E-Commerce Topics:
» Introduction of E-Commere
» The Advent of E-commerce
» Types of E-commerce
» The Scope of E-commerce
» Supply Chain Application
» What is E-commerce?
» Advantages of E-commerce
» The Business Model
» Developments in Supply Chain Management
» Business-to-business transactions in E-commerce
» Business-to-consumer transaction in E-commerce
» Electronic Data Interchange (EDI)
An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. It’s also called an electronic payment system or online payment system. T
Simplification and Ease of User Data Verification: The Regulatory Framework f...AHRP Law Firm
The Facial Verification Technology (FVT) plays a crucial role in Electronic Know Your Customer (E-KYC) processes, improving security and operational efficiency by remotely confirming individuals' identities through several online authentication steps by utilizing users' data registered in population databases. The purpose of FVT itself is to reduce the risks of identity theft and fraud. Recently, the Financial Services Authority (OJK) issued OJK Reg. 3/2024 focusing on the Implementation of Financial Sector Technology Innovations. This regulation outlines the licensing procedure for FVT organizers, aligning with MoHA Reg. 102/2019, which addresses access rights for using population data. Moreover, the implementation of FVT must comply with data protection regulations, in particular, Law 27/2022 and OJK Reg. 3/2024. Find out more about our insights on this topic in our Legal Brief publication.
E-Commerce Topics:
» Introduction of E-Commere
» The Advent of E-commerce
» Types of E-commerce
» The Scope of E-commerce
» Supply Chain Application
» What is E-commerce?
» Advantages of E-commerce
» The Business Model
» Developments in Supply Chain Management
» Business-to-business transactions in E-commerce
» Business-to-consumer transaction in E-commerce
» Electronic Data Interchange (EDI)
An e-payment system is a way of making transactions or paying for goods and services through an electronic medium, without the use of checks or cash. It’s also called an electronic payment system or online payment system. T
Simplification and Ease of User Data Verification: The Regulatory Framework f...AHRP Law Firm
The Facial Verification Technology (FVT) plays a crucial role in Electronic Know Your Customer (E-KYC) processes, improving security and operational efficiency by remotely confirming individuals' identities through several online authentication steps by utilizing users' data registered in population databases. The purpose of FVT itself is to reduce the risks of identity theft and fraud. Recently, the Financial Services Authority (OJK) issued OJK Reg. 3/2024 focusing on the Implementation of Financial Sector Technology Innovations. This regulation outlines the licensing procedure for FVT organizers, aligning with MoHA Reg. 102/2019, which addresses access rights for using population data. Moreover, the implementation of FVT must comply with data protection regulations, in particular, Law 27/2022 and OJK Reg. 3/2024. Find out more about our insights on this topic in our Legal Brief publication.
The New Drugs and Clinical Trials (Amendment) Rules, 2023. ClinosolIndia
The latest rules for the registry of Clinical Research Organisations (CRO) in India were issued in The New Drugs and Clinical Trials (Amendment) Rules, 2023. These rules mandate that any CRO conducting a clinical trial or bioavailability/bioequivalence study of new drugs or investigational drugs in human subjects must obtain registration from the Central Licensing Authority before conducting any such studies.
The registration process requires the CRO to submit an application with all the necessary details about the clinical trial or study, including the name and address of the sponsor, the name and qualifications of the principal investigator, details of the investigational drug, and other relevant information.
Once the application is submitted, the Central Licensing Authority will examine it to ensure that all necessary information has been provided and that the CRO has the necessary infrastructure, personnel, and equipment to conduct the study safely and effectively. If the Authority is satisfied with the application, it will grant registration to the CRO, after which it can conduct the clinical trial or study as per the approved protocol.
These rules are a significant step forward in ensuring the safety and ethical conduct of clinical trials and studies in India, and in providing greater accountability and transparency in the research process.
ആധാരം രജിസ്ട്രേഷന് ‘ആധാർ’ അധിഷ്ഠിത ബയോമെട്രിക്ക് വെരിഫിക്കേഷൻ നടപ്പാക്കി രജിസ്ട്രേഷൻ (കേരള) ചട്ടങ്ങൾ ഭേദഗതി ചെയ്തു. James Joseph Adhikarathil Kottayam Kerala Your land consultant 9447464502
ഭൂമി സംബന്ധമായ പ്രശ്നങ്ങൾ നിങ്ങളെ വിഷമിപ്പിക്കുന്നുണ്ടോ നിയമപരമായ പിന്തുണയും സഹായവും നൽകി പരിഹാരം കണ്ടെത്തുവാൻ ഞങ്ങൾ സഹായിക്കാം.
അഭിഭാഷകരും റവന്യൂ
വിദഗ്ധരും അടങ്ങിയ ഒരു ടീം ആണ് ഞങ്ങളുടേത്.
കേരളത്തിൽ എവിടെയും സേവനം നൽകുന്നു.ഭൂമിയുടെ തരം മാറ്റം സംബന്ധിച്ച പ്രശ്നങ്ങൾ റീ സർവേ പരാതികൾ, പൊന്നും വില നടപടികൾ സംബന്ധിച്ച പ്രശ്നങ്ങൾ തുടങ്ങി എല്ലാ ഭൂമി പ്രശ്നങ്ങളിലും സഹായവും പിന്തുണയും പരിഹാരവും .
Solve your Land Problems in Kerala.
JAMESADHIKARAM your land matter consultant
9447464502
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
2. Introduction
The Electronic Transactions Act, 2063 (2008) – ETA
Date of Authentication and Publication: 22 Mansir 2063
( december 8, 2008), Act number 27 of the year 2063
Enacted
House of Representatives in the year, 2063
2 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
3. Preamble
To make legal provisions for authentication and regularization of
the recognition, validity, integrity and reliability of generation,
production, processing, storage, communication and transmission
system of electronic records.
For controlling the unauthorized access of electronic records
(violation of the confidentiality) or of making alteration in such
records through the illegal manner (violation of the integrity)
3 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
4. Commencement and Extension
commenced from 24 Bhadra 2063 ( sep.2, 2008)
extend throughout Nepal and shall also apply to any person residing
anywhere by committing an offence in contravention to this Act.
4 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
5. Provisions Relating to Electronic Record and
Digital Signature
5 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
6. Authenticity of Electronic Record
(1) Any subscriber may, subject to the provisions of this section,
authenticate to any electronic record by his/her
personal digital signature.
(2) While authenticating the electronic record pursuant to
Subsection (1), an act of transforming such electronic record
to other electronic record shall be effected by the use of
asymmetric crypto system (such as RSA) and hash
function.
(3) Any person may verify the electronic record by using the
public key of the subscriber
6 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
7. Legal Recognition of Electronic Record
If any information, document, record or the matter
is maintained in an electronic form by fulfilling
the procedures as stipulated in this Act or
the Rules made hereunder, such electronic record
shall have legal validity.
7 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
8. Legal Recognition of Digital Signature
If any information, document, record or any
other matters are certified by the digital
signature after fulfilling the procedures as
stipulated in this Act or the Rules made
hereunder, such digital signature shall have legal
validity.
8 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
9. Electronic Records to be Kept Safely
Any information, document or record are said to be kept
safely in an electronic form, if that fulfills the following
condition,
(a) kept in an accessible condition making available for a
subsequent reference,
(b) kept safely in the format that can be demonstrated subject
to presenting again exactly in the same format in
which they were originally generated and transmitted or
received or stored
(c) kept making the details available by which the origin,
destination and transmission or date and time of receipt can
be identified
9 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
10. Provisions Relating to Controller and Certifying Authority
10 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
11. Appointment of the Controller and other Employees
(1)Government of Nepal may, by notification in the Nepal
Gazette, designate any Government officer or appoint
any person who has qualifications as prescribed in the office
of the Controller.
(2) Government of Nepal may, in order to assist the Controller
to perform his/her functions to be performed under this Act,
appoint or assign a Deputy Controller and other
employees as required. The employees so appointed or
assigned shall perform their functions under the general
direction and control of the Controller.
11 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
12. Functions, Duties and Powers of the Controller
The functions, duties and powers of the controller shall be as follows:
(a) To issue a license to the certifying Authority,
(b) To exercise the supervision and monitoring over the activities of
Certifying Authority,
(c) To fix the standards to be maintained by certifying authority in respect to
the verification of digital signature,
(d) To specify the conditions to be complied with by the certifying authority
in operating his/her business,
(e) To specify the format of the certificate and contents to be included
therein,
(f) To specify the procedures to be followed by the certifying authority while
conducting his/her dealings with the subscribers,
(g) To maintain a record of information disclosed by the certifying
authority under this act and to make provision of computer database
accessible to public and to update such database,
12 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
13. License to be obtained
No person shall perform or cause to be performed the functions of a
certifying authority without obtaining a license under this Act.
Things To be submitted for a License:
(1) Any person willing to work as Certifying Authority by issuing a certificate
under this Act and who has the qualifications as prescribed shall have to
submit an application to the controller in a format as prescribed
accompanied by a fee as prescribed for obtaining a license for the
certification.
(2) The applicant applying under Sub-section (1) shall also attach the following
documents:
(a) Details regarding certification,
(b) Documents to prove the identification and verification of the applicant,
(c) Statements specifying the financial resources, human resources and other
necessary facilities,
(d) Such other documents as prescribed.
13 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
14. 3. The controller may, if he/she thinks necessary, ask the applicant to serve
additional documents and details in connection to examine the
appropriation of the applicant as to perform the function of Certifying
Authority.
If the necessary additional documents and details are so asked, no
actions shall be taken upon the application of the applicant unless
he/she submits such documents and details.
14 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
15. Procedure for granting of a license
(1) The Controller may, on receipt of an application after considering
the qualification of applicant and also the documents and statements
decide upon within a period of two months of receipt of such
application ,whether or not a license should be issued to such an
applicant and a notice to that effect shall be given to him.
(2) While deciding upon the issuance of a license under Sub-section (1), the
Controller may inspect the facilities, financial and physical
resources of the applicant.
(3) If the Controller decides to issue a license under Sub-section (1), a
license in the prescribed format shall be issued to the applicant
specifying the period of validity of the license and also the
terms and conditions to be followed by him.
15 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
16. Renewal of License
(1) A license obtained by Certifying Authority shall have to renew in
each year
(2) A Certifying Authority desirous to renew the license under
Subsection (1), shall have to submit and application in the
prescribed format to the Controller at least two months
prior to the expiry of the period of validity of such a license
along with such renewal fee as prescribed,
(3) If an application is submitted for renewal, under Sub-section (2),
the Controller shall have to decide whether to renew the
license or not, after completing the procedures as prescribed one
month prior to the expiry date of validity of such a license,
16 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
17. License may be suspended
(1) If the documents or statement and statement of financial
and physical resources submitted by the certifying authority before
the Controller in order to obtain a license are found incorrect or
false or the conditions to be complied with in course of operation
of business is not complied with or this Act of the Rules framed
hereunder are found to be violated, the Controller may suspend the
license of the certifying authority till the inquiry in this regard is
completed.
Provided that, Certifying Authority shall be given the reasonable
opportunity to present his/her defense prior to such suspension of
a license.
17 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
18. Recognition to Foreign Certifying Authority
The Controller may with the prior approval of
Government of Nepal, and subject to such conditions
and restrictions as may be prescribed, by notification in
the Nepal Gazette, recognize any Certifying
Authority who has obtained a license to certify under any
foreign law.
Any foreign Certifying Authority so recognized may issue
the certificates under this Act or the Rules made there
under throughout the Nepal.
18 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
19. The Controller may issue Orders
The Controller may, in order to cause to fulfill the
responsibilities in regard to issuance of a certificate by
the Certifying Authorities, issue directives, from time to
time.
It shall be a duty of the Certifying Authority to
comply with such directives.
19 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
20. The Controller may delegate power
The Controller may, in order to perform the function to be
performed by him/her delegate to any officer
subordinate to him/her to exercise all or any of his/her
powers under this Act or the Rules framed hereunder.
20 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
21. The Controller may investigate
(1) The Controller may, if he/she believes that this Act or
the Rules framed hereunder are not complied
with by the Certifying Authority or by other concerned
person, conduct him/herself or cause any officer to
conduct necessary investigation in that regard.
(2) It shall be a duty of Certifying Authority to assist
the investigations, referred to in Sub-section (1).
21 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
22. Performance Audit of Certifying Authority
(1) The Controller may conduct performance audit of the
Certifying Authority in each year.
(2) The Controller may, appoint any recognized auditor, who
has expertise in computer security or any computer expert.
(3) The Controller shall publish the report of the performance
audit in the electronic form made under Sub-section (1) by
maintaining in his/her computer database.
(4) The qualification of the performance auditor or
remuneration and the procedures of such audit shall be as
prescribed.
(5) The Controller shall fix the standard of the service of
Certifying Authority and publish a notice publicly for the
information to the public-in-general. 5/24/2012
22
Courtesy: ETA, 2063 @ Ministry of Science and Technology
23. Provisions Relating to Digital Signature and Certificates
23 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
24. Certifying Authority may issue a Certificate
Only licensed or recognized CA may issue a Digital Certificate.
Apply to obtain a Certificate:
(1) Any person desirous to obtain Digital Signature Certificate may
apply to the Certifying Authority in such a format along with such fee
(2) On receipt of an application under Sub-section (1), the Certifying
Authority shall have to decide whether to issue or not a certificate to
the applicant within one month of such application so received.
(3) The Certifying Authority shall, if it decides to issue a certificate
under Sub-section (2), issue a Digital Signature Certificate within
seven days affixing his signature in a prescribed format with the
inclusion of such statements as prescribe and if it decides to reject to
issue such certificate, the applicant shall be notified the reasons for
rejection within seven days.
24 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
25. Functions, Duties and Rights of Subscriber
To Generate Key pair:
(1) Where any Certificate issued by the Certifying Authority and accepted by
subscriber, consisting of a public key which corresponds to the key pair and
to be listed in such Certificate and if such key pair is supposed to be
generated by the subscriber only, then the subscriber shall generate
such key pair by applying the secured asymmetric crypto system.
(2) If a Certifying Authority and the subscriber have concluded an
agreement or the Certifying Authority has accepted any specific system
regarding the security system to be used to generate the key pair, then, it
shall be the duty of subscriber to apply the security system as specified in
agreement or accepted by the Certifying Authority.
25 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
26. To Accept a Certificate
(1) The certificate have been accepted by the subscriber in the following
conditions:
If he publishes such a certificate or authorizes to publish to one or
more persons, or
If there exists any ground of his acceptance to such certificate which
may cause to believe it.
(2) If the certificate is accepted it shall be deemed that the subscriber, by
that reason, has guaranteed to all who reasonably rely on the information
contained in the certificate that-
The subscriber holds the private key corresponding to the public key and is
entitled to hold the same,
All facts relevant to the information contained in the certificate are true, and
All information mentioned in the certificate is, to the best knowledge of subscriber, is
true and correct.
26 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
27. To retain the private key in a secured manner
(1) Every subscriber shall exercise to retain private key
corresponding to the public key listed in the Certificate and
adopt all measures to prevent its disclosure from unauthorized to affix
the digital signature of subscriber.
(2) If the private key has been disclosed, then, the subscriber shall
communicate the same without any delay to the Certifying
Authority and on receipt of such information the Certifying
Authority shall immediately suspend such a Certificate.
(3) If a certificate is suspended under this Act, it shall be a duty of the
subscriber to retain the private key under this section in a safe manner
throughout the duration of such suspension of Certificate.
27 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
28. To Deposit the Private Key to the Controller
If the Controller thinks, in order to protect the sovereignty or
integrity of Nepal, to maintain the friendly relations with friendly
countries, to maintain the law and order, to prevent from committing
of any offence under the laws prevailing, and or in other conditions as
prescribed, necessary to issue an order to any subscriber to
deposit the private key to him/her specifying reason there
for, such a subscriber shall immediately deposit the private
key to the Controller.
The controller shall not inform any unauthorized person
about the private key deposited as per sub section (1).
28 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
29. Provisions Relating to Network Service
29 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
30. Liability of Network Service Providers
Intermediaries providing their services as network service
providers shall undertake the following liabilities in regard to
such service provided by them:
Liabilities referred to in the agreement made with the
subscriber in regard to service provision,.
Liabilities referred to in the license of network service
providers
30 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
31. Network Service Provider not to be Liable
No network service provider shall be liable to bear any criminal
or civil liability arising from any fact or statement mentioned or
included in the information or data of the third party made available in
electronic form by him/her merely on the ground that he/she has
made available the access to such information or data.
Provided that, such a person or institution providing network service
shall not be relieved from such liability, if he/she has made available
access to such information or data with the knowledge that any fact or
statement mentioned or included in such information or data
contravene this Act or Rules framed hereunder.
31 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
32. Offence Relating To Computer
So called
“Cyber Crime”
32 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
33. To Pirate, Destroy or Alter computer source code
When computer source code is required to be kept
as it is position for the time, if any person, knowingly or
with malafide intention, pirates, destroys, alters
computer sources code to be used for any computer,
computer programme, computer system or computer
network or cause, other to do so
He/she shall be liable to the punishment with imprisonment
not exceeding three years or with a fine not exceeding
two hundred thousand Rupees or with both.
33 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
34. Unauthorized Access in Computer Materials
If any person with an intention to have access in any
programme, information or data of any computer,
uses such a computer without authorization of the owner of
or the person responsible for such a computer or even in the
case of authorization, performs any act with an intention to
have access in any programme, information or data contrary
to from such authorization,
Such a person shall be liable to the punishment with the fine not
exceeding Two Hundred Thousand Rupees or with
imprisonment not exceeding three years or with both
depending on the seriousness of the offence.
34 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
35. Damage to any Computer and Information System
If any person knowingly and with a mala fide intention to
cause wrongful loss or damage to any institution
destroys, damages, deletes, alters, disrupts any
information of any computer source by any means or
diminishes value and utility of such information or affects
it injuriously or causes any person to carryout such an act,
Such a person shall be liable to the punishment with the fine not
exceeding two thousand Rupees and with imprisonment
not exceeding three years or with both.
35 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
36. Publication of illegal materials in electronic form
If any person publishes or displays any material in the electronic media
including computer, internet which are prohibited to publish or display
by the prevailing law or which may be contrary to the public morality or
decent behavior or any types of materials which may spread hate
or jealousy against anyone or which may jeopardize the
harmonious relations subsisting among the peoples of various
castes, tribes and communities
Such a person shall be liable to the punishment with the fine not exceeding One
Hundred Thousand Rupees or with the imprisonment not exceeding
five years or with both.
If any person commit an offence referred to in Sub-section (1) time to time
he/she shall be liable to the punishment for each time with one and one
half percent of the punishment of the previous punishment
36 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
37. Confidentiality to Divulge
If any person who has an access in any record, book, register,
correspondence, information, documents or any other material under
the authority conferred under this Act or Rules framed hereunder
divulges or causes to disclose confidentiality of such record, books,
registers, correspondence, information, documents or materials to any
unauthorized person,
He/she shall be liable to the punishment with a fine not exceeding Ten
Thousands Rupees or with imprisonment not exceeding two years
or with both, depending on the degree of the offence.
37 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
38. To inform False statement
If any person with an intention to obtain a license from
Certifying Authority with an intention to obtain Digital
Signature Certificate or with any other intention conceals
statement knowingly or lies any statement to be
submitted to the Certifying Authority any false
statements
She/he shall be liable to the punishment with a fine not exceeding
One Hundred Thousands rupees or with an
imprisonment not exceeding two years or with both.
38 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
39. Submission or Display of False License or Certificates
If any person who works as a Certifying Authority without a
license issued by the Controller under this Act, shall be liable to the
punishment with a fine not exceeding one hundred thousands
Rupees or with an imprisonment not exceeding two years or
with both, depending on seriousness of the offence.
Any person without obtaining a license from the Certifying Authority
publishes a fake license or false statement in regard to license or
provides to any person by any other means, shall be liable to the
punishment not exceeding one hundred thousand Rupees in the
case where the act referred to in Sub-section (1) has not been
accomplished by such a person.
39 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
40. To commit computer fraud
If any person, with an intention to commit any fraud or any
other illegal act, creates, publishes or otherwise provides
digital signature certificate or acquires benefit from
the payment of any bill, balance amount of any one's
account, any inventory or ATM card in connivance of
or otherwise by committing any fraud,
Amount of the financial benefit so acquired shall be recovered
from the offender and be given to the person concerned and
Such an offender shall be liable to the punishment with a fine
not exceeding one hundred thousand Rupees or with
an imprisonment not exceeding two years or with both.
40 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
41. Abetment to commit computer related offence
A person who assists other to commit an offence
relating to computer under this Act or who attempts or
is involved in the conspiracy to commit such an offence
He/she shall be liable to the punishment with a fine not
exceeding fifty thousand Rupees or with imprisonment
not exceeding six months or with both, depending on the
degree of the offence.
41 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
42. Punishment to the Accomplice
A person who assists others to commit any offence under
this Act or acts as accomplice, by any means shall be
liable to one half of the punishment for which the
principal is liable.
Punishment in an offence committed outside Nepal:
If any person commits any act which constitutes an offence under
this Act and which involves the computer, computer system
or computer network system located in Nepal, even
though such an act is committed while residing outside
Nepal, a case may be filed against such a person and shall be
punished accordingly
42 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
43. Offences Committed by a corporate body
(1) If any act is done by a corporate body which deems an offence
under this Act, such an offence shall be deemed to have been
committed by a person who was responsible as chief for the
operation of the corporate body at the time of committing
such an offence.
(2) Provided that, if the person who was responsible as a chief for the
operation of such a corporate body proves that such an offence
was committed without his/her knowledge or that he/she
exercised all reasonable efforts to prevent such an offence,
he/she shall not be liable to the guilty.
43 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology
44. Other Punishment
If any violation of this Act or Rules framed hereunder has been
committed, for which no penalty has been separately
provided,
Such a violator shall be liable to the punishment with a fine
not exceeding fifty thousand Rupees, or with an
imprisonment not exceeding six months or with both.
44 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
45. Chapter-10
Provisions Relating to Information Technology Tribunal
Chapter-11
Provisions Relating to Information Technology Appellate
Tribunal
Chapter-12
Miscellaneous including
45 Courtesy: ETA, 2063 @ Ministry of Science and Technology 5/24/2012
46. This Act shall not Apply
This Act shall not be applied in the following matters:
(a) Negotiable Instruments as referred to in the Negotiable Instruments Act,
2034 (1977).
(b) Deed of will, deed of mortgage, bond, deed of conveyance, partition or any
such deed related with transfer of the title in any immovable property,
(c) Any other document which demonstrates title or ownership in any immovable
property,
(d) Power of Attorney, statement of claim, statement of defense or any such other
documents as may be used in courts proceedings,
(e) Statement of claim, counter-claim, statement of defense or any such other
document as may be submitted in writing in the proceedings of any
Arbitration,
(f) Documents as prescribed by the prevailing law that requires not to retain in
electronic form.
46 5/24/2012
Courtesy: ETA, 2063 @ Ministry of Science and Technology