Unit 1.2 Ethical and Social Issues In ICT

AM4N G4UT4M
19 Min Read

We live, work, and learn in a digital world — and like every world, it needs rules. As the internet continues to connect billions of people across the globe, it also opens doors to misuse, crime, and ethical violations. This is where understanding the ethical and social issues in ICT becomes essential, especially for Class 10 students preparing for their Nepal SEE examination.

Every time you browse a website, send an email, post on social media, or make an online payment, you are operating in cyberspace — a digital environment governed by specific laws, ethics, and responsibilities. Without these rules, the internet would become a lawless space where personal data could be stolen, fake news could spread freely, and criminals could act without consequences.

This unit — Ethical and Social Issues in ICT, Unit 1.2 of Class 10 Computer Science — covers everything you need to understand about the legal and ethical side of technology. You will explore:

  • Cyber Law — what it is, why it matters, and Nepal’s own cyber law (ETA 2063)
  • ICT and its challenges — security, privacy, digital divide, and copyright
  • Computer ethics and cybercrime — rules to follow and crimes to avoid
  • Digital citizenship and digital footprint — responsible use of the internet
  • Social media — platforms, opportunities, and threats
  • IT Policy 2072 — Nepal’s national ICT vision and objectives

Whether you are a student navigating social media or a future professional working with digital systems, understanding cyber law, cyber ethics, and digital citizenship equips you to use technology responsibly, safely, and legally.

- Advertisement -

1. ICT – Information and Communication Technology

Definition: ICT refers to all technologies that provide access to information through telecommunications — including computers, the internet, mobile devices, and digital communication tools.

Challenges of ICT

While ICT has transformed our lives positively, it also introduces serious challenges that every digital user must be aware of:

1. Virtual Identity

Internet criminals create fake identities to gain unauthorised access to systems and exploit users. These fake profiles are difficult to detect and control, posing a growing threat to online security.

2. Security

  • Hacking — unauthorised access to computer systems is rapidly increasing
  • Loss and theft of sensitive data and information

3. Privacy Issues

  • Cyberbullying — harassment through mobile phones or computers causing emotional harm
  • Sharing personal information of individuals without consent is a major risk in today’s digital era

A copyright is a type of intellectual property that grants its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work. Violating copyright is a punishable offence under cyber law.

5. Social Behaviour

  • Excessive internet use negatively changes people’s behaviour and social habits
  • Harmful effects on sleep, academic performance, and workplace productivity
  • Usage of unethical websites has increased crimes and antisocial behaviour in society

6. Digital Divide

Digital Divide is a social issue referring to the gap between those who have internet access (especially broadband) and those who do not. This inequality in access leads to unequal opportunities in education, employment, and information.

- Advertisement -

2. Ethical and Social Issues in ICT

Definition: Cyber law is the body of law that governs all legal issues of cyberspace — controlling cybercrime, providing legal status to online transactions, and regulating activities related to the internet.

Importance of Cyber Law

  1. Controls cybercrime — provides a legal framework to identify and punish cyber criminals
  2. Mitigates misuse of technology — sets boundaries for acceptable and lawful use
  3. Promotes the IT industry — creates a safe and trustworthy environment for tech businesses
  4. Legalizes online transactions — gives digital payments and contracts legal validity
  5. Encourages adoption of new technology — builds public confidence in digital tools

Cyber Law in Nepal

Nepal’s cyber law was introduced on 30th Bhadra 2061 BS (15th September 2004 AD). It is officially known as the Electronic Transaction and Digital Signature Act (ETDSA).

Major Provisions of Cyber Law in Nepal

  • Identify and punish cyber criminals
  • Provide legal status to the IT industry
  • Implement IT in government activities and services
  • Monitor data privacy and prevent misuse of technology

3. Electronic Transaction Act (ETA) 2063

ETA 2063 was authenticated and published in Nepal on December 8, 2006 (22 Mangshir 2063 BS). It deals with cybercrime and establishes laws for electronic transactions and digital communication.

- Advertisement -

Objectives of ETA 2063

  1. To provide legal authentication and regulation of electronic data
  2. To enable reliable data generation, communication, and transmission
  3. To create a secure and authentic means of electronic communication
  4. To regulate all matters related to electronic transactions

Scope of ETA 2063

  • Creation and legal use of digital signatures
  • Control of cyber and computer-related crimes
  • Protection of intellectual property
  • Protection of confidentiality and personal data

Major Components of Cyber Law (ETA)

  • Electronic and Digital Signature Law
  • Computer Crime / Cyber Crime Law
  • Intellectual Property Law
  • Data Protection and Privacy Law
  • Telecommunication Law
  • Copyright Law

Monetary Fines for Cyber Crimes (ETA 2063)

Type of CrimeFine (NRs.)Imprisonment
Unauthorized computer accessUp to NRs. 1,00,000Up to 2 years
Damage to computer system/dataUp to NRs. 2,00,000Up to 3 years
Publishing illegal/obscene contentUp to NRs. 1,00,000Up to 5 years
Theft of computer data/filesUp to NRs. 2,00,000Up to 3 years
Creating/spreading computer virusUp to NRs. 2,00,000Up to 3 years
Electronic fraud / identity theftUp to NRs. 3,00,000Up to 5 years

4. Computer Ethics and Cyber Ethics

Computer Ethics: The set of moral principles and values — the code of conduct — that every computer user must follow when using computers and the internet.

Commandments of Computer Ethics

  1. Do not use a computer to commit crimes
  2. Always use computers for the welfare of human beings
  3. Do not use a computer to steal data or files
  4. Do not use a computer to publish fake news or false information
  5. Do not use a computer to bear false witness
  6. Do not access other people’s files without authorisation
  7. Do not spread illegal or harmful content

Do’s and Don’ts of Cyber Ethics

Do’s of Cyber Ethics Don’ts of Cyber Ethics
Use the internet to help with schoolworkCopy information and claim it as your own
Explore music, videos, and games safelyDownload or share copyrighted material
Communicate respectfully with friends and familyCommunicate with strangers online
Report cyberbullying or abusePretend to be someone else (impersonation)
Protect your personal informationShare passwords or personal details online
Respect other people’s privacyUse rude language or threatening behaviour

5. Cybercrime

Definition: Cybercrime is any criminal activity committed using a computer, the internet, or any electronic means. Cyber criminals are subject to legal punishment under cyber law.

Types / Examples of Cybercrime

  • Hacking — unauthorised access to computer systems or networks
  • Piracy — illegal copying or distribution of software, music, films
  • Cyberbullying — harassment through digital devices and online platforms
  • Phishing — deceiving users to steal passwords or financial information
  • Data Diddling — unauthorised alteration of data before or during processing
  • Salami Saving — stealing tiny amounts of money from many accounts
  • Identity Theft — using someone’s personal information without permission
  • Creating Fake Documents — forging official or personal records
  • Pornography — distribution of obscene or illegal content
  • Spreading Viruses/Malware — releasing harmful programs to damage systems

Cyberbullying

Cyberbullying is the use of digital devices to bully, intimidate, or harass a person through threatening or offensive electronic communication.

Common examples:

  • Sending rude or threatening messages via email, text, or chat
  • Posting hurtful content about someone on social media
  • Spreading rumours or gossip online
  • Excluding someone from online groups intentionally
  • Pretending to be someone else to damage their reputation

Common platforms: Facebook, Instagram, Snapchat, Twitter, SMS, Email, gaming platforms

Hacker vs. Cracker

HackerCracker
Person with advanced computer skills who gains unauthorised accessSomeone who breaks into systems with malicious intent
May act for security research or curiosityAlways acts to cause damage or steal
Not always criminal (ethical hackers exist)Always considered a criminal under cyber law

Intellectual Property Right (IPR)

The law that protects creations — music, art, writings, inventions — ensuring creators receive proper recognition and compensation for their work.

Patent Right

A legal right that protects an inventor’s technological invention from being used or copied without authorisation or compensation.

Digital Signature

An electronic form of signature that verifies the identity of the sender and ensures that transmitted data has not been altered. It uses private and public keys for encryption and decryption.

Encryption & Decryption

  • Encryption — converting readable data into an unreadable coded format for secure transmission
  • Decryption — converting the coded data back to its original readable form

Trademark

A sign, symbol, logo, or name used to uniquely represent and identify a brand or product.

Trade Secret

The core secret principle or method that gives a business its unique competitive advantage — protected from disclosure by law.

A legal right that grants the creator of an original work exclusive rights to copy, distribute, adapt, and display that work.

7. Digital Citizenship

Definition: Digital citizenship refers to the responsible use of technology by anyone who uses computers, the internet, and digital devices to engage with society.

A digital citizen is anyone who uses digital tools — computers, mobile phones, or the internet — for work, education, or recreation.

Good vs. Bad Digital Citizenship

Good Digital CitizenshipBad Digital Citizenship
Communicating with respect onlineCyberbullying or online harassment
Respecting other people’s privacySharing others’ private information without consent
Adding helpful, accurate information onlineSpreading misinformation or fake news
Supporting others with useful feedbackIrresponsible or harmful social media usage
Encouraging and sharing positive contentPretending to be someone else online

8. Digital Footprint

Definition: A digital footprint is the trail of data you create while using the internet — including websites visited, emails sent, and information submitted to online services.

Types of Digital Footprint

Active Digital Footprint

Information that you knowingly share online:

  • Posts on Facebook, Instagram, Snapchat, Twitter
  • Filling out online forms or signing up for newsletters
  • Agreeing to install cookies on your device

Passive Digital Footprint

Information collected from you without your direct knowledge:

  • Websites that silently install cookies without disclosure
  • Apps and sites that use geolocation to track your position
  • Social media advertisers that profile you based on your likes and activity

Managing Your Digital Footprint

  • Ensure posted content protects your privacy
  • Remember that online posts are rarely truly private
  • Never post content that could damage your reputation or others’
  • Regularly review app permissions and privacy settings

“Everything leaves a digital footprint. Whatever gets created may never go away. If they don’t want to see it tomorrow, they’d better not post it today.”

9. Social Media

Definition: Social media is computer-based technology that enables people to share ideas, thoughts, and information through virtual networks and communities.

Major Social Media Platforms

  • Facebook — Founded 2004 by Mark Zuckerberg. Free social networking for friends, family, and colleagues.
  • Twitter — Created 2006 by Jack Dorsey et al. Microblogging platform for short posts called tweets.
  • Instagram — Photo and video sharing platform for mobile users.
  • LinkedIn — Professional networking for business contacts and career development.
  • Blogs — Online journals or informational websites where writers share views on specific subjects.
  • Wikipedia — Free, collaborative online encyclopedia created by community contributors.

Opportunities and Threats of Social Media

OpportunitiesThreats
Information sharing and public awarenessOnline harassment and cyberbullying
Business promotion and brand buildingPrivacy and security risks
Creative expression and collaborationSpread of misinformation and fake news
Attracting customers and growing audienceAddiction and mental health issues
Connecting communities globallyFake accounts and identity fraud

10. IT Policy 2072 (ICT Policy 2015)

Nepal’s first IT Policy was launched in 2000 AD (2057 BS). The most recent update is the ICT Policy 2015 (2072 BS).

Vision of ICT Policy 2015

Vision: To transform Nepal into an information and knowledge-based society and economy.

Mission of ICT Policy 2015

Mission: To create conditions for the intensified development and growth of the ICT sector as a key driver for Nepal’s sustainable development and poverty reduction.

Key Objectives of IT Policy 2072

  • Empower and facilitate Nepal’s participation in the Global Knowledge Society
  • Promote ICT to boost productivity across key sectors of the national economy
  • Deploy ICT at all levels of Nepal’s educational system to improve outcomes and expand access
  • Promote research and innovation on ICT’s role in community resilience
  • Facilitate the participation of youth and women in ICT, especially in media and content development
  • Create accessible and affordable public access points through an E-Community/Village Network initiative

Important Exam Questions

These questions are frequently asked in the Nepal SEE examination:

  • Monetary fines for cyber crimes — list common crimes with fines under ETA 2063
  • Four major provisions of ETA 2063 — authentication, security, regulation, digital signatures
  • What is cybercrime? List any four types (hacking, piracy, phishing, cyberbullying)
  • Four objectives of ETA 2063 — legal provision, reliable communication, secure transactions, regulation
  • Define social media with four examples (Facebook, Twitter, Instagram, LinkedIn)
  • Common ethical challenges in society — privacy, copyright, digital divide, cyberbullying
  • Four ethical guidelines for ICT users — respect privacy, avoid piracy, no fake news, secure passwords
  • Risk management of digital footprint — privacy settings, careful posting, cookie control
  • Define digital citizenship — responsible use of technology to engage with society
  • Four social issues of ICT — digital divide, cyberbullying, privacy issues, copyright violations
  • What is ICT? What does it include? — technologies providing access to information through telecommunications

Conclusion

The digital age brings extraordinary opportunities — but also serious responsibilities. As this unit on ethical and social issues in ICT demonstrates, every digital user must be both empowered and accountable.

Through cyber law, nations like Nepal have created legal frameworks to protect individuals, businesses, and institutions from the growing threat of cybercrime. Nepal’s Electronic Transaction Act 2063 remains the cornerstone of this legal protection, covering everything from digital signatures and online transactions to the punishment of hackers and cyber criminals.

Understanding computer ethics goes beyond following rules — it is about building a culture of integrity, honesty, and respect in the digital world. Whether it is avoiding plagiarism, respecting copyright, or refusing to cyberbully, ethical behaviour online reflects the same values we hold in the physical world.

The concept of digital citizenship reminds us that using the internet is a privilege that comes with duties. Managing your digital footprint wisely, being aware of ICT’s social challenges like the digital divide, and using social media responsibly are all part of being a responsible digital citizen in today’s interconnected society.

Finally, Nepal’s IT Policy 2072 signals the nation’s commitment to harnessing the power of ICT for inclusive development, education, and economic growth. As future citizens and professionals, understanding these policies helps you see the bigger picture of where technology is taking Nepal.

  💡 Key Takeaway: Technology is a tool — and like any tool, its impact depends entirely on the hands that wield it. Use it ethically, use it legally, and use it to build a better world.

Share This Article
Leave a Comment