NATIONAL FLAG (ONLY TRIANGULAR FLAG IN THE WORLD) Calm and friendliness of Nepalese Inherent bravery and boldness National color, blood of human beings Triangular halves symbol of Hinduism and Buddhism Peace and harmony
W HAT IS MILITARY LEVEL GUIDANCE REGARDING CYBER SPACE ? Research and development directorate,Computer wing. Army intranet No privilege of army cyber group /dept
C AUSE FOR E- T RANSACTION A CT In Nepal, organization, business houses started using the electronic transactions when the government was lacking the law, rules and regulations.
E LECTRONIC T RANSACTION ACT AS CYBER LAW IN TO EFFECT A cyber crime (electronic transaction) legislation committee on February 4, 2004 presented an ordinance to House of Representatives. The House of Representatives on March 4, 2004, made a recommendation for an Act was first enacted as an ordinance. Enacted as an act on 2006 and entered into force.
M AIN P URPOSE OF THE CYBER L AW The main purpose of this act (law) is to legalize the electronic transactions and digital signatures for both private and public transactions This act has 12 sections and 79 clauses. Electronic Transaction Act 2006 is addressed in the capacity of cyber law.
W HAT CYBER POLICY HAS BEEN DEVELOPED ? The act has clearly defined the rights, duty and authorities of the subscribers, network service provider etc. The act had provision of separate judicial bodies, IT Tribunal and Appellate Tribunal. The both Tribunal look into all cases related to computer crime and the cyber crime. The IT tribunal is headed by the District Court Judge and has 3 members.
L IMITATIONS FOR CYBER CRIME COMPLAINTS The Cyber law 2006 dictates the limitation for complaint with in 35 days of first knowhow of crime and breaching of the cyber law Dealt by Nepal Police.
C YBER C RIME AND PUNISHMENT The punishment varies from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to discourage the cyber crime.
H OW DO YOU ASSESS YOUR IA CULTURE ? Computer crimes increasingly are prone to have international dimensions. Challenges faced on the international front include:; locating and identifying perpetrators across borders. The government of Nepal is working with foreign governments through many channels to address global threats related to cyber crime as well.
B IG CYBER THREATS E-mail Threats Trafficking Tampering with computer source documents Dissemination of false information Hacking Identity theft and invasion of privacy Internet fraud ATM fraud Networking business fraud
B IG CYBER THREATS Creating Computer viruses Sabotage and denial of e- service (Trojan Horse) Hijacking of government and corporation web sites Theft of intellectual property Online abuses
H OW DO YOU ASSESS YOUR CURRENT CYBER POSTURE ? Army personnel are aware regarding cyber threats. Conduction of cyber security and computer training to all ranks. No classified matters put in army intranet and army website. Concept of NP-CERT. Control mechanism by ministry of comn and information.