Free Essay

Cyber Law of Bd

In:

Submitted By robelmkt70
Words 695
Pages 3
Efficiencies of Cyber law in Bangladesh
জুন 26, 2011
0
inShare
Technology is getting more frequently used and seems like a blessing going cover Bangladesh. But sometimes we can see some bad- naughty peoples use the same technology to make crime in the cyber area. As well as day by day Cyber crimes are increasing in the world as well as our country. Therefore in Bangladesh a bundle of laws has been enacted to protect the people.
Cyber law in Bangladesh
In the Information Communication Technology Act of Bangladesh does not define what the Cyber law by any section is. But Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The said Act enable (a) Legal recognition of electronic transaction, (b) Legal recognition of digital signature, (c) Acceptance to con- tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of the crime relation with information Communication Technology.
Objectives of the ICT Act, 2006
The objectives of the ICT Act, 2006 has been provided following purposes such as To smooth the progress of electronic filing of documents with government agencies and statutory corporations and to promote efficient delivery of government services by means of reliable electronic records.
To help to establish uniformity of rules, regulations and standards regarding the authentication and integrity of electronic records. To facilitate electronic commerce, eliminate barriers to electronic commerce resulting from uncertainties over writing and signature requirements, and to promote the development of the legal and business infrastructure necessary to implement secure electronic commerce and so many others objectives have been included here.
Some identified Cyber Crimes as follows:
(i) Hacking or unauthorized entry into information systems (ii) Virus introduction
(iii) Publishing or distribution of obscene content in electronic form
(iv) Tampering with electronic documents required to be kept under the law
(v) Frauds using electronic documents
(vi) Violation of privacy rights such as STALKING
(vii) Violation of Copyright, Trademark or Patent design
(viii)Defamation through e-mail
(ix) Holdings out threats through e-mail
Not only above mentioned cyber crimes are conducted but others are cyber crimes present before us. In future different types of cyber crimes will be intimated us.
Weakness of the ICT Act, 2006
The ICT law has some specific weakness. The law does sometimes regulate the social norm and then control of information technology. We can discus about the few weakness of the Act. Subsequently the law does give proper solution about the Intellectual Property Right and this law does not discuss of the rights and liability of domain name holders which is the first step of entering into the e-commerce. Not only these weaknesses of the Act but also others problems can to be brought through the Act.
Advantages of Cyber law
This Act has some disadvantages and also some advantages. This Act has provided us few advantages like as under the ICT Act, 2006, conduct important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the government at a later date. On the other hand Companies now be able to carry out electronic commerce using the legal infrastructure provided by the Act. Subsequently this Act provided other facilities to run cyber or Information and Technology business.
However as Internet have grown in our country, the need has been felt to enact the appropriate cyber laws, which are indispensable to legalize and regulate Internet in Bangladesh. The existing laws of Bangladesh even with the most generous and moderate interpretation, could not be interpreted in the light of the promising cyberspace. We hope concern authority should take some steps to develop our existing cyber law.
Author: Nur Mohammed

Similar Documents

Premium Essay

Strength & Weakness of E-Commerce in Bangladesh

...Globalization has brought in many changes in the business scenario with the whole world inching towards a big market place. Communication between buyers and sellers become critical as each can opt to explore a greater number of alternatives than before. E-commerce through the use of internet, e-mails, websites and other facilities enables a businessman to be linked with every corner of the world and thus opens up greater opportunities in the world market. As a signatory of WTO practices Bangladesh has accepted The Code of Good Practices of WTO agreement on Technical Barriers to Trade. E-commerce facilitates the very process of International transactions; this involves securing and finalizing a contract, delivery of a product and finally payment for the performance of the product. The movement of goods and services and payment mechanism within a country and outside of a country is governed by regulatory and legal issues. Though Bangladesh Govt. has a strategic vision and policy framework to boost up e-commerce, a lot of factors are also hindering the way of doing E-commerce. Definition of E-Commerce: E-Commerce refers to the process of buying or selling products or service over an electronic network. The most popular medium in which e-commerce is conducted is the internet. It combines a range of process such as: • Electronic Data Interchange (EDI). • Electronic mail (E-mail). • World Wide Web (WWW). • Internet Applications. • Network Applications. ...

Words: 4033 - Pages: 17

Free Essay

Crimes in Cyber Café and Its Rules and Ragulation, Perspective Bangldesh

...OF LAW Shakil Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case study regarding crime in cyber café...

Words: 6680 - Pages: 27

Free Essay

Ict Act-2006 Bangladesh

... MD. Mahmudul Hasan | 2011-1-13-060 | Date of Submission: December-03, 2014 Acknowledgement We are very pleased to accomplish the assign task given by our honorable course instructor Md. Ziaul Haque on the subject “Legal Environment of Business”. We are very much obliged to those persons who gave their valuable time in the organization overview part, opinion and advice to complete this report. At first, our profound gratification goes to, Md. Ziaul Haque the honorable course instructor of Business Communication for his supervision to complete the assignment successfully. By providing us the opportunity of preparing this assignment, he has made us able to relate the academic knowledge of Business law with practical scenario. Not only this, he has also contributed much in this term paper by giving us proper guideline. We are acknowledging to all of those web sites from which we have taken necessary helps. Our gratitude also goes to some senior students for their guidance in various stages of completing the term paper and our dear friends and classmates for their ingenious advices and supports. Finally, we are pleased to complete the term paper on the given subject properly and genuinely. LETTER OF TRANSMITTAL December-03, 2014 Md. Ziaul Haque Senior Lecturer, Dept. Of Business Administration East West University Subject: Submission of Assignment on “Information and...

Words: 12177 - Pages: 49

Premium Essay

Dodi 8500.01

...Department of Defense INSTRUCTION NUMBER 8500.01 March 14, 2014 DoD CIO SUBJECT: Cybersecurity References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues and renames DoD Directive (DoDD) 8500.01E (Reference (a)) as a DoD Instruction (DoDI) pursuant to the authority in DoDD 5144.02 (Reference (b)) to establish a DoD cybersecurity program to protect and defend DoD information and information technology (IT). b. Incorporates and cancels DoDI 8500.02 (Reference (c)), DoDD C-5200.19 (Reference (d)), DoDI 8552.01 (Reference (e)), Assistant Secretary of Defense for Networks and Information Integration (ASD(NII))/DoD Chief Information Officer (DoD CIO) Memorandums (References (f) through (k)), and Directive-type Memorandum (DTM) 08-060 (Reference (l)). c. Establishes the positions of DoD principal authorizing official (PAO) (formerly known as principal accrediting authority) and the DoD Senior Information Security Officer (SISO) (formerly known as the Senior Information Assurance Officer) and continues the DoD Information Security Risk Management Committee (DoD ISRMC) (formerly known as the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel). d. Adopts the term “cybersecurity” as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 (Reference (m)) to be used throughout DoD instead of the term “information assurance (IA).” 2. APPLICABILITY a. This instruction applies to: (1) OSD, the...

Words: 19443 - Pages: 78

Premium Essay

Report

...The Boeing Company 2010 Annual Report At Boeing, we aspire to be the strongest, best and best-integrated aerospace-based company in the world — for today and tomorrow. The Boeing Company Boeing is the world’s largest aerospace company and leading manufacturer of commercial airplanes and defense, space and security systems. A top U.S. exporter, the company supports airlines and U.S. and allied government customers in more than 90 countries. Our products and tailored services include commercial and military aircraft, satellites, weapons, electronic and defense systems, launch systems, advanced information and communication systems, and performance-based logistics and training. With corporate offices in Chicago, Boeing employs more than 160,000 people across the United States and in 70 countries. Our leadership is strengthened further by hundreds of thousands of people who work for Boeing suppliers worldwide. Contents Operational Summary Message From Our Chairman The Executive Council Financial Results Form 10-K Selected Programs, Products and Services Shareholder Information Board of Directors Company Officers 1 2 7 8 9 134 141 142 142 Cover photo: 787 Dreamliner in flight test Photo above: F/A-18E/F Super Hornet strength Operational Summary Q Earned net income of $3.3 billion, or $4.46 per share, compared with $1.3 billion, or $1.87 per share, in 2009. Q Delivered 115 production military aircraft, two launch vehicles and four satellites, and increased backlog...

Words: 72708 - Pages: 291

Premium Essay

Hrm in 21st Century

...Human Resource Management Functions, Applications, Skill Development Robert N. Lussier Springfield College John R. Hendon University of Arkansas at Little Rock USAGE Los Angeles | London | New Delhi Singapore | Washington DC Detailed Contents About the Authors Preface xxiv xxv PART I. 21ST-CENTURY HUMAN RESOURCE MANAGEMENT STRATEGIC PLANNING AND LEGAL ISSUES 1 Chapter 1 The New Human Resource Management Process 2 SHRM 3 Why Study Human Resource Management? 4 HRM Past and Present 6 Past View of HRM 6 Present View of HRM 6 21st-century HRIi 8 HRM Challenges 8 The HRM Strategic View 9/ Technology and Knowledge 10 Labor Demographics 11 Productivity and Competitiveness Through HRM HRM Skills 12 Technical Skills 12 Human Relations Skills 13 Conceptual and Design Skills Business Skills 14 12 13 Line Managers' HRM Responsibilities 15 Line Versus Staff Management 15 Major HR Responsibilities of Line Management 15 HR Managers' Resonsibiiities: Disciplines Within HRW? 16 The Legal Environment: EEO and Diversity Management 17 Staffing 17 Training and Development 20 Employee Relations 20 Labor and Industrial Relations 20 Compensation and Benefits 20 Safety and Security 21 Ethics and Sustainability 21 HRM Careers 23 The Society for Human Resource Management Other HR Organizations 24 Professional liabiliy 24 23 The Practitioner's Model for HRM The Model 24 Sections of the Model 25 24 Trends...

Words: 2783 - Pages: 12

Premium Essay

The Boeing Company's Financial Reporting

...* The Boeing Company’s Financial Reporting Part Two Stephen Hyde XACC/290 June 8, 2014 Dr. Regina Henry * The assets and liabilities listed on a company’s balance sheet and income statement are there to assist investors, shareholders, and employees in determining the financial state of the company. When reporting assets the financial department has a basic outline to follow but often, especially with larger companies, will add different categories to fit their specific needs. The liabilities listed on a company’s financial statement will also follow a basic outline, with added categories to suit their needs. Both the assets and liabilities listed on these financial documents will be compared to each other for anyone who would like to inquire about the company’s financial situation. * The assets stated on the Boeing Company’s balance sheet are in the proper order according to the Generally Accepted Accounting Principles (GAAP). All of the assets are listed in order of their liquidity, this means Boeing is showing the assets in the order in which they are easiest to turn to cash. These assets are listed in the current asset category and are classified as; cash and cash equivalents; short-term and other investments; accounts receivable, net; current portion of customer financing, net; deferred income taxes; inventories, net of advances and progress billings. Some of the assets listed above like accounts receivable, net and current portion of customer...

Words: 6509 - Pages: 27

Premium Essay

Test

...SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING Securing Wi-Fi Rogue Access within an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the...

Words: 18577 - Pages: 75

Premium Essay

E-Commerce

...Draft Final Report E-Commerce in Bangladesh: Status, Potential and Constraints Najmul Hossain December 2000 A report prepared for JOBS/IRIS Program of USAID. The author gratefully acknowledges comments received from Thierry Van Bastelaer, Catherine Mann, Dewan Alamgir, Asif Khan, Abu Saeed Khan, Tahmina Begum, Shabnam Nadiya and Tonmoy Bashar. The views and analyses in the paper do not necessarily reflect the official position of the IRIS Center, the University of Maryland or that of USAID. E-Commerce in Bangladesh: Status, Potential and Constraints ACRONYMS ASM B2B B2C B2G BB BGMEA BTRC BTTB CS DDN DFID DI DSL e-commerce EDF EFT e-mail e-market FDI GOB GSP IDA IOC IPO IPR IRIS ISO ISP IT ITU JOBS L/C LCA LMDS MMDS MOPT NIP OECD OSP Asian Sources Media Group Business-to-Business Business-to-Consumers Business-to-Government Bangladesh Bank Bangladesh Garment Manufacturers and Exporters Association Bangladesh Telecommunications Regulatory Commission Bangladesh Telegraph and Telephone Board Contract System Digital Data Network Department For International Development Data International Digital Subscribers Line Electronic Commerce Export Development Fund Electronic Fund Transfer Electronic mail Electronic Market Foreign Direct Investment Government of Bangladesh Generalized System of Preferences International Development Association International Oil Companies Import Policy Order Intellectual Property Rights Center for Institutional Reform and the Informal Sector at...

Words: 16371 - Pages: 66

Premium Essay

Usaid in Bangladesh

...[pic] Information Technology Enabled Services (ITES) – Bangladesh ELEMENTS OF A NATIONAL STRATEGY FOR DEVELOPMENT OF AN INFORMATION TECHNOLOGY ENABLED SERVICES SECTOR IN BANGLADESH USAID Bangladesh IT Enabled Services Project SETA Task Order Number: 4002-345-001 Subcontract Number: 011227001/4000 Contract Number: GSOOK97AFD2185 Table of Contents Executive Summary 3 1. Introduction 10 2. The Market for IT Enabled Services 13 Market Characteristics 13 Factor Requirements to be Competitive 15 3. Bangladesh Market Advantages and Disadvantages 19 Costs and Efficiency 19 Productive capacity 21 General business environment 25 4. A Bangladesh ITES strategy 28 Potential ITES Market Segments 29 Building Productive Capacity 32 Lowering Costs 37 Building a Competitive Environment 38 Marketing of Bangladesh ITES sector 40 5. Recommended Actions 42 Improving Productive Capacity 42 Lowering Cost, Improving Efficiency 44 Marketing and Business Environment 45 Focus on Growth 47 Annex A: Analysis of Market Segments 49 Annex B: ITES Workshop Report 63 Annex C: The opinion surveys of this study 68 Annex D: Summary of the Philippines Case Study 81 Executive Summary Information Technology Enabled Services (ITES) is a large, fast-growing worldwide industry fueled by customers seeking efficiency...

Words: 28016 - Pages: 113

Premium Essay

Business

...Parliament of Australia Department of Parliamentary Services Parliamentary Library Information, analysis and advice for the Parliament RESEARCH PAPER www.aph.gov.au/library 26 May 2010, no. 17, 2009–10, ISSN 1834-9854 Budget Review 2010–11 Last year’s Budget was framed amid a sharply deteriorating world economy which was considered the most challenging global economic conditions since the Great Depression. In 2009, the global economy contracted for the first time in the post-war era. In contrast, Australia grew by almost 1.5 per cent supported by monetary and fiscal policy stimulus, a well-functioning banking system, and strong growth in a number of East Asian economies. The third Rudd Government Budget, presented on 11 May 2010, was developed within an improving but still uncertain outlook, with events in Greece and other European Union countries reminding us of the risks to the global economic recovery. Strong economic growth in China and India is expected to continue to flow throughout the region and, despite a slower pace, the US is leading the recovery among our advanced economy major trading partners. Global economic growth is in the early stages of recovery but we should remain cognisant of the precarious economic environment which is continuing to challenge government policy makers around the globe. Once again the Parliamentary Library has produced the annual Budget Review that examines the key features of a selection of crucial measures contained...

Words: 85921 - Pages: 344

Premium Essay

Bank

...Introduction What is Financial Institution? In financial economics, a financial institution is an institution that provides financial services for its clients or members. Probably the most important financial service provided by financial institutions is acting as financial intermediaries. Most financial institutions are highly regulated by government. Broadly speaking, there are three major types of financial institutions: • Deposit-taking institutions that accept and manage deposits and make loans, including banks, building societies, credit unions, trust companies, and mortgage loan companies; • Insurance companies and pension funds; • Brokers, underwriters and investment funds. Functions of a Financial Institution: The functions of Financial Institutions are: • Financial institutions provide service as intermediaries of the capital and debt markets. • They are responsible for transferring funds from investors to companies in need of those funds. • Financial institutions facilitate the flow of money through the economy. To do so, savings a risk brought to provide funds for loans. Such is the primary means for depository institutions to develop revenue. Should the yield curve become inverse, firms in this arena will offer additional fee-generating services including securities underwriting, and pre. Regulation Structures of Financial Institutions: Financial institutions in most countries operate in a heavily regulated environment as they...

Words: 15567 - Pages: 63

Premium Essay

Smeproject

...chapter 1 introduction 1.1 overview of the industry Banking means accepting the deposits from the customers for lending to the needy and extending the other services as to issue of DD etc. Nowadays after introduction of private sector banks the banks have become a profit centre and the functions become changed and now banks are doing the insurance and mutual funds also. But nationalised banks are still service oriented in extending loans for Education loan, and rural development activities. A Bank is an organization which lends money to the borrowers for a purposeful task, and provides a facility to deposit and withdraw money when needed and charge for it. HISTORY OF BANKING IN INDIA Phase I The General Bank of India was set up in the year 1786. Next came Bank of Hindustan and Bengal Bank. The East India Company established Bank of Bengal (1809), Bank of Bombay (1840) and Bank of Madras (1843) as independent units and called it Presidency Banks. These three banks were amalgamated in 1920 and Imperial Bank of India was established which started as private shareholders banks, mostly Europeans shareholders. In 1865 Allahabad Bank was established and first time exclusively by Indians, Punjab National Bank Ltd. was set up in 1894 with headquarters at Lahore. Between 1906 and 1913, Bank of India, Central Bank of India, Bank of Baroda, Canara Bank, Indian Bank, and Bank of Mysore were set up. Reserve Bank of India came in 1935. During the first phase the growth was very...

Words: 12862 - Pages: 52

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139

Premium Essay

Computer

...Chapter 1 Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is...

Words: 47755 - Pages: 192