrying out the harassment might be a neighbor or groups of people living nearby, an ex-partner, family members or someone at work or school. It is the act of insulting, irritating the some one on the basis of gender, cast, religion, etc.


Cyber Law
In order to maintain harmony and co-existence of people in cyberspace, there is a need for a legal regime called as Cyber Law. Cyber Law is a term used to describe the legal issues related to the information technology, particularly Cyberspace. The growth of Cyberspace has resulted in the development of a new and highly specialized branch of law called cyber laws. Cyber Laws are the basic laws of a society and hence have implications on every aspect of the Cyber Society such as Governance, Business, Crimes, Entertainment, Information Delivery, Education etc.

The Cyber Law includes rules and regulations established to govern, prevent and resolve disputes that arise from the use of computers and the Internet. Cyber Law includes an ample variety of political and legal issues related to the Internet and other communication technology, intellectual property, privacy, freedom of expression and public access to information. Proper cyber law must govern all the cyber activities.

Following are the areas covered by cyber law.
▪ Digital Signature Law:
A digital signature is the security mechanism system in the cyber space. It is a digital identity of the sender that uniquely identifies particular sender electronically. Digital signature is used in the Internet for the secure transaction. Digital signature using two different keys for authentication; one for creating a digital signature or transforming data into a seemingly unintelligible form (private key) and another key is used for verifying a digital signature or returning a message to its original form (public key).

▪ Copyright Law:
The copyright act prevents the unauthorized copy off of work of authorship. However only the copying of work is prohibited but anyone can copy the ideas contained within the work. For example: a copyright could cover the written description of the machine but actual machine itself is not covered. Thus no one could copy the written description, while anyone could use the description to build a described machine.

Copyright can be registered in copyright office but newly created work does not need to be registered. However, the copyright act does provide additional benefits to those who registered with the copyright office. But the copyright registration and the use of copyright notice is recommended.

▪ Trademark Law:
Trademark law governs the use of a device (including word, phrase, symbol, product shape and logo) by a manufacturer to identify its goods and to distinguish those goods from those made or sold by another. Service marks, which are used on services rather than goods, are also governed by trademark law. However to obtain the greatest protection to a mark, it is almost always advisable to register the mark. A mark which is registered in the registration office should use the symbol (®). Unregistered trademark should be marked with a (™).

▪ Telecommunication Law:
Development in telecommunication has been rapid since some years. Almost all people are using the facility provided in telecommunication tools to share message from one location to other, to transfer the database from one location to another in the form of electronic data. We can transmit voice calls concerning the important issues and many more. In such transmission of voice or messages over the telecommunication system, many leakages might be done by the criminals on the data. Therefore, the telecommunication system also falls within the territory of the cyber space and forms a part of the cyber law.

▪ Data Protection and Privacy Law:
People are using computers to store the valuable data and data for the purpose of transmission from one location to other location. Data protection is the process of securing data from various disasters. Data plate AC is the second year in data without sharing with anybody else. Data protection and privacy law prevents the data from unauthorized access and punishes the criminals who steal the private data.


Computer Ethics 
Computer ethics can be defined as the set of moral principles that regulate the use of computers.
Or, 
Computer ethics is a system of moral standards or values used as a guideline for computer users.

Each society forms a set of rules that establishes the boundaries of generally accepted behavior. Those rules are often expressed in statements about how people should be behave and they fit together to form the moral code by which a society lives. Ethics is the set of beliefs about right and wrong behavior. Ethical behavior conforms Who generally excepted social norms, many of which are almost universal. Virtues are habits that incline people to do what is acceptable and vices are habits of unacceptable behavior. People’s virtues and vices held define their value system the complex scheme of moral values by which they live.

Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (digital) content, computer ethics would suggest that it is wrong to do without the author’s approval. And while it may be possible to access someone’s personal information on a computer system, computer ethics would advise that such an action is unethical.

The Commandments of Computer Ethics

Some commandments of computer ethics are as follows:
1. You shall not use a computer to harm other people.
2. You shall not interfere with other people’s work.
3. You shall not snoop around in other people’s computer files.
4. You shall not use a computer to steal privacy of other peoples.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you have not paid.
7. You shall not use other people’s computer resources without authorization or proper compensation.
8. You shall not appropriate other people’s intellectual output.
9. You shall think about the social consequences of the program you are writing or the system you are designing.
10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans.

Comments

Popular posts from this blog

Create a Free .com.np Website In Nepal 2020

Create A Free .com.np Website In Nepal If you are looking for a free, easy and step-by-step guide on how to start a lifetime free .com.np blog then, you have come to the right place. I will try my best to guide you through this procedure.

This article has been enormously helpful for viewers. Take a look!

Everybody wishes to have their own website especially students(ICT), online researchers, gamers, etc but what comes in between us and our own website(blog) is the expensive price of the domain name and web hosting service. So today, I am here to teach you, how to create a website for free with .com.np domain andhostitusingfreewebhostingservices.

There are a number of online companies providing free websites (domain name with web hosting) like WordPress, Blogger, Wix, etc but with something fishy going on.

Owning your own domain name looks far more professional than having your site on someone else’s domain (like www.yourdomain.freewebsite.com), and it’s super affordable(free in NEPAL…

Greater Nepal | Greater Nepal In Quest Of Boundary | Undivided Nepal

Greater Nepal In Quest Of Boundary
Greater Nepal or Akhand Nepal, or Parajuli Empire are irredentist terms literally meaning "Undivided Nepal"
#GreaterNepal

Greater Nepal is a concept of Nepal extending beyond its present boundaries to include present-day Indian territories controlled briefly by the Gurkha army after defeating some South Asian kingdoms in wars fought from 1791 to 1804 but ceded to the East India Company under the Sugauli Treaty (treaty for Partition of Nepal) after the Gurkha king was defeated in 1814–16 Anglo-Nepalese War. In 1813, the historical Greater Nepal extended from the Sutlej to the Tista, spanning 1500 kilometers. Rule over this expanse was brief, however, and in the aftermath of the 1814-1815 war with the East India Company, the Gorkhali realm was whittled down considerably. The real-time Gorkhali presence in Garhwal was for over a decade; Kumaon for 25 years; and Sikkim for 33 years. The Treaty of Sugauli, between the Gorkhali king and the Company,…

Greater Nepal In Quest Of Boundary | India’s new political map places disputed territory of Kalapani inside its own borders on November 2, 2019

Greater Nepal In Quest Of BoundaryIndia’s new political map places disputed territory of Kalapani inside its own borders on November 2, 2019Nepal has long claimed Kalapani as part of its territory as per the Sugauli Treaty signed between Nepal and the then East India Company.



India's new political map (left) includes the disputed territory of Kalapani. Nepal's official map (right) also shows Kalapani inside its border. Map images via India's Home Ministry & Nepal's Survey Department




The Survey Department has taken issue with a new Indian political map that places the disputed territory of Kalapani within its territory, a scenario Nepali officials described as the “status quo”. The Indian Ministry of Home Affairs on Sunday released a new political map after India formally split up the disputed Jammu and Kashmir state into two federal territories, in line with an August move by the Narendra Modi government to rescind Kashmir’s autonomy. “Our technicians and officials hav…