Download presentation
Presentation is loading. Please wait.
1
Policy and Procedure For CSCL (BIM)
2
Law definition The system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties. Law is a system of rules and guidelines which are enforced through social institutions to govern behavior.
3
Law type Criminal Law Civil Law Cyber law:
Cyberlaw or Internet law is a term that encapsulates the legal issues related to use of computer (any digital device) and the Internet (or network).
4
Computer Crime Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, s, notice boards and groups) and mobile phones (SMS/MMS) - Dr. Debarati Halder and Dr. K. Jaishankar (2011)
5
Computer Crime Computer as a target Computer as a tool
6
Cyber crime by country
7
Cyber Crime Categories
Hacking Phishing Computer virus/worms/Trojan horse Identity theft (theft of digital identity) Cyberstalking (cyber harrashment) Spamming Spoofing - Deceiving a system into thinking you are someone you really are not Cyberextortion
8
Cyber Crime Categories
9
Digital forensic Forensic: scientific tests or techniques used in connection with the detection of crime. Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. (Wikipedia)
10
Digital Forensic A digital forensic investigation commonly consists of 3 stages: acquisition, analysis, and reporting. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved computer forensics, network forensics, forensic data analysis and mobile device forensics.
11
Digital Forensic
12
Digital Evidence Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Audio Evidence Computer/Internet Crimes Image Analysis Video Analysis
13
Investigation Procedure
Acquiring the evidence Taking care to make sure that the integrity of the data is preserved Authenticating the validity of the extracted data – this involves making sure that the extracted data is as valid as the original Analyzing the data while keeping its integrity.
14
Categories of evidence
Impressions: this includes fingerprints, tool marks, footwear marks, and other types of impressions and marks. Bioforensics: this includes blood, body fluids, hair, nail scrapings, and bloodstain patterns. Infoforensics: this includes binary data fixed in any medium such as on CDs, memory, and fl- oppies. Trace evidence: this includes residues of things used in the committing of a crime like , paint, glass, and fibers. Material evidence: this includes physical materials such as folders, letters, and scraps of papers.
15
Intellectual property rights
Intellectual property (IP) refers to creations of the intellect for which a monopoly is assigned to designated owners by law Intellectual property (IP) rights are the legally recognized exclusive rights to creations of the mind.
16
Intellectual property rights
Copyright Trademark Patent License Agreement Plagiarism (Violation of copy right)
17
Digital Right Management
Digital rights management (DRM) schemes are various access control technologies that are used to restrict usage of proprietary hardware and copyrighted works AKA Copy Protection DRM technologies try to control the use, modification, and distribution of copyrighted works (such as software and multimedia content), as well as systems within devices that enforce these policies.
18
Digital Right Management (2)
The use of digital rights management is not universally accepted. Widely used technique is Restrictive Licensing Agreements
19
DRM Technology Limited Installation Activation
Activate with online server for three to five installation Persistent online authentication Should activate by using temporary key Challenge response system Used by MIDAS Education Kit and many other Product keys Hardware protection like is Play station, Game Boy Controlling unauthorized installation like in iPhone, iPad
20
Privacy Protection Encrypting with secure algorithm
21
IT policy of Nepal Declare information technology sectors a prioritized sector. Follow a single-door system for the development of information technology. Prioritize research and development of information technology. Create a conducive environment that will attract investment in the private sector, keeping in view the private sector's role in the development of information technology.
22
IT policy of Nepal Provide internet facilities to all Village Development committees of the country in phases. Render assistance to educational institutions and encourage native and foreign training as a necessity of fulfilling the requirement of qualified manpower in various fields pertaining to information technology. Computerize the records of each governmental office and build websites for them for the flow of information. Increase the use of computers in the private sector.
23
IT policy of Nepal Develop physical and virtual information technology park in various places with the private sector's participation for the development of information technology. Use information technology to promote e-commerce, e-education, e-health, among others, and to transfer technology in rural areas. Establish National Information Technology Centre. Establish a national level fund by mobilizing the resources obtained from His Majesty's Government, donor agencies, and private sectors so as to contribute to research and development of information technology and other activities pertaining to it.
24
IT policy of Nepal Establish venture capital funds with the joint participation of public and private sectors. Include computer education in the curriculum from the school level and broaden its scope. Establish Nepal in the global market through the use of information technology. Draft necessary laws that provides legal sanctions to the use of information technology.
25
Electronic Transaction Act(ETA)
Preambles To make legal provisions for authentication and regularization of the recognition, validity, integrity and reliability of generation, production, processing, storage communication and transmission system of electronic records. For controlling the unauthorized access of electronic records (violation of the confidentiality) or of making alteration in such records through the illegal manner (violation of the integrity)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.