Professional Documents
Culture Documents
Chapter: One: 1.1general Background
Chapter: One: 1.1general Background
Chapter: one
Introduction
1.1General Background
With the change in time and new discoveries in computer science, human life is no more
The last few decades of twentieth century have witnessed the radical changes taking place,
both in our lifestyle and computer technology concomitantly. The change is so rapid that
we cannot use the same software for a long time due to the modification in the new version.
We use computer and internet for various purposes in our daily life but we are not aware
about cyber ethics and computer code of conduct. Using of internet is growing rapidly now
a day it is the positive development on IT. Encompass of the internet using in every corner
of the world contribute on the development of the various sectors like education, health,
communication, administration, economic etc. But in the same way misuse and misconduct
of the internet arise various problems, loss and accident on the same sector. Such
misconduct and misuse of computer and internet are regarded as cybercrime. Especially
Computer crime, or cybercrime, is any crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.
Cybercrime is one of the important emerging issues of this modern era. Many people are
facing many kinds of problem because of cybercrime. Crime committed through computer
is not only the cybercrime but cybercrime include every criminal activities related with
2
information technology. We do not regard minor misconduct of computer and internet like
copying, unauthorized transfer etc. but they are also crime and may have adverse effects.
Financial Crime, Cyber Pornography, Sale of Illegal Articles, Intellectual Property Crimes,
Cyber Stalking, Forgery, Cyber Defamation, Email Bombing, Salami Attacks, Virus
Attacks, and Internet Time Theft etc. are the major cybercrimes. Computer trespass, cyber
bullying, cyber heist, cyber terrorism, economic and industrial espionage, hacking, internet
homicide, internet suicide, internet war, online predator, white color crime, etc. are the most
challenging issues related to cyber offences. In case of Nepal cybercrime is one of the
newly emerging problems and cases of cybercrimes are increasing day by day. There are
also cyber laws to control such cybercrime. And various cyber code of conduct is declared
to avoid misconduct of computer. There is Electronic Transaction Act, 2063 (2006) and
Regulations are in place in Nepal to control the cyber business and to legalizing all
CIB and Nepal police is also playing vital role to control cybercrime and to aware the
people about cybercrime and to control over crime. Most of the youth and teenagers are
abused through internet in Nepal. Youth and teenagers are involved to commit those types
of crimes and misconduct of computer. So it is the concern of present youth and teenagers
also. Others minor crimes related to cyber are spreading so vastly that it’s too hard to
control over it. So, we can regard cybercrime as one of the emerging problem of Nepal.
considered illicit by certain parties and which can be conducted through global electronic
networks. In Nepal, this issue of cybercrime is evolving as a burning issue. There is Electronic
3
Transaction Act, 2063 (2006) in Nepal to regulate cybercrime but it’s difficult to control
cybercrime. Following problems are identified during study for the seminar:
iv. Whether Nepal Government and Authorized bodies are playing effective role
iii. To examine policy and practice of Nepal Police and CIB regarding cyber crime
This study has attempted to find about the real concept about cybercrime its meaning, its
effects its history and preventive measure. It is the mirror to show the actual situation of
cybercrime privileged in Nepal and loopholes of Nepalese law regarding cybercrime. It focuses
on those tiny and careless activities which have adverse effects. Also it covered the unethical
activities and practice regarding conduct of computer, internet, piracy and electronic transaction.
This study is limited to concept, types and effect of cybercrime, short history of
cybercrime and historical development of information technology trend in Nepal and Nepalese
law regarding cybercrime. It focuses on the problems and resolutions of cybercrime. It critically
analysis the provisions of Electronic Transaction Act, 2063 (2006) related to cybercrime.
4
Basically, this study is limited to broacher published by CIB, Nepal law review 2012
PowerPoint presentation of Nepal Police, prevalent statutes of Nepal, books, terms papers,
journals, precedent regarding cybercrime, crime branch and various articles available on various
internet sites.
This research is based on doctrinal and non-doctrinal method. Data are collected from
both primary and secondary sources mostly found on internet sites, broachers, books, journals,
Chapter Two: Concept of cybercrime, it include meaning, types, nature, impact, recent trend of
cybercrime. It also includes preventive measures or method of cyber security and cyber ethics for
Chapter Three: History of cybercrime, it include history of cybercrime in world context and
Nepalese context.
Chapter Four: Situation of cybercrime and prevailing laws in Nepal, it include situation of
cybercrime in Nepal, prevailing law for regulation cyber conduct and cyber transaction and about
monitoring bodies.
Chapter: Two
Concept of Cybercrime
The term ‘cyber’ mainly indicates information technology. It has universal applicability to study.
It is closely associated with information sharing through computer in positive sense. In the same
way, if the information shares to all over the world in negative aspect that is called cybercrime is
prohibited by cyber law. The term ‘cyber law’ means the field of law dealing with computers and
internet, including such issues as intellectual property rights, freedom of expression and free
access to information.1
The offence which take place on or using the medium of the internet is known as
cybercrimes. Cybercrime is a kind of crime that happens in cyberspace, in the world of computer
and internet. There are various terminologies of the cybercrimes that are not easy access to many
people because of the limited knowledge. If the persons do not have knowledge regarding the
In general sense cybercrime is computer crime, it involves computer and network. In narrow
concept cybercrime is crime of computer conduct and internet. But in broader concept
cybercrime covers all types of crime involving computer and computer technology, network and
electronic transaction.
Offences that are committed against individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental harm to the
1
Shrestha, Shankar Kumar. Dictionary of law & justice, Kathmandu: Pairavi publication,2008
6
victim directly or in directly, using modern telecommunication networks such as internet and
mobile phones. Such crimes may threaten a nation’s security and financial health too.2
Dr. Debarati Halder and Dr. K. Jaishankar define Cybercrimes as: "Offences that are
harm the reputation of the victim or cause physical or mental harm to the victim directly or
indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails,
According to Donna Batten, "computer crime is the use of a computer to take or alter data
which the computer or network is an essential part of the crime, this term is also used to include
traditional crimes in which computers or networks are used to enable the illicit activity.3
Legally prohibited activities carried out by Internet, virtual reality, mobile phone, gadgets
ATM, software programs, technical cheating etc. falls under cybercrime. Hacking, pornography,
copyright infringement, espionage etc. are the main offences related to cybercrime. Cybercrime
have adverse effect on personal life and dignity of the people and financial sectors. Even it is the
issue of national’s security also. There are various types of cybercrimes and various methods to
2
Raut, Balaram. “An analysis of Cyber Crime from Conceptual Perspectives: Where is Nepal?.” Nepal Law
Review 37.24 (1&2, 2012): 255-269.
3
Belayneh, Beza. “Cybercrime’’. http://www.bezaspeaks.com. Visited on: April 2, 2015
4
Raut, Balaram. “An analysis of Cyber Crime from Conceptual Perspectives: Where is Nepal?.” Nepal Law
Review 37.24 (1&2, 2012): 255-269.
7
Computer crimes encompass a broad range of activities. Generally it can be divided into
two categories:
I. Crimes that primarily target computer networks or devices e.g. Computer viruses, Denial-
II. Crimes that use computer networks or devices to advance other ends e.g. Cyber stalking,
There are various types of cybercrime. Some crimes are interrelated with each other also.
Most of them are committed through hacking and using various tricks. Some of the major crimes
Cyber stalking is the crime of following and watching somebody over a long period on
Cyber bullying is the use of Information Technology to harm or harass other people in a
Slander matters through internet website, social networks and by sending email.
Act of doing fraud through misconduct of computer it cause financial harm also. Fraud
on banking and transaction, Salami attack ATM fraud, credit card misconduct, economic and
industrial espionage, theft, illegal exchange of foreign currency etc. involving computer and
network are the fraud and financial crime. Making fraud documents and other fraud activities
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets without the
nature), from individuals, competitors, rivals, groups, governments and enemies for personal,
economic, political or military advantage using methods on the Internet, networks or individual
computers through the use of cracking techniques and malicious software including Trojan
Cyber pornography is the act of using computer, internet and other appliances to create,
display, distribute, import, or publish pornography or obscene materials. Many people are
become victim of this crime unknowingly. This is the issue of violation of fundamental rights
also. Sexual harassment and child pornography are also the part of obscene. And children can be
This include sale of narcotics, weapons and wildlife etc., by posting information on
websites, auction websites drug trafficking, and bulletin boards or simply by using email
communication.
VI. Forgery
Counterfeit currency notes, postage and revenue stamps, mark sheets etc. can be forged
using sophisticated computers, printers and scanners. These are made using computers, and high
quality scanners and printers. This type of crime has been common in this present time. Forgery
is used especially for the making of fraud document like certificate, mark sheet, etc. so this is the
main issue also. It gives plus point for the terrorist also to make fraud citizenship and passport.
9
Cyber terrorism is the politically motivated use of computers and information technology
to cause severe disruption or widespread fear. It is the use of Internet based attacks in terrorist
personal computers attached to the Internet, by the means of tools such as computer virus.
There are millions of websites; all hosted on servers abroad, that offer online gambling.
In fact, it is believed that many of these websites are actually fronts for money laundering.
computer source code etc. this is also common crime in these days. Software piracy is major
problem for this time in every computer every individuals and organization are using hacked and
cracked computer programs. Illegal copying of book, ideas, concept and articles, illegal
download of music, films and videos, Illegal publication and manufacturing are the major crime
X. Cyber Welfare
Especially Cyber welfare is related national issue. This is just like cyber terrorism but it is bit
different cyber terrorism is done for harm but cyber welfare done to know or theft important
A spoofed email is one that appears to originate from one source but actually has been
An email bomb is a form of net abuse consisting of sending huge volumes of email to an
address in an attempt to overflow the mailbox or overwhelm the server where the email address
Cyber heist is the computer crime committed by bypassing the antivirus security software
and use social engineer to coax information out of their victim or they can
simply wait for the employees to click on something in their computers. When an employee
clicks on something in their computers, the criminals get access to the computer. They then hack
into the network and put key loggers on accounting systems. In time the cyber criminals are able
to obtain password and keys information. An organization’s bank accounts can then be accessed
via the information they have stolen using the key loggers.
Bypass computer virus through email and other source intentionally to harm other’s
New trends in cybercrime are emerging all the time, with costs to the global economy
In the past, cybercrime was committed mainly by individuals or small groups. Today, we are
commit cybercrime, often to fund other illegal activities. Highly complex, these cybercriminal
networks bring together individuals from across the globe in real time to commit crimes on an
unprecedented scale.
The crimes themselves are not necessarily new – such as theft, fraud, illegal gambling, and sale
of fake medicines – but they are evolving in line with the opportunities presented online and
11
Concept and methods of committing these types of crime are also changing according to change
in information technology and electronic transaction. Internet homicide, internet suicide, internet
war, online predator, malicious software, etc. are new concept of cybercrime. White color crime
are also increasing day by day just because of change come in information technology. Most of
the financial transactions like online shopping, online gambling, online service, online payment
i. Internet homicide
Internet homicide refers to a killing in which victim and perpetrator met online, in some
cases having known each other previously only through the Internet. Also Internet killer is an
appellation found in media reports for a person who broadcasts the crime of murder online or
The concept online predators are child sexual abuse crimes that begin or take place on the
Internet.
Malware, short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private computer systems. It can appear
12
in the form of code, scripts, active content, and other software. 'Malware' is a general term used
Cybercrime is known to all over the world as a crime committed through internet. It is,
nowadays, becoming a serious matter of concern all over the world. There are various methods
and technique to commit cybercrime. Act done by involving such methods and technique are
cyber offences. Some of the major offence and natures are listed below:
VII. Illegal interception (by technical means of non-public transmissions of computer data to,
of computer data)
IX. Systems interference (interfering with the functioning of a computer system by inputting,
X. Misuse of devices
I. Individual
Cyber-crime target individual to harm them in the form of cyber stalking, IP crimes,
II. Property
Property can be rob or steal through computer and internet also. In this case they siphon
off Money from another’s account, misuse of credit card to make numerous purchases online,
Distribution of pirated software etc. are the crime effecting company and organization.
Crimes against a government are referred to as cyber terrorism and cyber welfare. In this
category, criminals hack government websites, military websites or circulate propaganda. The
14
perpetrators can be terrorist outfits or unfriendly governments of other nations. Obviously these
types of crime effect society also. And some of the crimes like cyber pornography, fraud,
online theft, Polluting the youth through indecent exposure, trafficking, Sales of illegal articles,
Cybercrime is a term that covers a broad scope of criminal activity using a computer.
Some common examples of cybercrime include identity theft, financial fraud, web site
defacements and cyber bullying. At an organizational level, cybercrime may involve the hacking
of databases and theft of intellectual property or confidential information. Many users think they
can protect themselves, their accounts, and their computers at home with just anti-spyware and
anti-virus software. At work, many employees believe that the organization will provide all the
protection needed, so they think they don’t need to be concerned about their cyber-activity.
Cyber criminals are becoming more sophisticated and they are targeting consumers as well as
public, private and state organizations. Therefore, additional layers of defense are needed. Some
Use different user ID / password combinations for different accounts and avoid writing
them down. Make the passwords more complicated by combining letters, numbers,
special characters (minimum 10 characters in total) and change them on a regular basis.
Firewalls are the first line of cyber defense; they block connections to unknown
or bogus sites and will keep out some types of viruses and hackers.
Prevent spyware from infiltrating your computer by installing and updating anti-
spyware software.
3. Be Social-Media Savvy
Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.)
are set to private. Check your security settings. Be careful what information you post
Be aware that your mobile device is vulnerable to viruses and hackers. Download
Keep your applications and operating system (e.g. Windows, Mac, and Linux) current
with the latest system updates. Turn on automatic updates to prevent potential attacks on
older software.
Use encryption for your most sensitive files such as tax returns or financial records, make
regular back-ups of all your important data, and store it in another location.
Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly
secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, is also
be cautious when giving out personal information such as your name, address, phone
number or financial information on the Internet. Make sure that websites are secure (e.g.
when making online purchases) or that you’ve enabled privacy settings (e.g. when
Always think before you click on a link or file of unknown origin. Don’t feel pressured
by any emails. Check the source of the message. When in doubt, verify the source. Never
reply to emails that ask you to verify your information or confirm your user ID or
password.
don’t panic! If you are a victim, if you encounter illegal Internet content (e.g. child
17
report this to your local police. If you need help with maintenance or software
installation on your computer, consult with your service provider or a certified computer
technician.5
Ethics refers to the morality and good behavior. Cyber ethics refers to the ethical
computer conduct which means use of computer and network in good manner, without harm
others and all in all in legal way. We have right to conduct computer and use network with this
we have duty to conduct in legal way. 10 commands of computer ethics are listed below:
I. Thou shalt not use a computer in ways that may harm people.
II. Thou shalt not interfere with other people's computer work.
III. Thou shalt not snoop around in other people's computer files.
VI. Thou shalt not copy or use proprietary software for which you have not paid.
VII. Thou shalt not use other people's computer resources without authorization or
proper compensation.
IX. Thou shalt think about the social consequences of the program you are writing or the
X. Thou shalt always use a computer in ways that ensure consideration and respect for
5
www.wikipedia.org/wiki/preventive measures on April 10, 2015
18
Chapter: Three
This device allowed the repetition of a series of steps in the weaving of special fabrics. This
resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to discourage Jacquard from further use
One of the highest profiled banking computer crime occurred during a course of three
years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime
Concept of cybercrime was developed even from prior 1990s but word cybercrime was
not much familiar. Less number of crimes was committed relating to cybercrime. When
computers and networks came into being in the 1990s, hacking was done basically to get more
information about the systems. As a result, many networks were affected and espionage from the
military to commercial organizations. As hackers became more skillful, they started using their
knowledge and expertise to gain benefit by exploiting and victimizing others. After 2000s
There is popular case of cybercrime of Edward Snowden which is the best example of
unauthorized person.
classified information from the National Security Agency (NSA), starting in June 2013. A
former system administrator for the Central Intelligence Agency (CIA) and a counterintelligence
trainer at the Defense Intelligence Agency (DIA), he later worked for the private intelligence
contractor Dell inside an NSA outpost in Japan. In March 2013, he joined the consulting firm
Booz Allen Hamilton inside the NSA center in Hawaii. In June 2013, he came to international
attention after disclosing to several media outlets thousands of classified documents that he
acquired while working as an NSA contractor for Dell and Booz Allen Hamilton. Snowden's
leaked documents revealed numerous global surveillance programs, many of them run by the
NSA and the Five Eyes with the cooperation of telecommunication companies and European
whistleblower, a dissident, a traitor, and a patriot. His disclosures have fueled debates over mass
surveillance, government secrecy, and the balance between national security and information
privacy. Two court rulings since the initial leaks have split on the constitutionality of the NSA's
On May 20, 2013, Snowden flew from Hawaii to Hong Kong, where in early June he
revealed numerous classified NSA documents to journalists Glenn Greenwald and Laura Poitras,
both of whom he had summoned to Hong Kong for that purpose. On June 9, four days after the
press first exposed a secret NSA program based on his leaks, Snowden made his identity public.
On June 14 the U.S. Department of Justice charged him with two counts of violating the
20
Espionage Act and theft of government property, punishable by up to 30 years in prison. The
Nepal entered into the ICT era only in 1970s. Nepalese started to use Internet from 1993.
So in context of Nepal there is no long history of cybercrime. But in present time cybercrime has
become vital and challenging issue of Nepal. Various cases related to cyber offences are
recorded in Nepal police. Crimes and criminals are increasing day by day. Prior of 2004 offences
related to cyber was deal by public offence act later on electronic transaction act was passed on
2004 and come into force from 2006 as The Electronic Transaction Act,(2063) 2006. This act is
known as cyber law of Nepal. But most of the Nepalese are unknown about this law. Other laws
like Digital signature Act 2011, Banking offences Act 2007, Crime and Punishment Act 1970
In these days various cases of cybercrime are registered in court also. Criminals are
arrested by Nepal police and news relating to cybercrime is broadcasted through media.
21
Chapter: Four
others developed country. However it is not forwarded in information technology sector, there is
numerous uses of the computer and internet for various purposes. Now business and financial
are also dependent on information technology. Most of the people are using internet through
Various medium in their daily life. All aspects of human activity like communication, trade,
culture, education, entertainment, and knowledge. Most of the people especially youth and
teenagers are involve in social network. So With the large development of Information
Technology the criminal activities are also increasing. News relating to cybercrime likes ATM
fraud, illegal telecommunication, many threat and extortion e-mails, and mutilation girl image
and pasted on the porno site, software piracy, etc. are not new in Nepalese context. Electronic
transaction act 2006 is the regulating law for cybercrime. Nepal police and CIB are also playing
Nepali people are not much aware about cybercrime. Not even related authorities are not
serious about cybercrime. Individuals and even government organization are using pirated CDs
of software available on footpath and DVDs shop. We can find hacked and cracked software
program on every computer. Government and authorized body are not concerning on this issue
and even it is hard to control. People are also unknown about the law also. Nepal police and CIB
are playing active role to control these type of crime. Really they are much more concern on this
matter.
22
II. Many renowned companies received spam mails from proxy hot mails, yahoo, G-mail
demanding money on the name of mainly insurgents groups and so called armed groups.
III. Hacking of newspaper's website by replacing the original content with threat Attack.
4.3 Some of the major cases registered in the Kathmandu district court
In Nepal only Kathmandu district court has jurisdiction to deal and decide the case of cyber
offences. The charge sheet of applicant should submit to the Kathmandu district court and court
proceeds the trail. Some of the cases registered in Kathmandu district court are:7
I. Defamation
The defendant was caught by police on 2069/5/17 and the charge sheet of this case is
submitted at the Kathmandu district court on 2069/6/11. The charges are that the defendant used
the email id to create Facebook and uploaded the sexual video clips and send vulgar message to
7
Raut, Balaram. “An analysis of Cyber Crime from Conceptual Perspectives: Where is Nepal?.” Nepal Law
Review 37.24 (1&2, 2012): 255-269.
23
applicant husband by claiming her character and tries to destroy the spousal life. The defendant
Applied Law: Sections 47(1) and 76 of the electronic transaction Act, 2006
The charge sheet were submitted in the Kathmandu district court on 2069/6/2 and the
major charges were that the defendant created event called bunga bunga and advertised it in the
Facebook by asking to pay 2000 euro and to get service of girl aged from 10 to 17. Such kind of
act can create the situation of sexual exploitation and to use this age of girl for such activities is
also illegal. The New Zealand police found it in sites and it requested to find out it and later
Nepal police involved in this matter and the case came into light.
Maya rai (Disguised name of the victim) vs. Tika Bahadur Magar and two others
The defendant and his two friends captured the naked photo of applicant and blackmailed
to her and terrorized her by saying that if she does not their demand they will disseminate the
picture all over the world. Applicant later complaint it to the police and police took charge of the
case.
II. Obscenity
The charge sheet of this case was submitted to Kathmandu district court in 2069/6/3 and
the major charge against the defendant where that the defendant had uploaded the video clip of
sexual content in different sites which violate the moral and social law this kind of activities can
24
create the situation of confrontation between different caste and communities and this kind of act
The charge sheet of this case was registered at Kathmandu district court on 2069/1/20 and the
case was of hacking of password and uploading naked photo by defendant. The act to hack
others password is illegal and it is prohibited by law and the criminal has this method and
uploaded the naked photo of victim which creates difficulties for her in life.
The charge sheet was registered at Kathmandu district court on 2069/5/26. The major
charges were that the defendants sent the email which has content of abused and terrorized text
in order to spread terror and fear in public. Then try to spread hatred speeches to different
On 2067/6/1 the Kathmandu district court granted the detention warrant to put the
defendant in jail. And again on 2067/6/21 appellate court also confirmed the order of Kathmandu
district court. The major charges were that defendant has sent her the sexy pictures and sexy
The defendant misused the email ID for illegal entrance to closed document of the
company which harm good will of the company because the violates the law the applicant
request for punishment for the defendant and police took the action.
There are three specific statutes which are regulating the cybercrime directly and
indirectly. Those laws are The Electronic Transaction Act 2008, Banking Offence Act 2007, and
Digital Signature Act 2011 and the cybercrime which are not covered by these laws are dealt by
Public Act, 1970. In Nepal, organization, business houses started using the electronic transactions
when the government was lacking the law, rules and regulations. So, electronic transaction act was
enacted.
Prior to 2004, the government of Nepal dealt with cybercrimes under the Public Offence Act.
Nepal Police dealt with cybercrimes but they were not aware about the technical aspects of these
crimes, which meant that the sanctions were not effective and relative to the crime.
The Electronic Transaction Act 2006, also known as the cyber law, was passed. A cyber law
House of Representatives.
The House of Representatives has on March 4, 2004, made a recommendation for an Act
amending the Penal Code and the ratification and was first enacted as an ordinance. And it was
26
enacted as an act on 2006 and entered into force. This law was forecast to be landmark legislation
Under Act of 2004, hacking, deleting data, stealing e-documents, software piracy and posting
defamatory information invite criminal and civil sanctioning to individuals and institutions.8
However there is cyber law for regulating cybercrimes but this law is also not enough for present
time. It doesn’t have clear provision for modern crimes and special offences like cyber welfare,
Electronic transaction act is the major statutes for the regulation of cyber offences and computer
conduct. The main purpose of this act (law) is to legalize the electronic transactions and digital
signatures for both private and public transactions, protecting the electronic documents from the
unauthorized access and to control the illegal activities or the cybercrimes. This act has 12 chapters
and 79 sections. Electronic Transaction Act 2006 is here to fore addressed in the capacity of cyber
law.
The act has clearly defined the rights, duty and authorities of the subscribers, network service
provider etc. The act had provision of separate judicial bodies, IT Tribunal and Appellate Tribunal.
The both Tribunal look into all cases related to computer crime and the cybercrime. The IT tribunal
This act has encouraged the use of information technology for business houses and other offices.
Especially for the banks, that start the electronic transactions such as internet banking, SMS banking,
Tele banking, ATMs, Credit Cards, Debit Cards effective delivery service etc.
The cybercrime is regarded as the crime against the state and it is enacted with the transnational
enforcement against the breaching of the law for any individuals involved. The punishment varies
from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to
discourage the cybercrime. The Cyber law 2006 dictates the limitation for complaint within 35 days
of first knowhow of crime and breaching of the cyber law. Chapter -9 of Electronic Transaction Act
2006 has mentioned about the offence and punishment relating to computer crime. They are listed
below:
Section 44:
To Pirate, Destroy or Alter computer source code: When computer source code is
required to be kept as it is position for the time being the prevailing law, if any person,
knowingly or with malafide intention, pirates, destroys, alters computer sources code to be used
for any computer, computer programmed, computer system or computer network or cause, other
to do so, he/she shall be liable to the punishment with imprisonment not exceeding three years or
with a fine not exceeding two hundred thousand Rupees or with both.
Explanation: For the purpose of this section "computer source code" means the listing of
programmed, computer command, computer design and layout and programed analysis of the
Section 45:
access in any programmed, information or data of any computer, uses such a computer without
authorization of the owner of or the person responsible for such a computer or even in the case of
authorization, performs any act with an intention to have access in any programme, information
or data contrary to from such authorization, such a person shall be liable to the punishment with
28
the fine not exceeding Two Hundred Thousand Rupees or with imprisonment not exceeding
Section 46:
Damage to any Computer and Information System: If any person knowingly and with a
mala fide intention to cause wrongful loss or damage to any institution destroys, damages,
deletes, alters, disrupts any information of any computer source by any means or diminishes
value and utility of such information or affects it injuriously or causes any person to carry out
such an act, such a person shall be liable to the punishment with the fine not exceeding two
thousand Rupees and with imprisonment not exceeding three years or with both.
Section 47:
Publication of illegal materials in electronic form: (1) If any person publishes or displays
any material in the electronic media including computer, internet which are prohibited to publish
or display by the prevailing law or which may be contrary to the public morality or decent
behavior or any types of materials which may spread hate or jealousy against anyone or which
may jeopardize the harmonious relations subsisting among the peoples of various castes, tribes
and communities shall be liable to the punishment with the fine not exceeding One Hundred
Thousand Rupees or with the imprisonment not exceeding five years or with both.
(2) If any person commit an offence referred to in Sub-section (1) time to time he/she shall be
liable to the punishment for each time with one and one half percent of the punishment of the
previous punishment.
Section 48:
29
Confidentiality to Divulge: Save otherwise provided for in this Act or Rules framed
hereunder or for in the prevailing law, if any person who has an access in any record, book,
register, correspondence, information, documents or any other material under the authority
conferred under this Act or Rules framed hereunder divulges or causes to divulge confidentiality
Unauthorized person, he/she shall be liable to the punishment with a fine not exceeding Ten
Thousands Rupees or with imprisonment not exceeding two years or with both, depending on the
Section 49:
To inform False statement: If any person with an intention to obtain a license from
Certifying Authority under this Act or with any other intention either to Controller or with an
intention to obtain Digital Signature Certificate or with any other intention conceals statement
knowingly or lies any statement to be submitted to the Certifying Authority any false statements
shall be liable to the punishment with a fine not exceeding One Hundred Thousand rupees or
Section 50:
Submission or Display of False License or Certificates: (1) If any person who works as a
Certifying Authority without a license issued by the Controller under this Act, shall be liable to
the punishment with a fine not exceeding one hundred thousand Rupees or with an imprisonment
not exceeding two years or with both, depending on seriousness of the offence.
(2) Any person without obtaining a license from the Certifying Authority publishes a fake license
or false statement in regard to license or provides to any person by any other means, shall be
30
liable to the punishment not exceeding one hundred thousand Rupees in the case where the act
(3) If any person publishes or otherwise makes available a certificate to any other person by any
means knowingly that a certificate is not issued by the Certifying Authority referred to in such a
certificate or the subscriber listed in such certificate has not accepted the certificate or such a
certificate is already suspended or revoked, shall be liable to the punishment with a fine not
exceeding one hundred thousand Rupees or with an imprisonment not exceeding two years or
with both. Provided that, if such a certificate suspended or revoked is published or provided for
the purpose of verification of the Digital Signature before it was suspended or revoked, it shall
Section 51:
submit any statement, document or report to the Controller or Certifying Authority under this
Act or Rules framed hereunder, fails to submit such statement, document, or report within the
specified time limit, such a person shall be liable to the punishment with a fine not exceeding
(2) Any person who fails to maintain duly any book, register, records or account and in a secured
manner to be maintained duly and in a secured manner under this Act or Rules framed hereunder
shall be liable to the punishment with a fine not exceeding fifty thousand Rupees.
Section 52:
To commit computer fraud: If any person, with an intention to commit any fraud or any
other illegal act, creates, publishes or otherwise provides digital signature certificate or acquires
benefit from the payment of any bill, balance amount of any one's account, any inventory or
31
ATM card in connivance of or otherwise by committing any fraud, amount of the financial
benefit so acquired shall be recovered from the offender and be given to the person concerned
and such an offender shall be liable to the punishment with a fine not exceeding one hundred
thousand Rupees or with an imprisonment not exceeding two years or with both.
Section 53:
Abetment to commit computer related offence: A person who abets other to commit an
offence relating to computer under this Act or who attempts or is involved in the conspiracy to
commit such an offence shall be liable to the punishment with a fine not exceeding fifty thousand
Rupees or with imprisonment not exceeding six months or with both, depending on the degree of
the offence.
Section 54:
Punishment to the Accomplice: A person who assists others to commit any offence under
this Act or acts as accomplice, by any means shall be liable to one half of the punishment for
Section 55:
in the prevailing laws, if any person commits any act which constitutes an offence under this Act
and which involves the computer, computer system or computer network system located in
Nepal, even though such an act is committed while residing outside Nepal, a case may be filed
Section 56:
32
Confiscation: Any computer, computer system, floppy, compact disks, tape drivers, software or
any other accessory devices used to commit any act deemed to be an offence relating to
Section 57:
Offences Committed by a corporate body: (1) If any act is done by a corporate body
which deems an offence under this Act, such an offence shall be deemed to have been committed
by a person who was responsible as chief for the operation of the corporate body at the time of
committing such an offence. Provided that, if the person who was responsible as a chief for the
operation of such a corporate body proves that such an offence was committed without his/her
knowledge or that he/she exercised all reasonable efforts to prevent such an offence, he/she shall
(2) Notwithstanding anything contained in Sub-section (1), if it is proved that any offence under
this Act committed by a corporate body with the consent or in knowledge or by the reason of
negligence of a director, manager, secretary or any other responsible person of such corporate
body, such an offence shall be deemed to have been committed by such a corporate body and by
Section 58:
Other Punishment: If any violation of this Act or Rules framed hereunder has been
committed, for which no penalty has been separately provided, such a violator shall be liable to
the punishment with a fine not exceeding fifty thousand Rupees, or with an imprisonment not
Section 59:
33
No Hindrance to Punish Under the Laws prevailing: If any act deemed to be an offence
under this Act shall also be deemed to be another offence under the laws prevailing, it shall not
be deemed to have been hindered by this Act to file a separate case and punish accordingly.
Section 76:
Compensation to be recovered: If any loss or damage has been caused to any person by
the reason of offence committed under this Act, the compensation of such loss or damage shall
Though the incorporation of cyber law in the ETA is a good beginning and cybercrimes
would be considerably reduced in the country, many believe this is a preliminary Act, as many
provisions on IT related security are missing. This law is not effective because the institutions
which have authorized to apply it are not well trained in this field. They do not have idea about
According to the Information security experts, the law is not adequate enough for the
holistic depiction of cyber related crimes and is not tough to act as a deterrent for online
perpetrators. The imprisonment and or fines as determined under the Act are not high enough
Despite the positive efforts, the Electronic Transaction Act, 2006 has failed to address the
problems of online media. A couple of major online news portals, including the nepaldigest.org,
nepalnews.com and kantipuronline.com, and one dozen e-magazines are being published from
Nepal and abroad at the moment. Nevertheless, the government has not provided any facilities to
online publications and journalists associated with them. Since there is no clear provision to
9
Phulara, Bashu Dev. “Crime: Tackling cybercrime in Nepal’’. www.thenepalidigest.org. Visited on: June 15, 2014
34
regulate online media under the cyber law, the government should incorporate the issue of online
For the same reason, the act has made it legal to purchase and sell through internet.
However, IT infrastructure plays a crucial role in promoting e-commerce. It still needs authority
to verify digital signature, which is yet to be formed. Subjects related to payment gateways are
also not included in the new ordinance. In this context, the Nepal Rastra Bank-the only
There is still need for e-procurement laws. This ordinance has covered aspects related to
e-documentation but we still need internet laws and others laws covering the aspects of
intellectual property rights. This is the first step and one can expect other laws in the coming
days. The endorsement of IT ordinance has certainly given birth to a new industry, which still
Above all, the effective implementation of cyber law will be a necessity. If it is not
properly implemented in all governmental and nongovernmental organizations, the cyber law
will no longer remain. Regulating the Internet further needs the cooperation of all the countries
In view of that, Nepal will not be able to regulate the internet without taking the
international legal context into account. The creations of effective IPRS laws are also required in
order to be able to effectively fight piracy. Since the computing field is a dynamic one, policies
and laws related to this area need to be revised periodically to reflect the changing trend, both
10
Phulara, Bashu Dev. “Crime: Tackling cybercrime in Nepal’’. www.thenepalidigest.org. Visited on: April 20,
2015
35
disadvantages of using the Internet should be carried out. Moreover, educating Internet users and
Some other statutes also include provisions relating to cybercrime and punishment.
Digital signature Act, 2011 include some of the provision relating to validity of digital signature
and punishment for the infringement. Banking offences Act, 2007 regulate all of the electronic
banking and financial transaction of bank and financial institution. Rest of the cybercrimes which
are not covered by above laws and ETA are dealt by Some Public (Crime and Punishment) Act,
1970.
With the explosive growth of the Internet nationwide, computer crimes increasingly are
prone to have international dimensions. Some of the challenges faced by law enforcement on the
international front include: harmonization of countries' criminal laws; locating and identifying
perpetrators across borders; and securing electronic evidence of their crimes so that they may be
brought to justice. Complex jurisdictional issues arise at each step. The government of Nepal is
36
working with foreign governments through many channels to address global threats related to
cybercrime as well.
Nepal Police is an interested and authorized investigation and enforcement agency for the
cybercrime duly performs the jobs assigned and related to crime investigation, discovery and
exploration. Both CIB and crime branch are actively involve to fight against cybercrime.
I. Intervention through the use of wireless technology, mobile phones, proxy intelligence.
I. Internet and the computers as the Scene of Crime there are many types of computer crime
that exists, as well as the legal and technical challenges that face law enforcement and
V. Low participation of tech groups and fewer co-operations of resource groups Imitation of
Infrastructures.
Internet-related crime, like any other crime, should be reported to appropriate law
enforcement investigative authorities at the local, state national levels, depending on the scope of
the crime. Citizens who are aware of cybercrimes should report them to local offices of national
law enforcement.
The primary law enforcement agencies that investigate domestic crime on the Internet
include: the District Police Offices throughout Nepal (However Not all the district in Nepal have
the access to internet and computer) and for the Metropolitan level reporting the Metropolitan
Crime Division and subsequent police Range offices Each of these agencies has offices
conveniently located in every district headquarters to which crimes may be reported. Contact
information regarding these local offices may be found in local telephone directories. In general,
crime may be reported to the local office of an appropriate law enforcement agency by a
telephone call and by requesting the "Duty Complaint handling officer or by the toll free call on
100". Each law enforcement agency also has a chain of command links to police headquarters
(HQ) in Kathmandu which has agents who specialize in particular areas. We also have Police
headquarters-based specialists in computer intrusion (i.e., computer hacker) cases. Written FIR
will be taken upon the convenience of the victim. At presently, only Kathmandu district court
Following table describe which authorized body is responsible according to type of crime.
Raut, Balaram. “An analysis of Cyber Crime from Conceptual Perspectives: Where is Nepal?.” Nepal Law
11
What Responsible
Computer intrusion (i.e. hacking) Appropriate investigative law
enforcement agencies
Chapter: Five
5.1 Findings
Laws are established and enforced by the authority, legislation, or custom of a given
community, state or nation to maintain orderly coexistence. Basically, cyber law deals with child
pornography, cyber-stalking, cyber-scams, online fraud, software piracy and much more. Legal
experts are working in this field to help educate and guide the Internet community on crime
prevention and the reporting of cybercrimes. After many years of discussion and effort, recently
the government of Nepal has crafted the much awaited Electronic Transaction and Digital
Electronic Transaction Act 2063. These days, we are facing several problems like hacking,
piracy, coping, conspiracy, etc. Such crimes are increasing day by day due to the misuse of the
modern electronic devices like computers and its facilities like internet. People are attracted and
getting influenced by the bad habits and so they excite themselves to go against cyber ethics.
Especially, teens are super forward towards such activities. They get lured by these facilities and
In case of Nepal, the issue of cybercrime is most challenging issue of present time.
Activities relating Computer conduct, use of network and use of computer appliances is
unmanaged like politics. Government is not concerned to this matter as much it should be. Most
of the Nepalese people have no idea about cybercrime and even they are not familiar with
Electronic Transaction Act and others cyber laws also. However there is law to control
cybercrime it cannot mitigate the offences relating to cybercrime. Laws are not effective and
efficient to curve and control the cybercrime because the scopes of law are very narrow and the
40
areas of crime are wide and huge. It cannot cover all of the provisions relating to special offences
and possible crime in future. Only Kathmandu district court has jurisdiction to register charge
As Internet usage is growing daily the world is coming closer. The World Wide Web
sounds like a vast phenomenon but surprisingly one of its qualities is bringing the world closer
making it a smaller place to live in for its users. However, it has also managed to create another
problem for people who spend long hours browsing the Cyber World – which is cybercrimes.
While law enforcement agencies are trying to tackle this problem, it is growing steadily and
many people have become victims of hacking, theft, identity theft and malicious software. One
of the best ways to avoid being a victim of cybercrimes and protecting your sensitive information
is by making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. So, cyber law has more
challenge to tackle with modern crimes. There are various minor problems of cybercrime small
offences are affected more in cyber space. For example: pirated CDs of high cost program are
available on any DVDs shop and footpath but no one is concerned about it. Most of the people
and organization are using hacked and cracked program downloading from unauthorized source.
Teen agers and even children, young and adult are enjoying porno videos and images through
internet access. We are the habitual of illegal download and illegal copying who cares about the
law. Recently, we heard news about ATM fraud and cyber harassment, fraud on electronic
transfer of money is also not new crime. Though, the laws are formulated to control the crimes,
Nepal is lagging behind in its implementation. However there is law but electronic transaction
Nepal police is doing excellent job regarding monitoring cybercrime. They are trying
their maximum effort to control this type of crime, punish criminal and provide justice for victim
and aggrieved. But the problem is that victim did not complain or register case in the police even
they are abused, for e.g. girls are harassed on internet and social network but they remains quiet.
There is lack of skilled and well-trained investigator, judge, public prosecutor, private lawyer,
etc. and present judge, police, lawyers, etc. are not familiar with the cyber law and its application
to combat cyber terrorism and other serious offences. So, in one hand there is not sufficient law
to incorporate modern cyber issue and in another hand the implementing agencies are not well
trained and well-equipped with modern technology so that they can trace the problem. So, these
5.2 Conclusion
Cybercrimes have become a real threat today and are quite different from old-school
crimes, such as robbing, mugging or stealing. Unlike these crimes, cybercrimes can be
committed single handedly and does not require the physical presence of the criminals. The
crimes can be committed from a remote location and the criminals need not worry about the law
enforcement agencies in the country where they are committing crimes. The same systems that
have made it easier for people to conduct e-commerce and online transactions are now being
exploited by cyber criminals. Issues of confidentiality, privacy, freedom of expression are also
With the new innovation in technical field cases of cybercrimes are also increasing.
Offences are committed in new style and new form and new types of crime are also emerging
related to cybercrime. So, it is the most challenging issue of present time and will remain
challenging issue in future also. So, modernization of the law is necessary in order to take full
42
advantage of technological improvements. Nepal should be more forward to make law efficient
and to tackle with crime. Various technology and experts are required in order to know about
crime and find out criminals because criminals who can cheat technology easily can cheat law
also.
express the opinion and internet is one of the means of information, communication and
expression so it cannot be restricted to use the online media to express the opinion or views. So
cyber law should concern on such issue. As well as, people also have duty to follow code of
internet conduct in serious manner. Nepal has to play prominent role to make strong laws and
must implementing existing laws properly. Moreover, every person must show awareness about
the internet and cyberspace. Specially, the children should be made aware with the fake
messages from Facebooks or email account. Everyone should follow code and conduct in
effective manner.
V.3 Recommendation:
I. Law should be amended time to time and it must be strictly implemented and Government of
Nepal must be more concern on electronic transaction activities, cyber conduct and
cybercrime
II. Enact separate cyber Law which regulate the every corner of the cyber related issue or
IV. Jurisdiction to register charge sheet and proceed trail should provide to other district court
also to provide appropriate justice to every victim and aggrieved from every corner of the
country.
43
VI. In Nepal police, Separate department should establish with well-trained officer to deal with
VII. Nepal telecom is government run telecommunication. So Nepal telecom, Nepal police
and public prosecutor should work cooperatively and their duty should be assigned in law.
VIII. Judges, public prosecutor as well as private lawyer and other related officer should be
IX. Service provider and government can block illegal websites and websites which create social
disorder.
X. We should be aware of unknown emails, spam, should not open unknown advertisement, and
should not download from unauthorized source.
XI. If all of us do not do unethical computer conduct then no one is going to commit cybercrime.
XII. It is the responsibility of the youths like us to help our government to follow the cyber
laws. We must be responsible in implementation of cyber law and report of crime whatever
XIII. Parents should observe their children what they are doing in internet. If they come to
know their children are abused then they should cooperate with children.
XV. Individuals, firms, government and civil society should work cooperatively.
XVI. We must be loyal to cyber ethics and make the good advantages of the facilities given in
this era.