SlideShare a Scribd company logo
1 of 18
Cyber Crime
Prevention and
Security in BangladeshPRESENTED BY
RABITA REJWANA
ASSISTANT PROFESSOR
DEPARTMENT OF LAW AND HUMAN
RIGHTS
VARENDRA UNIVERSITY
RAJSHAHI , BANGLADESH
Cyber Space and Cyber World
• The term Cyberspace was initially introduced by William Gibson in his 1982 fictional
short story “Burning Chrome”
• Cyberspace is the virtual computer world
• It’s more than just the Internet
• An Electronic medium used for a global
communication
• It allows users to share information, interact,
shape ideas, play games, engage in
discussions or social forums
• It has the ability to affect and influence each
other
• Through Internet based social networking site such as twitter, whatsapp,
Facebook and Instagram people can remain connected
Some characteristics of Cyberspace
 There is no geographical boundaries at the cyberspace.
 People leaves digital footprints when engaging online activities
 A digital footprint refers to all information found online about a person
 It either can be posted by that person or others intentionally or
unintentionally
 This digital footprint can be used by potential employers, business
organizations or add agencies
Definition of Cyber Crimes
Offences that are committed against individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental harm,
or loss, to the victim directly or indirectly, using modern telecommunication networks such
as Internet (networks including chat rooms, emails, notice boards and groups) and mobile
phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security
and financial health. Issues surrounding these types of crimes have become high-profile,
particularly those surrounding hacking, copyright infringement, unwarranted mass-
surveillance, sextortion, child pornography, and child grooming.
Classifications
 Financial frauds and Crimes
 Cyberterrorism
 Cyber extortion
 Cyberwarfare
 Computer as target
 Computer as tool
 Obscene or offensive content
 Online harassment
 Drug Trafficking and online gambling
Laws to Prevent Cyber Crimes
in Bangladesh
• THE PENAL CODE 1860
• THE CODE OF CRIMINAL PROCEDURE 1898
• THE INFORMATION AND COMMUNICATION
TECHNOLOGY ACT 2006
• PORNOGRAPHY ACT 2012
• THE DIGITAL SECURITY ACT 2018
Penal Code 1860 and Code of Criminal
Procedure
 The conventional crimes defined under the penal code which takes place
with the help of computer and internet will be adjudicated conventionally.
 For example- Defamation (sec-499) , Counterfeiting Bangladesh Coins(sec-
232) , Sedition(sec-124A)
 All the crimes will be adjudicated according to the Code of Criminal
Procedure 1898 of Bangladesh
The Information and Communication
Technology Act 2006
 This law has been enacted to secure and legalize Information and
communication technology
 Damage to Computer System (sec-54): Punishment will extend to ten years
and fine which may extend to ten lakh or both.
 Tampering with computer source code (sec-55)
• Hacking with computer system (Sec-56)
• Publishing fake, obscene or defaming information in
electronic form (Sec-57)
• Unauthorized access to protected systems (Sec-61)
• disclosure of confidentiality and privacy (Sec-63)
• using computer for committing an offence (Sec-66)
Information and Communication Technology
Act 2006
The Pornography Control Act 2012
THE EMERGENCE OF THIS NEW SECTION IS TO PROTECT DETERIORATED
SOCIAL ETHICAL AND MORAL VALUE DUE TO WIDE SPREAD OF SEXUAL VIDEO
AMONG CHILDS AND ADULTS , SAFEGUARD FEMALES FROM SEXUAL
HARASSMENT AND BLACKMAILING , PREVENT WIDE SPREAD OF VIDEO, MMS
AND PICTURE THROUGH MEDIUMS OF COMMUNICATIONS AND TAKE
NECESSARY STEPS TO PUNISH PEOPLE WHO DEALS WITH PORN VIDEO AND
ITS DISTRIBUTION
Definition of Pornography and
Punishments
 Section 2 describe the definition of pornography .According to
pornography act; talking , gesture , acting , nude or half nude dance video
or still picture, magazine , book, statue, cartoon ,lift late which increase
sexual desire and has no use in case of education and arts will be
considered as pornography.
 Punishments of selling , producing, abetment for selling and producing,
blackmailing, supplying, renting, publishing, preserving or using children
for pornography has been given.
Digital Security Act 2018
 This law has been enacted to ensure National Digital Security and
Identifying digital crime, preventing, suppressing, trial and other related
matters.
 Basically this law has been enacted to elaborate the definitions of the
crimes defined under ICT Act 2006 and The Pornography Control Act 2012
 This law says about constituting an emergency response team (sec-9)
 It also ensures the extra territorial authority of Bangladesh regarding
adjudicating cyber crime
Adjudicating Cyber Crimes: Cyber
Tribunal
 Cyber Tribunal (sec-68 of ICT Act-2006)
 Government can establish one or more Cyber tribunal through notification at the official
gazette.
 It will be constituted by a Session Judge or Additional Session Judge
 At 2013 a Cyber Tribunal has been constituted in to Dhaka
 Apart from Dhaka Cyber crimes are adjudicated by the magistrate courts
 Usually crimes are adjudicated within six months after framing of charges by the Cyber
Tribunal
Cyber Appellate Tribunal
 To hear and adjudicate appeals against the Cyber Tribunal a Cyber
Appellate Tribunal has been constituted.
 There is a chairman and two members of the Cyber Appellate Tribunal
 Chairman will be appointed from any person who is qualified enough to be
appointed as the Justice of the Supreme Court.
 One of the member will be appointed from enacting or retired District
Judges.
 Another member will be appointed from the persons having proper
expertize and experiences related to Information and Communication
Technology.
Conclusion
• PREVENTION CAN BE THE BEST POLICY
• THERE IS NO ALTERNATIVE OF CONSCIOUSNESS
• WE HAVE TO BE AWARE ABOUT THE LAWS
• UNITEDLY WE CAN PREVENT CYBER CRIMES
THANK YOU ALL

More Related Content

What's hot

Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Freedom of Mass Media in Bangladesh
Freedom of Mass Media in BangladeshFreedom of Mass Media in Bangladesh
Freedom of Mass Media in BangladeshMEHEDI HΛSΛN
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladeshOrko Abir
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveFakrul Alam
 
The contribution of information commission to ensure right in Bangladesh
The contribution of information commission to ensure right in BangladeshThe contribution of information commission to ensure right in Bangladesh
The contribution of information commission to ensure right in BangladeshLutfur Rahman
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladeshBank Alfalah Limited
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthDababrata Mondal
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshCyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshAbir Hossain Talukder
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 

What's hot (20)

Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Freedom of Mass Media in Bangladesh
Freedom of Mass Media in BangladeshFreedom of Mass Media in Bangladesh
Freedom of Mass Media in Bangladesh
 
BTRC
BTRCBTRC
BTRC
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Freedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitutionFreedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitution
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global Perspective
 
BTRC
BTRCBTRC
BTRC
 
The contribution of information commission to ensure right in Bangladesh
The contribution of information commission to ensure right in BangladeshThe contribution of information commission to ensure right in Bangladesh
The contribution of information commission to ensure right in Bangladesh
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Cyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on YouthCyber Crime & Its Effect on Youth
Cyber Crime & Its Effect on Youth
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshCyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber security and prevention in Bangladesh

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldSOURAV CHANDRA
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Nitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTANitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTASaurav Gupta
 
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...linda gichohi
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 

Similar to Cyber security and prevention in Bangladesh (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's worldCyber crime-A burning issue of today's world
Cyber crime-A burning issue of today's world
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Cyber law
Cyber lawCyber law
Cyber law
 
Nitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTANitty Gritty of Social Media Regulations BY SAURAV GUPTA
Nitty Gritty of Social Media Regulations BY SAURAV GUPTA
 
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 

Recently uploaded

FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 

Recently uploaded (20)

FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 

Cyber security and prevention in Bangladesh

  • 1. Cyber Crime Prevention and Security in BangladeshPRESENTED BY RABITA REJWANA ASSISTANT PROFESSOR DEPARTMENT OF LAW AND HUMAN RIGHTS VARENDRA UNIVERSITY RAJSHAHI , BANGLADESH
  • 2. Cyber Space and Cyber World • The term Cyberspace was initially introduced by William Gibson in his 1982 fictional short story “Burning Chrome”
  • 3. • Cyberspace is the virtual computer world • It’s more than just the Internet • An Electronic medium used for a global communication • It allows users to share information, interact, shape ideas, play games, engage in discussions or social forums • It has the ability to affect and influence each other
  • 4. • Through Internet based social networking site such as twitter, whatsapp, Facebook and Instagram people can remain connected
  • 5. Some characteristics of Cyberspace  There is no geographical boundaries at the cyberspace.  People leaves digital footprints when engaging online activities  A digital footprint refers to all information found online about a person  It either can be posted by that person or others intentionally or unintentionally  This digital footprint can be used by potential employers, business organizations or add agencies
  • 6. Definition of Cyber Crimes Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass- surveillance, sextortion, child pornography, and child grooming.
  • 7. Classifications  Financial frauds and Crimes  Cyberterrorism  Cyber extortion  Cyberwarfare  Computer as target  Computer as tool  Obscene or offensive content  Online harassment  Drug Trafficking and online gambling
  • 8. Laws to Prevent Cyber Crimes in Bangladesh • THE PENAL CODE 1860 • THE CODE OF CRIMINAL PROCEDURE 1898 • THE INFORMATION AND COMMUNICATION TECHNOLOGY ACT 2006 • PORNOGRAPHY ACT 2012 • THE DIGITAL SECURITY ACT 2018
  • 9. Penal Code 1860 and Code of Criminal Procedure  The conventional crimes defined under the penal code which takes place with the help of computer and internet will be adjudicated conventionally.  For example- Defamation (sec-499) , Counterfeiting Bangladesh Coins(sec- 232) , Sedition(sec-124A)  All the crimes will be adjudicated according to the Code of Criminal Procedure 1898 of Bangladesh
  • 10. The Information and Communication Technology Act 2006  This law has been enacted to secure and legalize Information and communication technology  Damage to Computer System (sec-54): Punishment will extend to ten years and fine which may extend to ten lakh or both.  Tampering with computer source code (sec-55)
  • 11. • Hacking with computer system (Sec-56) • Publishing fake, obscene or defaming information in electronic form (Sec-57) • Unauthorized access to protected systems (Sec-61) • disclosure of confidentiality and privacy (Sec-63) • using computer for committing an offence (Sec-66) Information and Communication Technology Act 2006
  • 12. The Pornography Control Act 2012 THE EMERGENCE OF THIS NEW SECTION IS TO PROTECT DETERIORATED SOCIAL ETHICAL AND MORAL VALUE DUE TO WIDE SPREAD OF SEXUAL VIDEO AMONG CHILDS AND ADULTS , SAFEGUARD FEMALES FROM SEXUAL HARASSMENT AND BLACKMAILING , PREVENT WIDE SPREAD OF VIDEO, MMS AND PICTURE THROUGH MEDIUMS OF COMMUNICATIONS AND TAKE NECESSARY STEPS TO PUNISH PEOPLE WHO DEALS WITH PORN VIDEO AND ITS DISTRIBUTION
  • 13. Definition of Pornography and Punishments  Section 2 describe the definition of pornography .According to pornography act; talking , gesture , acting , nude or half nude dance video or still picture, magazine , book, statue, cartoon ,lift late which increase sexual desire and has no use in case of education and arts will be considered as pornography.  Punishments of selling , producing, abetment for selling and producing, blackmailing, supplying, renting, publishing, preserving or using children for pornography has been given.
  • 14. Digital Security Act 2018  This law has been enacted to ensure National Digital Security and Identifying digital crime, preventing, suppressing, trial and other related matters.  Basically this law has been enacted to elaborate the definitions of the crimes defined under ICT Act 2006 and The Pornography Control Act 2012  This law says about constituting an emergency response team (sec-9)  It also ensures the extra territorial authority of Bangladesh regarding adjudicating cyber crime
  • 15. Adjudicating Cyber Crimes: Cyber Tribunal  Cyber Tribunal (sec-68 of ICT Act-2006)  Government can establish one or more Cyber tribunal through notification at the official gazette.  It will be constituted by a Session Judge or Additional Session Judge  At 2013 a Cyber Tribunal has been constituted in to Dhaka  Apart from Dhaka Cyber crimes are adjudicated by the magistrate courts  Usually crimes are adjudicated within six months after framing of charges by the Cyber Tribunal
  • 16. Cyber Appellate Tribunal  To hear and adjudicate appeals against the Cyber Tribunal a Cyber Appellate Tribunal has been constituted.  There is a chairman and two members of the Cyber Appellate Tribunal  Chairman will be appointed from any person who is qualified enough to be appointed as the Justice of the Supreme Court.  One of the member will be appointed from enacting or retired District Judges.  Another member will be appointed from the persons having proper expertize and experiences related to Information and Communication Technology.
  • 17. Conclusion • PREVENTION CAN BE THE BEST POLICY • THERE IS NO ALTERNATIVE OF CONSCIOUSNESS • WE HAVE TO BE AWARE ABOUT THE LAWS • UNITEDLY WE CAN PREVENT CYBER CRIMES