+ All Categories
Home > Documents > Information Communication Technology SOFTCOPY (Cyber law)

Information Communication Technology SOFTCOPY (Cyber law)

Date post: 09-Apr-2018
Category:
Upload: nursakinah-najwah
View: 213 times
Download: 0 times
Share this document with a friend

of 11

Transcript
  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    1/11

    Mjc`xib~m`j L`ii{jmlb~m`j ^kldj`a`e}

    $ML^- _xk|kj~b~m`j

    Ibab}|mbj L}hkx Abu bjnKakl~x`jml E`skxjikj~ Abu

    _xkpbxkn h}6 ) J{x|bgmjbd Jbfubd

    ) > Mj`sb~mc

    ) $=53-

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    2/11

    Ibab}|mbj L}hkx Abu Bj} abu| xkab~mje ~` px`~kl~mje ~dk Mj~kxjk~ bjn

    `~dkx `jamjk l`ii{jmlb~m`j ~kldj`a`emk|*

    AKEBA \^B^[\@C @JAMJK

    ^XBJ\BL^M@J\

    MJ^KAAKL^[BA_X@_KX^]

    XMED^\

    _XMSBL] BJNL@JCMNKJ^MBAM^]

    @CMJC@XIB^M@J

    \KL[XM^] @CE@SKXJIKJ^

    NB^B

    MJ^KEXM^] BJN\KL[XM^]

    @C MJC@XIB^M@J

    MI_@X^BJLK@C

    L]HKX ABU

    L}hkx Abu| ~db~ ktm|~| mjIbab}|mb6

    ) Nmem~ba \mejb~{xk Bl~ 2==5

    ) L`ip{~kx Lxmik| Bl~ 2==5

    ) ^kakiknmlmjk Bl~ 2==5

    ) L`ii{jmlb~m`j| bjn

    I{a~miknmb Bl~ 2==4

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    3/11

    NMEM^BA \MEJB^[XK BL^ 2==5

    Udb~ ~dk Bl~ m| bh`{~0

    ) _x`smnk| c`x xke{ab~m`j `c p{haml gk}mjcxb|~x{l~{xk*

    ) Ibgk nmem~ba |mejb~{xk akebaa} sbamn bjnkjc`xlkbhak b| ~xbnm~m`jba |mejb~{xk*

    Ud} ~dk Bl~ ktm|~6) Mjlxkb|k| ~xbj|bl~m`j| l`jn{l~kn smb mj~kxjk~*

    ) Mnkj~m~mk| bjn ik||bek| lbj hk cba|mcmkn

    ) Xki`smje n`{h~ bjn p`||mhmam~} `c cxb{n

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    4/11

    L@II[JMLB^M@J\ BJN

    I[A^MIKNMB BL^ 2==4

    Udb~ ~dk Bl~ m| bh`{~0

    ) Xk|~x{l~{xk| `c l`jskxekn ML^ mjn{|~x}*

    ) Lxkb~k bjn nkcmjk b jku |}|~ki `c amlkj|k|*

    ) _x`smnk l`ii{jmlb~m`j bjn i{a~miknmb |kxsmlk|*

    ) _x`smnk ~dk ktm|~kjlk `c ~dk L`ii{jmlb~m`j bjn

    I{a~miknmb L`iim||m`j*

    Ud} ~dk Bl~ ktm|~6) L`jskxekjlk `c ~kldj`a`emk| m| nxmsmje l`jskxekjlk `c

    ~kakl`ii{jmlb~m`j! hx`bnlb|~mje! l`ip{~mje bjn

    l`j~kj~*

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    5/11

    ^KAKIKNMLMJK BL^ 2==5

    Udb~ ~dk Bl~ m| bh`{~0

    ) _x`smnk| ~db~ bj} xkem|~kxkn n`l~`x ib} pxbl~mlk

    ~kakiknmlmjk h{~ `~dkx dkba~dlbxk px`smnkx| i{|~ cmx|~`h~bmj b amlkj|k ~` n` |`*

    Ud} ~dk Bl~ ktm|~|6

    ) Dkba~dlbxk |}|~ki| bjn px`smnkx| bx`{jn ~dk u`xan bxk

    hkl`imje mj~kxl`jjkl~kn*) [jlakbx r{bam~} dkba~dlbxk bnsmlk bjn l`j|{a~b~m`j cx`i|pklmbam|~ hklb{|k n`k|j~ dbsk ~x{~d sba{k

    ) ^` xke{ab~k pxbl~mlk `c ~kakl`j|{a~b~m`j| mj iknmlbapx`ck||m`j*

    XKS@GKN/LBJLKAAKN

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    6/11

    L@I_[^KX LXMIK\ BL^ 2==5

    Udb~ ~dk Bl~ m| bh`{~0) _kjbamvk| ud`6

    & Kj~kx `x b~~kip~ mj~` l`ip{~kx| bjn l`ip{~kx |}|~ki|um~d`{~ b{~d`xmvb~m`j*

    & Nbibek `x ba~kx nb~b/mjc`xib~m`j mj l`ip{~kx| `xl`ip{~kx |}|~ki| h} pabj~mje smx{|k|*

    Ud} ~dk Bl~ ktm|~|6

    ) ^` kj|{xk im|{|k `c l`ip{~kx| m| bj `cckj|k*

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    7/11

    KAKL^X@JML E@SKXJIKJ^ ABU\

    NB^B _X@^KL^M@J HMAA 8??4/^DK _XMSB^K

    NB^B _X@^KL^M@J HMAA

    ) ^dk Hmaa |kkg| ~` px`~kl~ ~dk pxmsbl} `c pkx|`jba bjn

    pxmsb~k mjc`xib~m`j `c mjnmsmn{ba|*

    KAKL^X@JML E@SKXJIKJ^ BL^MSM^MK\HMAA 8??5

    ) _x`p`|kn ~` kjbhak c{jl~m`j| `x ~xbj|bl~m`j| hk~ukkj

    ~dk sbxm`{| e`skxjikj~ bekjlmk| bjn ~dk lm~mvkjx} ~` hk

    {jnkx~bgkj kakl~x`jmlbaa}

    ) Baa`u| ~dk E`skxjikj~ ~` |k~ n`uj x{ak| `j ~dk

    ibjjkx `c kakl~x`jml nkbamje| cx`i bjn ~` ~dk p{haml*

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    8/11

    KAKL^X@JML E@SKXJIKJ^ ABU\

    KAKL^X@JML ^XBJ\BL^M@J HMAA

    ) Bmi6 ^` emsk akeba xkl`ejm~m`j ~` kakl~x`jml

    l`ii{jmlb~m`j| bjn cblmam~b~k kakl~x`jml l`iikxlk*

    ) _xmibx} C`l{|6 Baa c`xi| `c `jamjk l`iikxlmba

    bl~msm~} udmld bxk {jnkx~bgkj h} l`ipbjmk|!mjnmsmn{ba| `x ~dk E`skxjikj~*

    MJC@XIB^M@J ^KLDJ@A@E] BL^ 8???) _x`smnk| akeba xkl`ejm~m`j c`x ~xbj|bl~m`j| lbxxmkn

    `{~ h} ikbj| `c kakl~x`jml nb~b mj~kxldbjek*

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    9/11

    L@JLA[\M@J

    ^dk ktm|~mje L}hkx Abu| lxkb~kn ~dk jklk||bx}

    mipbl~ h{~ l`j|~bj~ xksmku m| jklk||bx}*

    L}hkx abu l`j~x`a| ~kldj`a`e} mjj`sb~m`j|!

    h{|mjk|| mjj`sb~m`j|! lxmimjba mjj`sb~m`j|!

    ea`hbam|b~m`j*

    Ibab}|mb m| r{m~k bnsbjlkn mj ~kxi| `c m~|akem|ab~msk bjn xke{ab~`x} cxbiku`xg ~` pxkpbxk

    `{x|kask| ~`ubxn| ~dk jku kl`j`i}*

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    10/11

    XKCKXKJLK\ ^kbldkx| dbjn`{~|/j`~k|

    ) $Ak||`j 2>6 L}hkx Abu- Mj~kxjk~

    2-

    d~~p6//uuu*c`{j~bmjnbak*amh*ma*{|/mjc`xib~m`j/nb~bhb|k|/e`skxjikj~NH*

    d~i

    8-d~~p6//uuu*|maml`j*l`i/ibjbekikj~/e`skxjikj~/?!4;8!22??8543!?

    ?*d~i

    -d~~p6//uuu*nmem~baf`{xjba*l`i/bx~mlak/33;2?/Ibab}|mbjPE`sP~PA``gmjeP

    ~`PR{mk~PHa`eekx|

    ;- d~~p6//uuu*b|mbjabu|*`xe/l}hkxabu/jku|ak~~kx/m||{k|/la PjaP>=*d~i

    3- d~~a6//uuu*fbeb~*l`i*i}/L}hkxabu|kxmk|/l`j|{a~bjl}*d~i

  • 8/8/2019 Information Communication Technology SOFTCOPY (Cyber law)

    11/11

    KJN


Recommended