SlideShare a Scribd company logo
;fOa/ sfg'gM k|s[lt tyf
        cEof;
         clwjQmf afa'/fd cof{n
                cWoIf
OG6/g]6 ;f];fO6L g]kfn . ;]G6/ km/ n P08
          6]Sgf]nf]hL k|f=ln=
k|:t'ltsf] If]q
    s]lx d'2fx? dflysf] ;+lIfKt 5nkmn
    ;fOa/ sfg'g M cy{ tyf k|s[lt
    sDKo'6/ ;DaGwL s;"/ tyf ;hfoF
    Goflos k|lqmof
    P]g nfu" gx'g] cj:yf




    Advocate Babu Ram Aryal/Center for Law and
2   Technology Pvt. Ltd.                                 01/30/13
Case 1
    The defendant had uploaded the video clips of sexual content
       in different sites. In the video, boy and girl from two
       different religious community were involved in sexual
       discourse. It is charged this kind of dissemination is also
       create the situation of confrontation between different caste
       and communities. The police took cognizance and
       investigated this case.




    Advocate Babu Ram Aryal/Center for Law and
3   Technology Pvt. Ltd.                                       01/30/13
Case 2
    The defendant used the email ID to create facebook and
       uploaded the sexual video clips and send vulgar message to
       applicant’s husband by claiming her character and tries to
       destroy the married of her. The defendant had also sent the
       message to other in different names.




    Advocate Babu Ram Aryal/Center for Law and
4   Technology Pvt. Ltd.                                      01/30/13
Case 3
    An unknown person used her email ID and uploaded the
       naked photo of her in different sites. Police investigate the
       case and found a person suspect to be involved on this
       activity




    Advocate Babu Ram Aryal/Center for Law and
5   Technology Pvt. Ltd.                                         01/30/13
Case 4
    The accused misused the photo of applicant, scanned it and
       publicly advertised it to harm the personal life of applicant.
       The applicant later complained this to police and later,
       police took the action under ETA.




    Advocate Babu Ram Aryal/Center for Law and
6   Technology Pvt. Ltd.                                         01/30/13
Case 5
    The defendants send the mail contain of abused and
       terrorized contains text in order to spread terror and fear in
       the public. They try to spread hatred speeches to different
       professionals and political leaders in order to fulfill their
       personal purposes. Their sole intention as they describe was
       to terrorize the persons with whom they have take the loan.




    Advocate Babu Ram Aryal/Center for Law and
7   Technology Pvt. Ltd.                                        01/30/13
Case 6
    defendant has sent her the sexual pictures and
       sexual sentence to her email ID and harassed
       her from long time.




    Advocate Babu Ram Aryal/Center for Law and
8   Technology Pvt. Ltd.                         01/30/13
Case 7
    The defendant misused the email ID for illegal entrance to
       closed document of the company which harm the goodwill of
       the company because he violates the law. The applicant
       request for punishment for the defendant and police took the
       action.




    Advocate Babu Ram Aryal/Center for Law and
9   Technology Pvt. Ltd.                                     01/30/13
Three Years Cyber Crime Investigation Chart
Cyber Crime Investigation Table
              Fiscal Year 20011-12
Source: Metropolitan Nepal Police, Hanuman Dhoka
;fOa/ sfg'g M cy{ tyf k|s[lt




     Advocate Babu Ram Aryal/Center for Law and
12   Technology Pvt. Ltd.                         01/30/13
æ;fOa/ sfg'gÆsf] cy{
      ;"rgf tyf ;+rf/ k|ljlwsf] k|of]u, vf;u/L ;fOa/ :k]z ;Fu
       ;DalGwt sfg'g ;fOa/ sfg'g xf] . of] sfg'gn] OG6/g]6
       b'lgofFdf ePsf dfgjLo ultljlwnfO{ ;Daf]wg ug]{ sfg'g
       ;fOa/ sfg'g xf] .
      ;fOa/ sfg'g vf;u/L sDKo'6/ / sDKo'6/ g]6jS;{;Fu ;DalGwt
       sfg'g xf] .
      ;fOa/ sfg'g ;fOa/ :k]z zAbaf6 cfPsf] xf] . ;j}eGbf klxnf
       ;fOa/ :k]z zAbsf] k|of]u ljlnod luA;gn] ;g !(*$ df
       klxnf]k6s Neuromancer eGg] ;fOG; lkmS;g pkGof;df
       u/]sflyP .


     Advocate Babu Ram Aryal/Center for Law and
13   Technology Pvt. Ltd.                                        01/30/13
æ;fOa/ sfg'gÆsf] cy{

     “ Cyber Crime is an act of creating, distributing,
     altering, stealing, misusing and destroying information
     through the computer manipulation of cyber space;
     without the use of physical force and against the will or
     the interest of the victim”




      Advocate Babu Ram Aryal/Center for Law and
14    Technology Pvt. Ltd.                                       01/30/13
æ;fOa/:k]zÆ sf] cy{
     ;fOa/ :k]zn] Ps cfk;df hf]l8Psf sDKo'6/x?sf] ;+hfn
      dfkm{t x'g] l8lh6n 8f6fx? sf] k|jfxnfO{ hgfpFb5 .
     ;fOa/:k]z To:tf] :k]z xf] h'g sDKo'6/sf] dfWodaf6
      x'g] ;+jfb÷;+rf/af6 lgdf{0f ePsf]x'G5 / hxfF
      cgnfO{g ;DaGw tyf cgnfO{g kl/ro lgdf{0f ul/G5 .
     ;fOa/ :k]z To:tf] :k]z xf] hxfF ;Ldf ljlxg ;+jfb jf ;+:s[lt
      sfod /fVg ;lsG5 .
          New Media, an Introduction: Flew, Terry




     Advocate Babu Ram Aryal/Center for Law and
15   Technology Pvt. Ltd.                                   01/30/13
æljB'tLo sf/f]af/Æ sf]
                         kl/efiff
      P]gn] ljB'tLo sf/f]af/ zAnfO{ kl/eflift u/]sf] 5}g .
        t/klg, ljB'tLo sf/f]af/ eGgfn] ;"rgfsf] cfbfg k|
        bfgsf] >[+vnfnfO{ a'lemG5 .
      A Transaction usually means, in computer programming, a
        sequence of information exchange and related work (such as
        database updating) that is treated as a unit for the purposes of
        satisfying a request and for ensuring database integrity.
        http://searchcio.techtarget.com/definition/transaction
      Event or process (such as an input message) initiated or invoked
        by a user or computer program, regarded as a single unit of work
        and requiring a record to be generated for processing in a
        database.
        http://www.businessdictionary.com/definition/transaction.html
     Advocate Babu Ram Aryal/Center for Law and
16   Technology Pvt. Ltd.                                        01/30/13
sDKo'6/ ;DaGwL s;"/ tyf ;hfoF




     Advocate Babu Ram Aryal/Center for Law and
17   Technology Pvt. Ltd.                         01/30/13
;fOa/ ck/fwsf lsl;d




     Advocate Babu Ram Aryal/Center for Law and
18   Technology Pvt. Ltd.                           01/30/13
sDKo'6/sf] e"ldsfsf] cfwf/df ;fOa/ ck/fwsf
                          lsl;d




     Advocate Babu Ram Aryal/Center for Law and
19   Technology Pvt. Ltd.                         01/30/13
lkl8tsf] k|s[ltsf] cfwf/df




     Advocate Babu Ram Aryal/Center for Law and
20   Technology Pvt. Ltd.                           01/30/13
JolQmut lxtdf c;/kg]{ ;fOa/ ck/fwx?




     Advocate Babu Ram Aryal/Center for Law and
21   Technology Pvt. Ltd.                         01/30/13
cfly{s lxtdf c;/kfg]{ ;fOa/ ck/fwx?




     Advocate Babu Ram Aryal/Center for Law and
22   Technology Pvt. Ltd.                               01/30/13
/fli6«o ;'/Iffdf c;/ kfg]{ ;fOa/ ck/fwx?




     Advocate Babu Ram Aryal/Center for Law and
23   Technology Pvt. Ltd.                                 01/30/13
ck/fwsf] ljifoj:t'sf] cfwf/df ;fOa/ ck/fwx?




     Advocate Babu Ram Aryal/Center for Law and
24   Technology Pvt. Ltd.                           01/30/13
ck/fwdf ;+nUg JolQmsf] cfwf/df ;fOa/
                          ck/fwx?




     Advocate Babu Ram Aryal/Center for Law and
25   Technology Pvt. Ltd.                         01/30/13
sDKo'6/ ;DaGwL s;"/ tyf ;hfoF
                  s;"/                         ;hfoF
sDKo'6/ ;|f]t ;Í]tsf] rf]]/L, gi6 jf kl/jt{g   # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j}
-bkmf $$_
sDKo'6/ ;fdu|Ldf cglws[t kx'Fr -bkmf $         # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j
%_
sDKo'6/ / ;"rgf k||0ffnLdf Iflt k''¥ofpg]      # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j
-bkmf $^_
ljB''tLo :j?kdf u}sfg"gL s''/f k|sfzg ug]{     % aif{ h]n ;hfoF jf ! nfv ;Ddsf] hl/jfgf jf b'j}
-bkmf $&_
uf]kgLotf eË ug]{ -bkmf $*_                    # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j
e'm§f Joxf]]/fsf] ;"rgf lbg] -bkmf $(_         @ aif{ h]n ;hfoF jf ! nfv ;Ddsf] hl/jfgf jf b'j}
e'm§f Ohfhtkq jf k||df0fkq k]z ug]{ jf        @ aif{ h]n ;hfoF jf ! nfv ;Ddsf] hl/jfgf jf b'j}
b]vfpg]-bkmf %)_
tf]lsPsf] ljj/0f jf sfuhft bflvnf gug]{ -bkmf %) xhf/ ;Ddsf] hl/jfgf
%!_
sDKo'6'6/ hfn;fhLRam Aryal/Center%@_ and
        Advocate Babu ug]{ -bkmf for Law      lauf] s;"/ ug{]af6 e/fO{ Ps nfv ?k}ofF;Dd
26                                                                                   01/30/13
        Technology Pvt. Ltd.                  hl/afgf
b'?T;fxg tyf dltof/
     ljB'tLo sf/f]af/ P]g adf]lhdsf] s'g} s;"/ ug{ s;}nfO{ b'?
      T;fxg ug]{ jf To:tf] s;"/ ug{ pBf]u ug]{ jf if8oGqdf
      ;fd]n x'g] JolQmnfO{ s;"/sf] dfqf x]/L krf; xhf/ ?
      k}ofF;Dd hl/afgf jf 5 dlxgf;Dd s}b jf b'j} ;hfo x'g]5 .
      -bkmf %#_
     P]g adf]lhdsf s'g} s;"/ ug{ ;3fpg] jf cGo s'g}
      Joxf]/fn] dltof/ eO{ sfo{ ug]{ JolQmnfO{ d'Vo
      s;"/bf/nfO{ ePsf] ;hfosf] cfwf ;hfo x'g]5 . -bkmf %$_




     Advocate Babu Ram Aryal/Center for Law and
27   Technology Pvt. Ltd.                                01/30/13
Goflos k|lqmof




     Advocate Babu Ram Aryal/Center for Law and
28   Technology Pvt. Ltd.                           01/30/13
ph'/L tyf cg';+wfg
     ljB'tLo sf/f]af/ ;DaGwL s;"/ 7xg]{ d'2f g]kfn ;/sf/ jfbL
        eO{ rNg]5 / To:tf] d'2f ;/sf/L d'2f ;DaGwL P]g, @)$(
        sf] cg';"rL–! df ;dfj]z ePsf] dflgg]5 .
     o:tf] s;"/sf] af/]df :yfgLo k|x/L ;dIf hfx]/L b/vf:t
        lbg'k5{ .
     sDKo'6/ ;DaGwL s;"/ 7xg]{ s'g} s;"/ ug{ k|of]u
        ul/Psf] s'g} klg sDKo'6/, sDKo'6/ k|0ffnL, ˆnkL,
        sDKofS6 l8S;, 6]k 8«fOe, ;ˆ6j]o/ jf cGo ;xfos
        pks/0fx? cg';Gwfg clwsf/Ln] hkmt ug{ ;Sg]]5 .
        -bkmf %^_
     o:tf] d'2fdf cg';Gwfg ubf{ k|x/Ln] lgoGqs jf cGo
     Advocate Babu Ram Aryal/Center for Law;xof]u lng' kg{]5 . -bkmf &%_
        ;DalGwt ljz]if1sf] and
29   Technology Pvt. Ltd.                                                01/30/13
;Ifd cbfnt
     P]gn] ljB'tLo sf/f]af/ ;DaGwL s;"/ x]g{sfnflu b'O
      txsf] Gofoflws/0fsf] kl/sNkgf u/]sf]5 . ;"rgf k|ljlw
      Gofoflws/0f ;"rgf k|ljlw k'g/fj]bg Gofoflws/0f .
     ;"rgf k|ljlw Gofoflws/0f u7g gePsf] cj:yfdf g]kfn
      ;/sf/n] /fhkqdf ;"rgf k|sfzg u/]/ s'g} lhNnf
      cbfntnfO{ d'2f lsgf/f ug]{ If]qflwsf/ tf]Sg ;Sg]5 .
     xfn ;Dd s'g} klg txsf] Gofoflws/0fsf] :yfkgf
      ePsf]5}g .
     xfn g]kfn ;/sf/n] /fhkqdf ;"rgf k|sflzt u/]/ sf7df8f}+
      lhNnf cbfntnfO{ ljB'tLo sf/f]af/ P]g, @)^# cGtu{tsf
      s;"/ ;DaGwL d'2f x]g]{ If]qflwsf/ tf]s]sf]5 .
     Advocate Babu Ram Aryal/Center for Law and
30   Technology Pvt. Ltd.                                01/30/13
afXoIf]q If]qflwsf/
     o; P]g adf]lhd s;"/ x'g] s'g} sfd g]kfn /fHoaflx/ /x]/
        u/]sf] eP tfklg To:tf] s;"/ ul/Psf] sDKo'6/, sDKo'6/ k|
        0ffnL jf sDKo'6/ g]6js{ k|0ffnL g]kfndf cjl:yt ePdf
        To:tf] s;"/ ug]{ JolQmnfO{ o; P]g adf]lhd d'2f
        rnfO{ ;hfo ug{ ;lsg]5 . -wf/f %%_




     Advocate Babu Ram Aryal/Center for Law and
31   Technology Pvt. Ltd.                                 01/30/13
xbDofb
     ljB'tLo sf/f]af/;Fu ;DalGwt s;"/ 7xg]{ s'g} s'/f ePsf]df
        To:tf] pNn+3g jf s;"/ eP u/]sf] yfxf kfPsf] ldltn] k}
        +tL; lbgleq ph'/ ug'{ k5{ .




     Advocate Babu Ram Aryal/Center for Law and
32   Technology Pvt. Ltd.                                  01/30/13
k||rlnt sfg"g adf]lhd ;hfo ug{ afwf
     gk'Ug]
     o; P]g cGtu{t s;"/ 7xl/g] s'g} sfd cGo s'g} k|rlnt
        sfg"g adf]lhd klg s;"/ 7xl/g] /x]5 eg] To:tf] s;"/ pk/
        5'6[} sf/afxL rnfO{ ;hfo ug{ ;lsG5 .




     Advocate Babu Ram Aryal/Center for Law and
33   Technology Pvt. Ltd.                                  01/30/13
P]g nfu" gx''g]
     ljlgd]o clwsf/kq P]g, @)#$ df pNn]v eP adf]lhdsf
        ljlgd]o clwsf/kqx?,
     as;kq, /fhLgfdf, aGwsL, sa'lnotkq, a08fkq jf To:t}
        k|s[ltsf
     crn ;DklQsf] xs x:tfGt/0f ug]{ lnvtx?,
     crn ;DklQ pk/ xs jf :jfldTj hgfpg] cGo s'g} lnvtx?,
     jf/];gfdf, lkm/fbkq, k|ltpQ/kq jf To:t} cGo k|sf/sf
        cbfntL sf/afxLdf k|of]u x'g] lnvtx?,
     bfaLkq, k|ltbfaLkq, k|ltjfbkq jf dWo:ytfsf] sf/afxLdf
        lnlvt ?kdf k]z ug'{kg{] cGo To:t} lnvtx?,
     k|rlnt sfg"gn] ljB'tLo :j?kdf /fVg gx'g] egL tf]s]sf
        lnvtx? .
     Advocate Babu Ram Aryal/Center for Law /fhkqdf ;"rgf k|sfzg u/L dfly
     g]kfn ;/sf/n] g]kfn and
34   Technology Pvt. Ltd.                                                 01/30/13
        plNnlvt lnvtx?df cfjZostfg';f/ yk36 ug{;S5 .
lh1fzf tyf k|Zg <




     Advocate Babu Ram Aryal/Center for Law and
35   Technology Pvt. Ltd.                           01/30/13
;|f]t JolQm kl/roM
       clwjQmf afa'/fd cof{nn] k'0f] ljZjljBfno, ef/taf6
       sfg'gdf :gftsf]Q/ ug'{ePsf]5 . ;fOa/ sfg'g ljz]if1sf] ?
       kdf ;lqmo clwjQmf cof{n OG6/g]6sf] If]qdf sfo{/t
       cGt/f{li6«o ;+:yf OG6/g]6 ;f];fO6L g]kfn RofK6/ /
       g]kfndf ;fOa/ sfg'g ;DaGwL cg';Gwfg tyf tflnddf ;lqmo
       ;+:yf ;]G6/ km/ n P08 6]Sgf]nf]hL k|f=ln=sf cWoIf
       x'g'x'G5 .

     ;Dks{M
     kmf]gM (*%!)$*$)!
     Od]nM baburam.aryal@gmail.com;
        baburam@cltnepal.com
      j]a;fO6MRam Aryal/Center for Law and
        Advocate Babu
                      www.cltnepal.com
36     Technology Pvt. Ltd.                             01/30/13

More Related Content

What's hot

La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsCma Mohd
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
Shubham Gupta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Surakshya Poudel
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
Amber Gupta
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
sarahj6
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
mahrukh rafique
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
Rabita Rejwana
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
Cybersecurity in the Digital Age
Cybersecurity in the Digital AgeCybersecurity in the Digital Age
Cybersecurity in the Digital Age
Aqdaskhan19
 
CYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTAN
shabanakousershabana
 

What's hot (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cybersecurity in the Digital Age
Cybersecurity in the Digital AgeCybersecurity in the Digital Age
Cybersecurity in the Digital Age
 
CYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTAN
 

Similar to Cyber law in nepal and implementation

Cyber Crime in the context of nepal.pptx
Cyber Crime in the context of nepal.pptxCyber Crime in the context of nepal.pptx
Cyber Crime in the context of nepal.pptx
BishnuBhusal8
 
The history of mass media
The history of  mass mediaThe history of  mass media
The history of mass media
hari joshi
 
Political Trend of Nepal 2016/2017
Political Trend of Nepal 2016/2017Political Trend of Nepal 2016/2017
Political Trend of Nepal 2016/2017
Tilak Pathak
 
Radio Profile Big FM 101.2 Pokhara
Radio Profile Big FM 101.2 PokharaRadio Profile Big FM 101.2 Pokhara
Radio Profile Big FM 101.2 Pokhara
Rabi Raj Baral
 
Iprc transaltion in nepali by shreedeep rayamajhi
Iprc transaltion in nepali by shreedeep rayamajhiIprc transaltion in nepali by shreedeep rayamajhi
Iprc transaltion in nepali by shreedeep rayamajhi
Shreedeep Rayamajhi
 
Home based care booklet RS Mehta
Home based care  booklet RS MehtaHome based care  booklet RS Mehta
Home based care booklet RS Mehta
BP KOIRALA INSTITUTE OF HELATH SCIENCS,, NEPAL
 
National Health Policy (2071)
National Health Policy (2071)National Health Policy (2071)
National Health Policy (2071)
Nabin Bist
 
National health policy 2071
National health policy 2071National health policy 2071
National health policy 2071
Dr.Sharad H. Gajuryal
 
National health policy 2071
National health policy 2071National health policy 2071
National health policy 2071
Asian college
 
New Year66
New Year66New Year66
New Year66
mukeshbasnet
 
Aksharica - 012 (अक्षरिका - ०१२)
Aksharica - 012 (अक्षरिका - ०१२)Aksharica - 012 (अक्षरिका - ०१२)
Aksharica - 012 (अक्षरिका - ०१२)
Rajesh Koirala
 
Short orientation on reproductive health & Reproductive right (Nepali)
Short orientation on reproductive health & Reproductive right (Nepali)Short orientation on reproductive health & Reproductive right (Nepali)
Short orientation on reproductive health & Reproductive right (Nepali)
Public Health Update
 
संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३
संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३
संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३
WOREC Nepal
 
Presentation of vvip & vip carcade
Presentation of vvip & vip carcadePresentation of vvip & vip carcade
Presentation of vvip & vip carcade
Bipin Gautam
 
Far western-university
Far western-university Far western-university
Far western-university
Dammar Singh Saud
 
Economic Freedom. Political economic digest series - 4
Economic Freedom. Political economic digest series - 4Economic Freedom. Political economic digest series - 4
Economic Freedom. Political economic digest series - 4
Akash Shrestha
 
Child domestic labor handbook
Child domestic labor handbookChild domestic labor handbook
Disaster management
Disaster managementDisaster management
Disaster managementDPNet
 
Form 2
Form 2Form 2

Similar to Cyber law in nepal and implementation (20)

Cyber Crime in the context of nepal.pptx
Cyber Crime in the context of nepal.pptxCyber Crime in the context of nepal.pptx
Cyber Crime in the context of nepal.pptx
 
The history of mass media
The history of  mass mediaThe history of  mass media
The history of mass media
 
Political Trend of Nepal 2016/2017
Political Trend of Nepal 2016/2017Political Trend of Nepal 2016/2017
Political Trend of Nepal 2016/2017
 
Radio Profile Big FM 101.2 Pokhara
Radio Profile Big FM 101.2 PokharaRadio Profile Big FM 101.2 Pokhara
Radio Profile Big FM 101.2 Pokhara
 
Iprc transaltion in nepali by shreedeep rayamajhi
Iprc transaltion in nepali by shreedeep rayamajhiIprc transaltion in nepali by shreedeep rayamajhi
Iprc transaltion in nepali by shreedeep rayamajhi
 
Home based care booklet RS Mehta
Home based care  booklet RS MehtaHome based care  booklet RS Mehta
Home based care booklet RS Mehta
 
Booklet cancer
Booklet cancerBooklet cancer
Booklet cancer
 
National Health Policy (2071)
National Health Policy (2071)National Health Policy (2071)
National Health Policy (2071)
 
National health policy 2071
National health policy 2071National health policy 2071
National health policy 2071
 
National health policy 2071
National health policy 2071National health policy 2071
National health policy 2071
 
New Year66
New Year66New Year66
New Year66
 
Aksharica - 012 (अक्षरिका - ०१२)
Aksharica - 012 (अक्षरिका - ०१२)Aksharica - 012 (अक्षरिका - ०१२)
Aksharica - 012 (अक्षरिका - ०१२)
 
Short orientation on reproductive health & Reproductive right (Nepali)
Short orientation on reproductive health & Reproductive right (Nepali)Short orientation on reproductive health & Reproductive right (Nepali)
Short orientation on reproductive health & Reproductive right (Nepali)
 
संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३
संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३
संक्रमणकालीन न्यायः महिलाको दृष्टिकोणबाट- राष्ट्रिय बहस – २१ सेप्टेम्बर २०१३
 
Presentation of vvip & vip carcade
Presentation of vvip & vip carcadePresentation of vvip & vip carcade
Presentation of vvip & vip carcade
 
Far western-university
Far western-university Far western-university
Far western-university
 
Economic Freedom. Political economic digest series - 4
Economic Freedom. Political economic digest series - 4Economic Freedom. Political economic digest series - 4
Economic Freedom. Political economic digest series - 4
 
Child domestic labor handbook
Child domestic labor handbookChild domestic labor handbook
Child domestic labor handbook
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Form 2
Form 2Form 2
Form 2
 

More from Information Technology Society Nepal

Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
Information Technology Society Nepal
 
Information security
Information securityInformation security
Exploring web vulnerabilities
Exploring web vulnerabilitiesExploring web vulnerabilities
Exploring web vulnerabilities
Information Technology Society Nepal
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
Power of logs: practices for network security
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network security
Information Technology Society Nepal
 
Role of youth in cyber law
Role of youth in cyber lawRole of youth in cyber law
Role of youth in cyber law
Information Technology Society Nepal
 

More from Information Technology Society Nepal (6)

Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
 
Information security
Information securityInformation security
Information security
 
Exploring web vulnerabilities
Exploring web vulnerabilitiesExploring web vulnerabilities
Exploring web vulnerabilities
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Power of logs: practices for network security
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network security
 
Role of youth in cyber law
Role of youth in cyber lawRole of youth in cyber law
Role of youth in cyber law
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Cyber law in nepal and implementation

  • 1. ;fOa/ sfg'gM k|s[lt tyf cEof; clwjQmf afa'/fd cof{n cWoIf OG6/g]6 ;f];fO6L g]kfn . ;]G6/ km/ n P08 6]Sgf]nf]hL k|f=ln=
  • 2. k|:t'ltsf] If]q s]lx d'2fx? dflysf] ;+lIfKt 5nkmn ;fOa/ sfg'g M cy{ tyf k|s[lt sDKo'6/ ;DaGwL s;"/ tyf ;hfoF Goflos k|lqmof P]g nfu" gx'g] cj:yf Advocate Babu Ram Aryal/Center for Law and 2 Technology Pvt. Ltd. 01/30/13
  • 3. Case 1 The defendant had uploaded the video clips of sexual content in different sites. In the video, boy and girl from two different religious community were involved in sexual discourse. It is charged this kind of dissemination is also create the situation of confrontation between different caste and communities. The police took cognizance and investigated this case. Advocate Babu Ram Aryal/Center for Law and 3 Technology Pvt. Ltd. 01/30/13
  • 4. Case 2 The defendant used the email ID to create facebook and uploaded the sexual video clips and send vulgar message to applicant’s husband by claiming her character and tries to destroy the married of her. The defendant had also sent the message to other in different names. Advocate Babu Ram Aryal/Center for Law and 4 Technology Pvt. Ltd. 01/30/13
  • 5. Case 3 An unknown person used her email ID and uploaded the naked photo of her in different sites. Police investigate the case and found a person suspect to be involved on this activity Advocate Babu Ram Aryal/Center for Law and 5 Technology Pvt. Ltd. 01/30/13
  • 6. Case 4 The accused misused the photo of applicant, scanned it and publicly advertised it to harm the personal life of applicant. The applicant later complained this to police and later, police took the action under ETA. Advocate Babu Ram Aryal/Center for Law and 6 Technology Pvt. Ltd. 01/30/13
  • 7. Case 5 The defendants send the mail contain of abused and terrorized contains text in order to spread terror and fear in the public. They try to spread hatred speeches to different professionals and political leaders in order to fulfill their personal purposes. Their sole intention as they describe was to terrorize the persons with whom they have take the loan. Advocate Babu Ram Aryal/Center for Law and 7 Technology Pvt. Ltd. 01/30/13
  • 8. Case 6 defendant has sent her the sexual pictures and sexual sentence to her email ID and harassed her from long time. Advocate Babu Ram Aryal/Center for Law and 8 Technology Pvt. Ltd. 01/30/13
  • 9. Case 7 The defendant misused the email ID for illegal entrance to closed document of the company which harm the goodwill of the company because he violates the law. The applicant request for punishment for the defendant and police took the action. Advocate Babu Ram Aryal/Center for Law and 9 Technology Pvt. Ltd. 01/30/13
  • 10. Three Years Cyber Crime Investigation Chart
  • 11. Cyber Crime Investigation Table Fiscal Year 20011-12 Source: Metropolitan Nepal Police, Hanuman Dhoka
  • 12. ;fOa/ sfg'g M cy{ tyf k|s[lt Advocate Babu Ram Aryal/Center for Law and 12 Technology Pvt. Ltd. 01/30/13
  • 13. æ;fOa/ sfg'gÆsf] cy{  ;"rgf tyf ;+rf/ k|ljlwsf] k|of]u, vf;u/L ;fOa/ :k]z ;Fu ;DalGwt sfg'g ;fOa/ sfg'g xf] . of] sfg'gn] OG6/g]6 b'lgofFdf ePsf dfgjLo ultljlwnfO{ ;Daf]wg ug]{ sfg'g ;fOa/ sfg'g xf] .  ;fOa/ sfg'g vf;u/L sDKo'6/ / sDKo'6/ g]6jS;{;Fu ;DalGwt sfg'g xf] .  ;fOa/ sfg'g ;fOa/ :k]z zAbaf6 cfPsf] xf] . ;j}eGbf klxnf ;fOa/ :k]z zAbsf] k|of]u ljlnod luA;gn] ;g !(*$ df klxnf]k6s Neuromancer eGg] ;fOG; lkmS;g pkGof;df u/]sflyP . Advocate Babu Ram Aryal/Center for Law and 13 Technology Pvt. Ltd. 01/30/13
  • 14. æ;fOa/ sfg'gÆsf] cy{ “ Cyber Crime is an act of creating, distributing, altering, stealing, misusing and destroying information through the computer manipulation of cyber space; without the use of physical force and against the will or the interest of the victim” Advocate Babu Ram Aryal/Center for Law and 14 Technology Pvt. Ltd. 01/30/13
  • 15. æ;fOa/:k]zÆ sf] cy{ ;fOa/ :k]zn] Ps cfk;df hf]l8Psf sDKo'6/x?sf] ;+hfn dfkm{t x'g] l8lh6n 8f6fx? sf] k|jfxnfO{ hgfpFb5 . ;fOa/:k]z To:tf] :k]z xf] h'g sDKo'6/sf] dfWodaf6 x'g] ;+jfb÷;+rf/af6 lgdf{0f ePsf]x'G5 / hxfF cgnfO{g ;DaGw tyf cgnfO{g kl/ro lgdf{0f ul/G5 . ;fOa/ :k]z To:tf] :k]z xf] hxfF ;Ldf ljlxg ;+jfb jf ;+:s[lt sfod /fVg ;lsG5 .  New Media, an Introduction: Flew, Terry Advocate Babu Ram Aryal/Center for Law and 15 Technology Pvt. Ltd. 01/30/13
  • 16. æljB'tLo sf/f]af/Æ sf] kl/efiff  P]gn] ljB'tLo sf/f]af/ zAnfO{ kl/eflift u/]sf] 5}g . t/klg, ljB'tLo sf/f]af/ eGgfn] ;"rgfsf] cfbfg k| bfgsf] >[+vnfnfO{ a'lemG5 .  A Transaction usually means, in computer programming, a sequence of information exchange and related work (such as database updating) that is treated as a unit for the purposes of satisfying a request and for ensuring database integrity. http://searchcio.techtarget.com/definition/transaction  Event or process (such as an input message) initiated or invoked by a user or computer program, regarded as a single unit of work and requiring a record to be generated for processing in a database. http://www.businessdictionary.com/definition/transaction.html Advocate Babu Ram Aryal/Center for Law and 16 Technology Pvt. Ltd. 01/30/13
  • 17. sDKo'6/ ;DaGwL s;"/ tyf ;hfoF Advocate Babu Ram Aryal/Center for Law and 17 Technology Pvt. Ltd. 01/30/13
  • 18. ;fOa/ ck/fwsf lsl;d Advocate Babu Ram Aryal/Center for Law and 18 Technology Pvt. Ltd. 01/30/13
  • 19. sDKo'6/sf] e"ldsfsf] cfwf/df ;fOa/ ck/fwsf lsl;d Advocate Babu Ram Aryal/Center for Law and 19 Technology Pvt. Ltd. 01/30/13
  • 20. lkl8tsf] k|s[ltsf] cfwf/df Advocate Babu Ram Aryal/Center for Law and 20 Technology Pvt. Ltd. 01/30/13
  • 21. JolQmut lxtdf c;/kg]{ ;fOa/ ck/fwx? Advocate Babu Ram Aryal/Center for Law and 21 Technology Pvt. Ltd. 01/30/13
  • 22. cfly{s lxtdf c;/kfg]{ ;fOa/ ck/fwx? Advocate Babu Ram Aryal/Center for Law and 22 Technology Pvt. Ltd. 01/30/13
  • 23. /fli6«o ;'/Iffdf c;/ kfg]{ ;fOa/ ck/fwx? Advocate Babu Ram Aryal/Center for Law and 23 Technology Pvt. Ltd. 01/30/13
  • 24. ck/fwsf] ljifoj:t'sf] cfwf/df ;fOa/ ck/fwx? Advocate Babu Ram Aryal/Center for Law and 24 Technology Pvt. Ltd. 01/30/13
  • 25. ck/fwdf ;+nUg JolQmsf] cfwf/df ;fOa/ ck/fwx? Advocate Babu Ram Aryal/Center for Law and 25 Technology Pvt. Ltd. 01/30/13
  • 26. sDKo'6/ ;DaGwL s;"/ tyf ;hfoF s;"/ ;hfoF sDKo'6/ ;|f]t ;Í]tsf] rf]]/L, gi6 jf kl/jt{g # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j} -bkmf $$_ sDKo'6/ ;fdu|Ldf cglws[t kx'Fr -bkmf $ # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j %_ sDKo'6/ / ;"rgf k||0ffnLdf Iflt k''¥ofpg] # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j -bkmf $^_ ljB''tLo :j?kdf u}sfg"gL s''/f k|sfzg ug]{ % aif{ h]n ;hfoF jf ! nfv ;Ddsf] hl/jfgf jf b'j} -bkmf $&_ uf]kgLotf eË ug]{ -bkmf $*_ # aif{ h]n ;hfoF jf @ nfv ;Ddsf] hl/jfgf jf b'j e'm§f Joxf]]/fsf] ;"rgf lbg] -bkmf $(_ @ aif{ h]n ;hfoF jf ! nfv ;Ddsf] hl/jfgf jf b'j} e'm§f Ohfhtkq jf k||df0fkq k]z ug]{ jf @ aif{ h]n ;hfoF jf ! nfv ;Ddsf] hl/jfgf jf b'j} b]vfpg]-bkmf %)_ tf]lsPsf] ljj/0f jf sfuhft bflvnf gug]{ -bkmf %) xhf/ ;Ddsf] hl/jfgf %!_ sDKo'6'6/ hfn;fhLRam Aryal/Center%@_ and Advocate Babu ug]{ -bkmf for Law lauf] s;"/ ug{]af6 e/fO{ Ps nfv ?k}ofF;Dd 26 01/30/13 Technology Pvt. Ltd. hl/afgf
  • 27. b'?T;fxg tyf dltof/ ljB'tLo sf/f]af/ P]g adf]lhdsf] s'g} s;"/ ug{ s;}nfO{ b'? T;fxg ug]{ jf To:tf] s;"/ ug{ pBf]u ug]{ jf if8oGqdf ;fd]n x'g] JolQmnfO{ s;"/sf] dfqf x]/L krf; xhf/ ? k}ofF;Dd hl/afgf jf 5 dlxgf;Dd s}b jf b'j} ;hfo x'g]5 . -bkmf %#_ P]g adf]lhdsf s'g} s;"/ ug{ ;3fpg] jf cGo s'g} Joxf]/fn] dltof/ eO{ sfo{ ug]{ JolQmnfO{ d'Vo s;"/bf/nfO{ ePsf] ;hfosf] cfwf ;hfo x'g]5 . -bkmf %$_ Advocate Babu Ram Aryal/Center for Law and 27 Technology Pvt. Ltd. 01/30/13
  • 28. Goflos k|lqmof Advocate Babu Ram Aryal/Center for Law and 28 Technology Pvt. Ltd. 01/30/13
  • 29. ph'/L tyf cg';+wfg ljB'tLo sf/f]af/ ;DaGwL s;"/ 7xg]{ d'2f g]kfn ;/sf/ jfbL eO{ rNg]5 / To:tf] d'2f ;/sf/L d'2f ;DaGwL P]g, @)$( sf] cg';"rL–! df ;dfj]z ePsf] dflgg]5 . o:tf] s;"/sf] af/]df :yfgLo k|x/L ;dIf hfx]/L b/vf:t lbg'k5{ . sDKo'6/ ;DaGwL s;"/ 7xg]{ s'g} s;"/ ug{ k|of]u ul/Psf] s'g} klg sDKo'6/, sDKo'6/ k|0ffnL, ˆnkL, sDKofS6 l8S;, 6]k 8«fOe, ;ˆ6j]o/ jf cGo ;xfos pks/0fx? cg';Gwfg clwsf/Ln] hkmt ug{ ;Sg]]5 . -bkmf %^_ o:tf] d'2fdf cg';Gwfg ubf{ k|x/Ln] lgoGqs jf cGo Advocate Babu Ram Aryal/Center for Law;xof]u lng' kg{]5 . -bkmf &%_ ;DalGwt ljz]if1sf] and 29 Technology Pvt. Ltd. 01/30/13
  • 30. ;Ifd cbfnt P]gn] ljB'tLo sf/f]af/ ;DaGwL s;"/ x]g{sfnflu b'O txsf] Gofoflws/0fsf] kl/sNkgf u/]sf]5 . ;"rgf k|ljlw Gofoflws/0f ;"rgf k|ljlw k'g/fj]bg Gofoflws/0f . ;"rgf k|ljlw Gofoflws/0f u7g gePsf] cj:yfdf g]kfn ;/sf/n] /fhkqdf ;"rgf k|sfzg u/]/ s'g} lhNnf cbfntnfO{ d'2f lsgf/f ug]{ If]qflwsf/ tf]Sg ;Sg]5 . xfn ;Dd s'g} klg txsf] Gofoflws/0fsf] :yfkgf ePsf]5}g . xfn g]kfn ;/sf/n] /fhkqdf ;"rgf k|sflzt u/]/ sf7df8f}+ lhNnf cbfntnfO{ ljB'tLo sf/f]af/ P]g, @)^# cGtu{tsf s;"/ ;DaGwL d'2f x]g]{ If]qflwsf/ tf]s]sf]5 . Advocate Babu Ram Aryal/Center for Law and 30 Technology Pvt. Ltd. 01/30/13
  • 31. afXoIf]q If]qflwsf/ o; P]g adf]lhd s;"/ x'g] s'g} sfd g]kfn /fHoaflx/ /x]/ u/]sf] eP tfklg To:tf] s;"/ ul/Psf] sDKo'6/, sDKo'6/ k| 0ffnL jf sDKo'6/ g]6js{ k|0ffnL g]kfndf cjl:yt ePdf To:tf] s;"/ ug]{ JolQmnfO{ o; P]g adf]lhd d'2f rnfO{ ;hfo ug{ ;lsg]5 . -wf/f %%_ Advocate Babu Ram Aryal/Center for Law and 31 Technology Pvt. Ltd. 01/30/13
  • 32. xbDofb ljB'tLo sf/f]af/;Fu ;DalGwt s;"/ 7xg]{ s'g} s'/f ePsf]df To:tf] pNn+3g jf s;"/ eP u/]sf] yfxf kfPsf] ldltn] k} +tL; lbgleq ph'/ ug'{ k5{ . Advocate Babu Ram Aryal/Center for Law and 32 Technology Pvt. Ltd. 01/30/13
  • 33. k||rlnt sfg"g adf]lhd ;hfo ug{ afwf gk'Ug] o; P]g cGtu{t s;"/ 7xl/g] s'g} sfd cGo s'g} k|rlnt sfg"g adf]lhd klg s;"/ 7xl/g] /x]5 eg] To:tf] s;"/ pk/ 5'6[} sf/afxL rnfO{ ;hfo ug{ ;lsG5 . Advocate Babu Ram Aryal/Center for Law and 33 Technology Pvt. Ltd. 01/30/13
  • 34. P]g nfu" gx''g] ljlgd]o clwsf/kq P]g, @)#$ df pNn]v eP adf]lhdsf ljlgd]o clwsf/kqx?, as;kq, /fhLgfdf, aGwsL, sa'lnotkq, a08fkq jf To:t} k|s[ltsf crn ;DklQsf] xs x:tfGt/0f ug]{ lnvtx?, crn ;DklQ pk/ xs jf :jfldTj hgfpg] cGo s'g} lnvtx?, jf/];gfdf, lkm/fbkq, k|ltpQ/kq jf To:t} cGo k|sf/sf cbfntL sf/afxLdf k|of]u x'g] lnvtx?, bfaLkq, k|ltbfaLkq, k|ltjfbkq jf dWo:ytfsf] sf/afxLdf lnlvt ?kdf k]z ug'{kg{] cGo To:t} lnvtx?, k|rlnt sfg"gn] ljB'tLo :j?kdf /fVg gx'g] egL tf]s]sf lnvtx? . Advocate Babu Ram Aryal/Center for Law /fhkqdf ;"rgf k|sfzg u/L dfly g]kfn ;/sf/n] g]kfn and 34 Technology Pvt. Ltd. 01/30/13 plNnlvt lnvtx?df cfjZostfg';f/ yk36 ug{;S5 .
  • 35. lh1fzf tyf k|Zg < Advocate Babu Ram Aryal/Center for Law and 35 Technology Pvt. Ltd. 01/30/13
  • 36. ;|f]t JolQm kl/roM clwjQmf afa'/fd cof{nn] k'0f] ljZjljBfno, ef/taf6 sfg'gdf :gftsf]Q/ ug'{ePsf]5 . ;fOa/ sfg'g ljz]if1sf] ? kdf ;lqmo clwjQmf cof{n OG6/g]6sf] If]qdf sfo{/t cGt/f{li6«o ;+:yf OG6/g]6 ;f];fO6L g]kfn RofK6/ / g]kfndf ;fOa/ sfg'g ;DaGwL cg';Gwfg tyf tflnddf ;lqmo ;+:yf ;]G6/ km/ n P08 6]Sgf]nf]hL k|f=ln=sf cWoIf x'g'x'G5 . ;Dks{M kmf]gM (*%!)$*$)! Od]nM baburam.aryal@gmail.com; baburam@cltnepal.com j]a;fO6MRam Aryal/Center for Law and Advocate Babu www.cltnepal.com 36 Technology Pvt. Ltd. 01/30/13