LATEST UPDATES:
Digital signature

Digital signatures are based on public key cryptography, also known as asymmetric cryptography. Usin...

Cyber Security

Cloud security architecture is effective only if the correct defensive implementations are in place....

Mr. Anil Kumar Dutta
Mr. Anil Kumar Dutta Controller
Mr.  Satish Subedi
Mr. Satish Subedi Computer Engineer
sn Acts & Regulation Published Date Download
1 IT Policy 2067 2067   
2 IT Policy 2067(2010) 2067   
3 Electronic Transaction Act 2063 (Nepali Version) 2063   
4 Electronic Transaction Act 2063 2063   
5 Electronic Transaction Rules 2064 2064