Chapter 1
Chapter 1
1.1.1 Cyber
Cyber is a prefix used in a growing number of terms to describe new things that
are being made possible by the spread of computers. The term cyber is used in
combination of other words that convey a meaning related to computer,
computer network and virtual reality.
There are other things related to cyber i.e. cyber phobia which means fear of
computer , cyberpunk which means science fiction which draws ideas of
computer science , cyber space which means a non-physical territory created by
computer , cyber café means commercial outlet where we can get internet
services and cybernetics means scientific study and communication of animal and
machine.1
Cyber-crime is the emerging crime around the globe which has unique modus
operandi and can be committed being domiciled in any part of world against
individual or institution situated in other part.2 In general crime committed
through the help of computers and internet is known as cybercrime .Cyber-crimes
are defined as offences that are committed against individual or groups of
individual with a criminal motive to intentionally harm the reputation of the
victim cause physical or mental harm to the victim directly or indirectly using
1
NARAYAN PRASAD SHARMA CYBER SPACE AND CYBER LAW, 55 (2015 ).
2
NICK & ROBERT TAYLOR, THE WORLD’s CURRENT EFFORT ON CYBERCRIME, In: Computer Law and Security
Report, 390-395 (2004).
1
modern communication network such as internet, computers and mobile phones.
Theft of computer source code, unauthorized access, destructing computer and
computer system, illegal publication, violation of privacy, providing wrong
information, computer fraud etc. are known as cyber-crime.
Cyber-crime can generally be divided into two broad categories: - crime that are
facilitated by computer or the internet, and crime against computer or computer
system.3Cyber-crime is an extension of traditional crimes but takes place in
cyberspace.4Cyber-crime includes activities like:
a. Hacking
b. Child pornography
c. Cyber stalking
d. Denial of service attack
e. Virus dissemination
f. Software piracy
g. IRC crime
h. Credit card fraud
i. Phishing
j. Net extortion
Thus, any activity that uses computer as an instrumentality, target or a
means for perpetrating further crime, falls within the ambit of cybercrime.
If such an activities is committed by a person then it is regarded as a
3
GERALD R. FERRERA, CYBER LAW TEXT AND CASES, 402 (3rd Edition,2012).
4
The term “cyberspace” was first used by author William Gibson in his 1984 science fiction novel Neuromanceras
cited in Gabers , 23,(2002).
2
cybercrime.5 To control such a activities cyber law is necessary for a
sanction.
Cyber law means an ample variety of political and legal issues related to the
internet and other communication technology, including intellectual property,
privilege freedom, freedom of expression and jurisdiction. 6 Cyber law governs the
legal issue of cyber space. The term cyber space is not restricted to internet. It is a
very wide term that includes computers, computer networks, the internet data
software etc.
Any laws relating to protecting the internet and other online communications
technologies is known as cyber law. Cyber law is also known as internet law.
Cyber law is the area of law that deals with internet, relationship to technological
and electronic elements including computers, software, hardware and
information system. On the other hand cyber law encompasses a wide variety of
legal issues related to use of communication technology.
5
VISHWANATH PARANJRAPE, CYBER CRIMES AND LAW,(Center Law Agency).7.(2010 ).
6
NARAYAN PRASAD SHARMA, CYBER SPACE AND CYBER LAW, 40 (2015).
3
1.2 Statement of problem
This study and the related research are conducted to enact the new legislation
related to cyber law. The study acknowledges that the prevailing laws related
to cyber are not sufficient. Similarly, it also affirms that the protection of
system is being increasingly difficult and complex due to rapid advancement
of technology.
4
The significance of conducting this research is as follows:
• This research will help to formulate the legislation related to cybercrime.
• This research will help to explore the knowledge about cyber security.
• This research will help to see the minimization of cybercrime.
It would also help to enlarge jurisdiction for cyber suit.
1.6Methodology of study
The study is carried out in doctrinal method. Analytical and historical method
of research will also be applied. The study is carried out on the basis of
primary and secondary sources of information. Primary sources of information
includes Civil code, Acts, Regulations, Judicial decisions and other
international instruments whereas secondary sources of information are
collected from various books, articles, law journals, webs, reports and other
legal materials.
5
1.7Literature review
1. The book "Cyber law and Cyber Crime" written Prashant Mali published by
Snow white, First Edition, 2005
7
In the second chapter history of cybercrime in world perspective and
Nepalese perspective is included.
The third chapter deals with the development of cyber law in world
perspective and Nepalese perspective is included.
Fourth chapter deals with the legislations and laws relating to cyber law in
Nepal. Also it includes some of the cases related to cybercrime.
8
Chapter 2: History of cyber crime
7
HIM KOIRALA,COMPUTER SCIENCE, 14 (2015).
8
Id. at 15.
9
Id. at 16.
10
Id. at 17.
11
Id. at 19.
9
In this way Internet was made/propounded on fourth generation of
computer i.e. After 1970 A.D. The term Internet means a global network. The
internet is a global system of interconnected computer networks that use the
standard internet protocol suit which is called TCP/IP. It is also defined as a
network of network.
The history of IT and computers in Nepal dates back to not more than a couple of
decades. However, the growth of Information Technology here has been rapid.
The major leap towards the advancement in this field started when the first
computer IBM 1401, a second generation mainframe computer , was used in the
1971 census, although an electronic calculator called ‘Facid’ was used before in
the 1961 census. Again, another second generation mainframe computer ICL
2950/10 was used for the 1981 census.12
12
HIM KOIRALA, COMPUTER SCIENCE, 264, (2015).
10
The credit for introducing internet among the people mainly goes to the private
sector. Although the internet was initially limited only to email services, in 1995,
a company Mercantile Communications finally started the internet services in the
country. In 1998, Nepal Telecommunications Authority (NTA), a
telecommunications regulatory body, was formed as per the Telecommunications
Act 1997. NTA holds the power to issue license to the Internet Service Providers
(ISPs) in Nepal.
Hacker’s code backers and cyber spics might sound like a modern artifact of the
computer age but their forefathers and pioneers of the field can be traced back to
more than half a century ago.
a) British cryptographer Alan Turning and his team at Bletchley Park invent
a Bombe, a code breaking machine in 1939 A.D.
b) Lun Murphy aka captain Zap became the first cracker to be tried and
convicted as a felon on 1981 on U.S.A in Philadelphia.
11
c) The Comprehensive Crime Control Act 1984 gives the secret service
jurisdiction over computer fraud under U.S. criminal code.
d) In 1985 hackers handbook was published.
e) First National Bank of Chicago became the victim of $70 million on
computer theft on 1989.
f) The Computer Misuse Act, 1990 was passed in the United Kingdom for
any unauthorized access to computer system.
g) In 1994 Russian cracker theft $10 billion from Citibank and transfer the
money to different bank account around the world.
h) A hacker alters/hack a websites of the United States Department of
Justice, the CIA AND THE US air force in 1996.
i) In 2000 A.D. teenage hacker Jonathan James becomes first juvenile to
serve a jail time for hacking.
j) In 2004 North Korea claims to have 500 trained hackers who successfully
crack South Korean, Japanese and their allies computer system.
k) Largest Defacement in Web history at that time is performed by the
Turkish hacker isKORPiTX who successfully hacked 21,549 websites in
one sweep.
l) Google intellectual property is stolen by Chinese hacker in what in what
come to be known as Operation Aurora in 2010.
m) Sony’s play station network is infiltrated and brought down on 2011 A.D.
n) The Bit coin exchange Mt. Gox filed for bankruptcy after $460 million
was apparently stolen by hackers in 2014.13
13
http://www.informationsecuritybuzz.com/articles/the-secret-history-of-cyber-crime/.
12
In this way we can find out many crimes related to cyber in today’s world due to a
development of internet and computer. Such tools are being misused in
unnecessary purpose.
a) In 2013 the police Central Investigation Bureau (CIB) arrested four (4) people
including two foreigners from Nigeria and Sierra Leone for operating a fraud
racket via SMS. Since no provision covers phishing, these men were
prosecuted under theft laws in the general legal code.
b) After the first constituent assembly election ,many people shows their anger
through social networking sites like Facebook by uploading and sharing
defamatory images and messages of political leader and public figures.
14
http://kathmandupost.ekantipur.
http://www.grin.com/en/e-book/305565/cybercrime-in-nepalcom/news/2http://www.imnepal.com/cyber-law-
nepal/014-05-25/cybercrime-without-cyber-rules.html.
13
c) In 2014 Raju Prasad shah from Nepal government who was a section officer in
Shiraha district told that to fire a gun from back to former Vice prime minister
and Home minister Bamdev Gautam on a photo of Bamdev Gautam on
Facebook comment. After that case was not filed in the court . 15
d) In 2016 a group of Nepalese hacker named Anonymous opnep has claimed to
have breached into the server of Nepal Telecom, the biggest
telecommunication service provider in Nepal. Hackers have gained access to
all the details of NTC users that include username, citizenship name, and
father’s name as well as other private information which you have to fill up
during new SIM registration.
e) In 2015 the Office of the President website was defaced by a Turkish hacker
challenging the government to narrow security gaps on Nepali websites.
f) Official Website of Nepali embassy in Australia has been hacked. The official
web-domain www.necan.gov.np has been hacked and still remains under-
control of the hacker. A group of hacker called ‘Unknown Ghost’ has put in the
clip of horror film in the website.
g) Pakistani and Bangladeshi Hacker’s group named DR@CUl@ has hacked a
number of Nepal Government’s websites.
h) Nepal Law Commission - a statutory independent body created by the Nepal
Law Commission Act, 2007 has also been hacked.
i) Another site to be hacked is Government of Nepal Ministry of Agriculture
Development Department of Agriculture Kanchanpur
http://www.dadokanchanpur.gov.np/index.html hacker left this message on
15
https://www.youtube.com/watch?v=DOkRB_jTnGw.
14
the site: Your Site Has Been Hacked by Dr@cul@ From BD GREY HAT
HACKERS, Im Owner Site Admin Yeaah Hahahaha..
In this way this we can find out many cyber related crimes in Nepalese
perspectives. Hacking , fraud through computers are increasing day by day.So
to control such a crimeful activities there are also a existing laws in our
country.
16
https://www.gadgetbytenepal.com/5-cyber-crimes-nepal/
15
possibility in today’s context of Nepal, but we can see a various example of
Font piracy.17
Also, Source Code piracy cases have been heard in Nepal lately. Since the
case has not been solved, the whole story is an unsolved mystery. It has
been allegedly reported that a software company filed a case against a
Media House for copying their source code.
17
Id. at
18
Id. at
19
Id. at
16
using someone else’s account or other methods is called Unauthorized
Access. Examples of the unauthorized use of computers include an
employee using a company computer to send a personal e-mail or
someone gaining access to a bank computer and performing an
unauthorized transfer.20
20
Id. at
17
Chapter 3 : Development of Cyber law
Today’s internet was born in the early 1960’s while the initial efforts for its
regulation could only be witnessed in the late 1990’s. In the early 1970’s countries
began adopting broad laws aimed at protecting individual privacy. The genesis of
modern legislation in this area can be traced to first data protection law in the
world enacted by West Germany in 1970. It was followed by Sweden on 1973 ,
United States on 1974 , Germany on 1977 and France on 1978 . 21
18
located in every state to which crimes may be reported. Also Computer Fraud
and Abuse Act (1986), Electronic Communications Privacy Act, 1986 are also
laws related to cyber-crime.22
b) China
China boasts of 111 million internet users, the world second largest number
after the United States. In China cyber-crimes are controlled by police. Specific
regulation on cyber-crime started in 1994 when the State Council promulgated
the Ordinance on Security Protection of Computer Information System. 23
c) India
The Information Technology Act was first enacted in 2000, and has been
revised most recently in 2008. In this act section 43 is about data protection,
section 66 is about hacking, section 67 is about cyber terrorism, and section 72
is about privacy and confidentiality which are related to cyber-crime. 24
d) United Kingdom
In U.K. there exist different laws regulating cyber-crimes. Obscene Publication
Act (1959), Police and Criminal Evidence Act (1981), Computer Misuse Act
(1990) and Data Protection Act, 1998 are main laws concerning cyber-crimes in
UK.25
22
BALARAM RAUT, An Analysis of Cyber Crime from Conceptual Perspectives: Where is Nepal, 37 NEPAL LAW
REVIEW, 259-261 (2012)
23
Id. at 19
24
Id. at 19
25
Id. at 19
19
In Nepal cyber law was made on 2061 B.S. after the incident of hacking of Nepal
telecom’s network. Before that there was not any cyber-relating law because no
cyber-crime was found before that. Though the crimes were happened but those
were not of serious types and it was not filed in a court.
New cybercrime offences materialize daily but the legal system lags behind in
offering protection. Prior to 2004, cybercrimes were dealt with under the Public
Offence Act with minimal success. Later, the Electronic Transaction and Digital
Signature Act 2004 was passed.
The Electronic Transaction and Digital Signature Act was enacted to encourage
the IT industry in Nepal. Nepal’s last five-year plan aimed to increase access to
information technology to the public, which would help promote good
governance, better opportunities and a more informed society. Similarly, the IT
Policy 2010 was enacted to use IT as a tool for social and financial development,
which would ultimately help in reducing poverty. Though the policy is promising
on paper, not much has been implemented.
20
4.1 Legal provision relating to cybercrime
In Nepal there are three specific statutes which are regulating the cyber-crime
directly and indirectly. Those laws are The Electronic Transaction Act, 2063,
Banking Offences Act, 2007 and Digital Signature Act, 2011. And the cyber-crimes
which are not covered by these laws are dealt by Some Public (Crime and
Punishment) Act, 1970.
There was no separate and independent law related to computer crimes prior to
the enactment of the Electronic Transaction Act, 2063 referred to and all the
computer related crimes were tried under the traditional law of crimes, i.e.
Country Code and sector specified criminal laws. Because of increasing use of
computer in commission of different crimes and commission of crime against
computer, it posed practical problem for the regulating agencies to regulate
cyberspace transaction of citizens. ETA was promulgated by parliament of Nepal
recognizing the expediency to make, legal provision for authentication and
regularization of the recognition, validity, integrity and reliability of generation,
production, processing, storage, communication and transmission system of
electronic records by making the transactions to be carried out by means of
electronic data exchange or by any other means of electronic communications,
reliable and secured.26Furthermore, the act was promulgated for controlling the
26
Electronic Transaction Act, 8 Dec 2007, Preamble.
21
acts of unauthorized use of electronic records or of making alternation in such
records through the illegal manner.27
Under definition clause of the act, certain terminology related to cybercrime has
been defined which includes definition of computer, computer database,
computer network, data, access, electronic record, computer accessory and so
on. Major part of ETA governs provision related to electronic record and digital
signature, controller and certifying authority, digital signatures and certificates,
subscriber's duties and rights, government use of digital signature, network
service and constitution of tribunals. However, chapter 9 under ETA explicitly
provides provision related to offence relating to computer.
In more detail, section 44 of ETA has criminalized the act of piracy, destruction or
alteration of computer source code. If any person knowingly or with malafide
intention, pirates, destroys, alters computer source code to be used for any
computer, computer program, computer system or computer network or cause,
other to do so, shall be liable with punishment with imprisonment not exceeding
three years or with a fine not exceeding two hundred thousand rupees or with
both. Clarification of the section 44 has provided that 'computer source code'
means the listing of programs, computer command, computer design and layout
and program analysis of the computer resources in any form.
27
ETA, 2063, preamble, para 2.
22
of the owner of or the person responsible for such computer or even in the case
of authorization, performs any act with an intention to have access in any
program, information or data contrary to from such authorization, such a person
shall be liable to the punishment with the fine not exceeding two hundred
thousand rupees or with imprisonment not exceeding three years or with both
depending on the seriousness of the offence.
Section 46 has criminalized the act of damaging any computer and information
system. If any person knowingly and with a malafide intention to cause wrongful
loss or damage to any institution destroys, damages, deletes, alters, disrupts any
information of any computer source by any means or diminishes value and utility
of such information or affects it injuriously or causes any person to carry out such
an act, such a person shall be liable to the punishment with the fine not exceeding
two thousand rupees and with imprisonment not exceeding three years or with
both.
28
Interim Constitution of Nepal, 2063, Article 13(3)(a)
23
communities shall be liable to the punishment with the fine not exceeding one
hundred thousand rupees or with the imprisonment not exceeding five years or
with both.29
Section 52 of ETA has criminalized the act of commission of computer fraud. If any
person with an intention to commit any fraud or any other illegal act, creates,
publishes or otherwise provides digital signature certificate or acquires benefit
from the payment of any bill, balance amount of any one's account, any inventory
or ATM card in connivance of or otherwise by committing any fraud, amount of
the financial benefit so acquired shall be recovered from the offender and be
given to the person concerned and such an offender shall be liable to the
punishment with a fine not exceeding one hundred thousand rupees or with an
imprisonment not exceeding two years or with both.31
29
ETA, 2063, Section 47.
30
Id. at , Section 48.
31
Id. at , Section 52.
24
Section 53 of ETA has criminalized abetment to commit computer related offence.
A person who abets other to commit an offence relating to computer under the
act or who attempts or is involved in the conspiracy to commit such an offence
shall be liable to the punishment with a fine not exceeding fifty thousand rupees
or with imprisonment not exceeding six months or with both, depending on the
degree of the offence.32Section 54 of the ETA has criminalized punishment to the
accomplice. A person who assists other to commit any offence under the act or
acts as accomplice, by any means shall be liable to one half of the punishment for
which the principal is liable.33
25
accordingly 34 -- for example the online defamation can be tied under laws for
defamation, online prostitution can be filed under laws prohibiting prostitution,
online gambling under laws prohibiting gambling in Nepal and so on.
Banking Offence and Punishment Act, 2008 is the law governing banking
operation and transaction. Section 6 of the act has prohibited obtaining or making
payment by way of abuse or unauthorized use of a credit card, debit card,
automated teller machine (ATM) card or other electronic means. 35The person
committing this crime shall be punished with recovery of amount and punishment
up to five years depending on the amount of money.36
Some Public (Crime and Punishment) Act, 1970 has prohibited certain action
amounting it to be as public crime which includes commission of act to make
obscene show by using obscene speech, word or gesture in public place, 37 to print
or publish any obscene materials using obscene language or by any word or
picture which denotes obscene meaning; or to exhibit or sell or distribute such
obscene publication in public place other than the purpose of public health or
34
Id. at., Section 59.
35
Banking Offence and Punishment Act, 2008, Section 6.
36
Id. at, Section 15.
37
Some Public (Crime and Punishment) Act, 1970, Section 2(1)(c).
26
health science38, to threat or scold or tease or to commit any undue act or to
express any undue thing to anyone through telephone, letter or any other means
or medium with keeping intention to intimidate, terrorize or cause trouble or to
insult or defame or harass to him/her.39The act has stipulated penalty for
commission of crime as stipulated above with punishment of fine up to ten
thousand rupees and compensation to the victim.
Children's Act, 1992, promulgated to protect and promote children's rights, to far
extent has addressed the prohibition of child pornography broadly. Section 16(2)
of the act prohibits making photograph of child for the purpose of engaging a
child in immoral profession. Section 16(3) prohibits publication, exhibition or
distribution of photograph or personal events or description of a child tarnishing
the character of such child. Section 53 of the act provides punishment for the
person committing such crime including seizure of the photograph and
reasonable compensation to children for adverse effect on character of child.
27
c. E-Governance in Nepal
d. Cyber law enforcement in Nepal
e. Computer crime and intellectual property section
Beside these Nepal Police has played a great institutional effort as:
40
Balaram Raut, An Analysis of Cyber Crime from Conceptual Perspectives: Where is Nepal, 37 NEPAL LAW
REVIEW,
28
Legal provision: Applied legal provision on this case is (Section 47(1) and 76 of
the Electronic Transaction Act, 2063).
Decision: not given by Kathmandu district court.
Sadiksha Piya Vs Manish Shrestha
The Charge sheet of this case was registered in Kathmandu district court on
2069-1-20 and the case was of hacking of password and uploading of naked
photo by defendant. The act to hack other password is illegal and it is
prohibited by law and the criminal has used this method and uploaded the
naked photo of victims which creates difficulty for her in life. Court gave the
verdict on the basis of Section 44 and 47 of the Electronic Transaction Act
2006.
29
Maina Dhital vs. Bikash Thapa
On 2067-6-1 the Kathmandu district court granted the detention warrant to
put the defendant in jail. And again on 2067-6-21 Appellate court also
confirmed the order of Kathmandu district court. The major charges were that
defendant has sent her the sexy pictures and sexy words to her email ID and
harassed her from long time. Later on defendant was found innocent and get
freed later.
30
Chaptr 5 : Findings, Conclusion and Suggestions
5.1 Findings
From the above research researchers find out the following findings:
In Nepal, the concept of cyber law is not fully developed. Also there is no any
debate about cyber law in any level of government so that the laws related
with cybercrime can be improved and revised. So when we talk about the
cyber-crime through online then we must think about its various aspects like;
perfect laws, regulating mechanism, well-trained Judged, public prosecutors
and police in the field of information technology.
In all over the world the criminal law is used to regulate the misuse of the
cyber issues. In Nepal of course there is one law which is Electronic
Transaction Act, 2063. It has provided so many provisions related with the
online or cyber law. But this law is not so effective because the institutions
which have been authorized to apply it are not well known about the cyber
law or they are not well trained in this field. They do not have ideas about
cyber law. Even if we talk about the cases which are filed in Kathmandu district
court; only some of the cases have been decided and also accused party is
acquitted in such a cases. The reasons behind it are that the investigating
agency, the Nepal police, the public prosecutor as well as the judges are not
familiar with cyber law and its application. If we read the files of the cases,
there is nothing in the file that will help the police and public prosecutor which
will be strong evidence to support the cases. It means at one hand law is not
sufficient and it has not incorporated the issues which are existing in the field
31
of cyber law and at the other hand; implementing agencies are not well
trained and well equipped with modern technology.
Also, due to the advancement of technology and communication, devastating
form of Crime i.e. Cyber Crime is increasing day by day in Nepal. With the
development of internet, people have started their super knowledge of
Computer for personal benefit or harm motive through illegal procedure like
fraud, hacking etc.
Nepal is being victim of cyber-attack and hacking from time to time because of
the low web security, cheap web development and lack of Ethical hacker
Jurisdiction for fileing a case of cyber-crime is limited here in Nepal.
5.2 Conclusion
One of the main focal point of this seminar is to make other understand about
the cybercrime, cyber law that exist in Nepal, its jurisdiction and how cyber
law is working in our country. The problem facing us today is the rapid
progress of technology which has found its way around existing social control
systems and allowed individuals to do as they please with this technology. The
law and government are struggling to catch up but we feel that it is also
important to bring the common man into the fight against cyber-crime.
There is less awareness about cyber law on our country. Another factor is the
cost of the original product. In so many cases Nepal government is also not
able to bear the cost and using either pirated software. It is not possible to
eliminate cyber-crime from cyber space in it’s entirely.
32
5.3 Suggestions
On the basis of study conducted on the subject matter, the researcher wants
to give the following suggestions:
The coordination between Nepal Police, public prosecutor and Nepal telecom
must be written in law because if it would happen then there would not be
confusion while they will use their power for investigating.
There is cyber cell in Teku, Kathmandu which should be enlarged and there
must be separate information and technology department which will deal with
cyber-crime.
At presently, only Kathmandu district court has been given the jurisdiction to
register the charge sheet and proceed the trial of cybercrime. This jurisdiction
should also be given to other district courts of Nepal. Otherwise it is very
difficult to assume the real problem existing in the online in Nepal.
Cyber Crime should be taken as seriously and with effective measures.
Website should be made keeping the qualitative and Security measure in
mind.
Nepal should sign Regional and International Treaty and Agreements
Protecting the Cyber Security.
To reduce such a activities related to cyber-crime our country should develop
high security level on each computerized system and also appoint ethical
hacker on a related organization.
33
References
Books
1. The book "Cyber law and Cyber Crime" written Prashant Mali published
by Snow white, First Edition, 2005
34
7. The Book “Telecommunications Law and Regulation” written by IAN
Walden and John Angel published by Oxford, 2007
8. The book “Cyber laws” by Justice Yabindra Singh published by Universal law
publishing, second edition,2005
9. The book “Cyber space and cyber law” by Narayan Prasad Sharma published
by Koselee Prakashan, 2015
Journal Article
Internet
1. http://therisingnepal.org.np/news/16133
2. http://www.grin.com/en/e-book/305565/cybercrime-in-nepal (eta)
3. http://kathmandupost.ekantipur.com/news/2014-05-25/cybercrime-
without-cyber-rules.html (cybercrime)
4. https://www.gadgetbytenepal.com/5-cyber-crimes-nepal/
5. http://attrition.org/errata/charlatan/ian_murphy/threat_profile/
6. http://www.acfe.com/fraud-examiner.aspx?id=4294990799
35
7. http://www.enigmasoftware.com/top-20-countries-the-most-
cybercrime/
8. https://www.gadgetbytenepal.com/5-cyber-crimes-nepal/
9. http://kathmandupost.ekantipur.
http://www.grin.com/en/e-book/305565/cybercrime-in-nepalcom/ne
ws/2http://www.imnepal.com/cyber-law-nepal/014-05-25/
cybercrime-without-cyber-rules.html
10. https://studymoose.com/cybercrime-computer-crime-essay
11. https://www.youtube.com/watch?v=DOkRB_jTnGw
12. http://kathmandupost.ekantipur.com/news/2016-03-09/nepal-
telecom-network-allegedly-hacked.html
Statute
36
37