SlideShare a Scribd company logo
www.brac.net
Welcome to Advocacy360°
Session – 3
February 12, 2014
www.brac.net
Disclaimer
[[This presentation is for BRAC Advocacy
staff to be presented on Advocacy360°
forum and non-commercial use only.]]
www.brac.net
Rewind
S M Mamunur Rasid
www.brac.net
Previous Episode‘s Agenda
• Public speaker – Afsan Chowdhury
– How does BRAC work – (10mins)
• Office tips and tricks - (15 mins)
a.Tarek Aziz
– Exclusive Windows tips
b. Hamim Rahman
– Ms Office tips – Page and Lay out
• New media and out of the box - 10 mins
a. Nadia Afrin Shams
– A tribute to Madiba
b. Abdullah Al Shariatullah Kajal
– ICT forum message
• Gaan and Fun -
a. Naseef Faruque Amin
- Singer of the month
• Open session for audience - 10 mins
www.brac.net
Today’s Agenda
• Recap – 3 mins
• Public speaker – Snigdha Ali on Advocacy and Behavior
• Office tips and tricks - (12 mins)
a.Tarek Aziz - Windows tips to smooth office work.
b. Mohammad Shamim – Online Leave and visit form.
• New media and Out of the box – (10 mins)
a. Naseef Faruque Amin – Out of the box – ICT law vs
liberty risk
b. Mohd. Abdullah Al Shariatullah Kajal – 12 steps to be
a blogger.
• Open session for audience - 10 mins
www.brac.net
Public Speaking …
Advocacy and Behavior
Snigdha Ali
www.brac.net
www.brac.net
www.brac.net
www.brac.net
www.brac.net
www.brac.net
www.brac.net
www.brac.net
www.brac.net
www.brac.net
Windows Tips
Tarek Aziz
www.brac.net
If computer freeze or hang
Press
Ctrl + Alt + Delete
www.brac.net
If computer freeze or hang
Windows Task Manager
Application
Select/Click the task
End Task
Close Windows Task Manager
www.brac.net
To change folder Icon
Right click on folder
Properties
Click on Customize
www.brac.net
To change folder Icon
Click change Icon Select Icon Click ok
www.brac.net
Out of the box
www.brac.net
Amending ICT Law VS Liberty Risk
Commentary on ‘Information and Communication
Technology Act (Amended), 2013’
Naseef Faruque Amin
www.brac.net
“The aspirations of free peoples are seldom
harmful to liberty, because they result
either from oppression or from fear that
there is going to be oppression.”
– Niccolo Machiavelli, Discourses I.4
www.brac.net
Name of the Law and its
amendment
• ‘Information and Communication Technology
Act, 2006.’
• On September 20, 2013 the treasury bench
placed a bill in parliament purporting to further
amend the current law of the land on information
and communication technology.
• Amendment: ‘Information and Communication
Technology Act, (Amended) 2013.’
www.brac.net
Why this law? What threats?
• Threats of Cyber-crime
• Biggest privacy problem - data breaches
• Cracking (hacking)
• Copyright Infringements
• Child Pornography
• Child Grooming
www.brac.net
Crimes that primarily target computer networks or
devices include:
• Computer viruses
• Denial-of-service attacks
• Malware (malicious code)
Crimes that use computer networks or devices to
advance other ends include:
• Cyberstalking
• Fraud & identity theft
• Information warfare
• Phishing scams
www.brac.net
Defining crime: everything is put
on the same dish!
• Lengthy portion of Chapter VIII (namely ss. 54-67) of ICT Act, 2006
provides for identification of cyber offences.
• Section 57(2), for instance, provides for punishment for ‘publishing
fake, obscene or defaming information in electronic form’.
• Now you should ask: How to determine an electronic offence?
• The law replies: ‘If any person,’ as s.57(1) provides, ‘deliberately publishes or
transmits or causes to be published or transmitted in the website or in electronic form
any material which is fake or obscene or its effect is such as to tend to deprave and
corrupt persons who are likely, having regard to all relevant circumstances, to read,
see or hear the matter contained or embodied in it, or causes to deteriorate or creates
possibility to deteriorate law and order, prejudice the image of the State or person or
causes to hurt or may hurt religious belief or instigate against any person or
organisation, then this activity of his will be regarded as an offence.’
• This is quite a tall order and needless to say,
everything is put on the same dish!
www.brac.net
When we don’t get a clear explanation about
the crime what should we call it? :
Unclear? Confusing? Vague?
There are at least three orders of confusion:
• scope of offences
• the process of bringing in charges
• the enforcement procedure.
www.brac.net
Increasing the duration of
imprisonment
• ICT Act, 2006 provides for a maximum punishment of 10
years where the proposed amendment increase it to 14
years maximum and 7 years minimum.
• Betrays faith in retribution.
• Retributive crime – Let the punishment fit the crime.
• Retribution is not vengeance. Rather it is directed only at
wrongs, has inherent limits, is not personal, involves no
pleasure at the suffering of others, and employs
procedural standards.
www.brac.net
Some criticisms: Unjustly
empowering law officers
• An ominous aspect is the proposed provision for
empowering the law officers to arrest a suspect without
judicial warrant.
• As the corresponding provision of the extant law has it,
in order to file a case against someone and issue an
order of arrest the police are under the obligation to
obtain prior permission of authorities concerned.
• The proposed amendment wants to do away with it.
It looks ominously like some pious follower
of deterrence at work here !
www.brac.net
Some criticisms: Issue of bail
• ICT Act, 2006 offences were considered
as bailable.
• In the proposed amendment they have,
however, been made non-bailable, leaving
it at the mercy of the judge.
www.brac.net
Some criticisms: Freedom of
expression Vs Cyber Crime
• Involved here is no less than that fundamental question,
namely the right of the citizen to freedom of speech and
freedom of expression and freedom of the press, the
violation of which is considered to be a cardinal sin.
• Article 57 of the draft, “any willful release on websites or
any other electronic platform of any material which is
false, vulgar, defamatory, liable to cause deterioration of
law and order, or tarnishes the image of the state or
individual, or hurts religious sentiments is treated as a
cyber crime.”
• There is no clear line of demarcation between the limit of
freedom of expression and defamation or cyber-crime.
www.brac.net
Some criticisms: Lack of sufficient
stakeholder consultation
• Technical experts argue that the government would not
be able to tackle cyber-crimes with this kind of inefficient
law.
• The proposed law, for instance, does not cover a
majority of crimes committed through mobiles.
• It considered emails as evidence, which conflicts with
the country’s law of evidence.
• To tackle the growing number of cyber-crimes, the
government should have consulted with all the
stakeholders.
www.brac.net
What is to be done!
• Government should consult these issues
with relevant stakeholders and come clean
by drafting rules so that they do not hinder
fundamental rights like freedom of speech
and expression.
• And there is a scope for policy advocacy
to offset the criticisms of this law; which is
already asserted as ‘Black Law’.
www.brac.net
ICT forum message
www.brac.net
Online leave and visit form:
New ICT products from BRAC
Mohammad Shamim
www.brac.net
Online Leave Form
www.brac.net
Online Leave Form Home page
www.brac.net
Start online leave
www.brac.net
Fill up online leave Form
www.brac.net
Online Visit Form
www.brac.net
New Media
www.brac.net
12 Steps to become a blogger
Mohd. Abdullah Al Shariatullah
www.brac.net
Let’s start blogging
www.brac.net
Step-1: go to blogger.com
www.brac.net
Step-2: Continue to blogger
www.brac.net
Step-3: new blog
www.brac.net
Step-4: Title, Address, Template
www.brac.net
Step-5: correct url
www.brac.net
Step-6: you are ready to start
www.brac.net
Step-7: Write your first blog
www.brac.net
Step-8: Add Link on your post
www.brac.net
Step-9: Add photo on your post
www.brac.net
Step-10: Publish your blog
www.brac.net
Step-11: Let’s taste it
www.brac.net
Congratulations! You are a blogger now
www.brac.net
We commemorate language martyrs
on this month
Photo: Mithun Das
www.brac.net
Valentine Day campaign of shobujpata, a
green forum
Day based program: effective tool for advocacy
Source: www.shobujpata.com & www.fb.com/shobujpata.bd
www.brac.net
Any Questions???
www.brac.net
Advocacy Retreat: Akul appeal !!!
www.brac.net
Thank You
Please don’t miss to fill up the feedback form.
click the link: http://goo.gl/spD44X
Our website: advocacy360.blogspot.com

More Related Content

What's hot

2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
Felipe Prado
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
Ronnel Fernandez
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
Kevin Cedeño, CISM, CISA
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
atuljaybhaye
 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly Call
Internet Law Center
 
Pls 780 week 9
Pls 780 week 9Pls 780 week 9
Pls 780 week 9
Michael Germano
 
American Government Wk 6 Unit 2 Project Amending The Constitution
American  Government  Wk 6  Unit 2  Project    Amending The  ConstitutionAmerican  Government  Wk 6  Unit 2  Project    Amending The  Constitution
American Government Wk 6 Unit 2 Project Amending The Constitution
See
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
Internet Law Center
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
Tech and Law Center
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
Zohaib Arshid
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
TeamOneI1MBA11
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
Talwant Singh
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
TeamOneI1MBA11
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
Internet Law Center
 
Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
Olena Boltushkina
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
DMAI's Destinations Showcase
 

What's hot (19)

2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)2600 v20 n2 (summer 2003)
2600 v20 n2 (summer 2003)
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Legislative Update - TIP Monthly Call
Legislative Update - TIP Monthly CallLegislative Update - TIP Monthly Call
Legislative Update - TIP Monthly Call
 
Pls 780 week 9
Pls 780 week 9Pls 780 week 9
Pls 780 week 9
 
American Government Wk 6 Unit 2 Project Amending The Constitution
American  Government  Wk 6  Unit 2  Project    Amending The  ConstitutionAmerican  Government  Wk 6  Unit 2  Project    Amending The  Constitution
American Government Wk 6 Unit 2 Project Amending The Constitution
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Team one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussionTeam one i1 mba11 cyber law discussion
Team one i1 mba11 cyber law discussion
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
Internet in Ukraine
Internet in UkraineInternet in Ukraine
Internet in Ukraine
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 

Similar to Advocacy360 3rd episode 12 feb 2014

Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
bsookman
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
neelima27
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Nasimuddin .
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
Samuel Barros
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
Tgarmon34
 
Network Neutrality Policy Summary
Network Neutrality Policy SummaryNetwork Neutrality Policy Summary
Network Neutrality Policy Summary
Kim Moore
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
FM Consulting International
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
Luca De Biase
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
Swant Anand
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
Carolina Rossini
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
Carolina Rossini
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
Dibussi Tande
 
Net Neutrality in INDIA
Net Neutrality in INDIANet Neutrality in INDIA
Net Neutrality in INDIA
Pankil Shah
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
Net neutrality by Mitesh Kumar
Net neutrality by Mitesh KumarNet neutrality by Mitesh Kumar
Net neutrality by Mitesh Kumar
Mitesh Kumar
 
Web3 summit 2019 Funkas Berlin(Report)
Web3 summit 2019  Funkas Berlin(Report)Web3 summit 2019  Funkas Berlin(Report)
Web3 summit 2019 Funkas Berlin(Report)
Masahiro Takeda
 

Similar to Advocacy360 3rd episode 12 feb 2014 (20)

Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
The Brazilian Civil Rights Framework for the Internet (Marco Civil da Interne...
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Internet decency legislation
Internet decency legislationInternet decency legislation
Internet decency legislation
 
Network Neutrality Policy Summary
Network Neutrality Policy SummaryNetwork Neutrality Policy Summary
Network Neutrality Policy Summary
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
6.bocconi rights
6.bocconi rights6.bocconi rights
6.bocconi rights
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Net Neutrality in INDIA
Net Neutrality in INDIANet Neutrality in INDIA
Net Neutrality in INDIA
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Net neutrality by Mitesh Kumar
Net neutrality by Mitesh KumarNet neutrality by Mitesh Kumar
Net neutrality by Mitesh Kumar
 
Web3 summit 2019 Funkas Berlin(Report)
Web3 summit 2019  Funkas Berlin(Report)Web3 summit 2019  Funkas Berlin(Report)
Web3 summit 2019 Funkas Berlin(Report)
 

Recently uploaded

Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
ichettrisagar95
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptxAssignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
kirannaveed6
 
7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx
gpangilinan2017
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
ghyke
 
一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理
qywqoy
 
maths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdfmaths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdf
eystreemc
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Tim Han Success Insider
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
PsychoTech Services
 
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
shahul62
 

Recently uploaded (10)

Stealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your wordsStealth attraction for mens gets her with your words
Stealth attraction for mens gets her with your words
 
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotesProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
ProSocial Behaviour - Applied Social Psychology - Psychology SuperNotes
 
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptxAssignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
Assignment 1 (Introductions to Microsoft Power point 2019) kiran.pptx
 
7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx7 Habits of Highly Effective People.pptx
7 Habits of Highly Effective People.pptx
 
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
一比一原版(mizzou毕业证书)美国密苏里大学毕业证如何办理
 
一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理一比一原版美国旧金山艺术大学毕业证如何办理
一比一原版美国旧金山艺术大学毕业证如何办理
 
maths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdfmaths class 10 practice sheet boards important.pdf
maths class 10 practice sheet boards important.pdf
 
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA CoursePersonal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
Personal Growth Unleashed: Key Strategies from Tim Han’s LMA Course
 
Aggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotesAggression - Applied Social Psychology - Psychology SuperNotes
Aggression - Applied Social Psychology - Psychology SuperNotes
 
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
1-CIE-IGCSE-Additional-Mathematics-Topical-Past-Paper-Functions.pdf
 

Advocacy360 3rd episode 12 feb 2014