SlideShare a Scribd company logo
Cyber Cafe in Bangladesh
Introduction of cyber cafe
Cyber Cafe is a place where one can use a computer with internet access, most for a
fee, usually per hour or minute. In Bangladeshi Commission decided to issue the
following Categories of ISP including cyber Cafe Service License with an open
licensing procedure
Category A :
Category B :
Category C :

For each Police Station (P/S) of Dhaka Metropolitan Area.
For each Police Station (P/S) of Chittagong, Rajshahi, Khulan,
Sylhet and Barisal Metropolitan Area.
For each Police Station (P/S) of other than Metropolitan Area.

Status of issued license of ISP for Cyber Cafe (2008-2009)
SI No

Category

Number of
licenses

1

Category A

99

2

Category B

16

3

Category C

4
Condition of BTRC
1. Cyber Cafe must have an office with valid address and there must be at least
two contact phone numbers and one e-mail address.
2. Cyber Cafe has to keep the record of the browser’s name and address of
National ID Card No. in a register.
3. To provide privacy, only for monitor, a partition may be used but the
maximum height is to be four feet from the floor level. Any kind of door or
restriction is not allowed in the entrance of booth (work station/terminal).
4. On school time uniformed students are not allowed to browse. If they have any
recommendation from the school authority of guardian only then they will be
allowed to browse for educational needs.
5. A complaint box should be provided in an open place of the cyber cafe.
Types of Crime
1. Unauthorized Threaten e-mail for a nation’s security and others.
2. Un-Social activities.
3. Abuses of porn and adult site by under aged.
4. Online gambling.
5. Cyber defamation.
6. Unauthorized access to computer system or networks.
7. Illegally Data transfer.
8. Sale of illegal articles.
Instruction Given by CCOAB.
1. To Maintain of Users name and Particular in a resister.
2. Privacy partition must be four feet high from floor.
3. Can’t be kept CD Rom and hard disk in user’s computer.
4. To Ensure a fixed time for school students.
5. Must be ensuring a good environment for users.
6. CCOAB and Others law and Enforcement agencies must be visit the Cafe at any time.
For Users Safety
1.

Please write your name and address in a cyber cafe’s resister.

2.

Please don’t misuse e-mail’s .It’s a punishable offence.

3.

Below 18 year’s old students will not allowed except education matter.
Cyber cafe

More Related Content

What's hot

Smart cards
Smart cardsSmart cards
Smart cards
Siddhartha Mazumdar
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
Karnika Seth
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
nehal patel
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
Clarice_Wilson
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies Bhagya Bgk
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
Accenture Technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Blockchain in ecommerce
Blockchain in ecommerceBlockchain in ecommerce
Blockchain in ecommerce
zaarahary
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
Adriane Silva
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
Smriti Rai
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Dr. Prashant Vats
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 

What's hot (20)

Smart cards
Smart cardsSmart cards
Smart cards
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Building Digital Trust : The role of data ethics in the digital age
Building Digital Trust: The role of data ethics in the digital ageBuilding Digital Trust: The role of data ethics in the digital age
Building Digital Trust : The role of data ethics in the digital age
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Blockchain in ecommerce
Blockchain in ecommerceBlockchain in ecommerce
Blockchain in ecommerce
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Ppt of e voting
Ppt of e votingPpt of e voting
Ppt of e voting
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Atm security
Atm securityAtm security
Atm security
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 

Viewers also liked

Plan your own cybercafé
Plan your own cybercaféPlan your own cybercafé
Plan your own cybercaféJoão Nourdin
 
Cyber cafe
Cyber cafeCyber cafe
Cyber cafeazabear
 
Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2
Jorge Fernando Noriega Padilla
 
Travesías entre refugios
Travesías entre refugiosTravesías entre refugios
Travesías entre refugiosguiandosentidos
 
Un largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelUn largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelDaniel Dagna
 
Minimum Vital - Alberto Masferrer
Minimum Vital - Alberto MasferrerMinimum Vital - Alberto Masferrer
Minimum Vital - Alberto Masferrer
JeoEstudioso
 
Internet in rural india
Internet in rural indiaInternet in rural india
Internet in rural indiaOindrila Roy
 
Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57
Jhon Arriaga Cordova
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)
Paulo Bischof
 
IPAC Brochure
IPAC BrochureIPAC Brochure
IPAC Brochure
splitt1224
 
Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?
Faculty of Science, Palacký University
 
Del mito al logo
Del mito al logoDel mito al logo
Del mito al logonaxo luz
 
Lesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentLesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentRafael Alejandro
 
Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013
John Stone III
 
WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016
EworksWSI Cyprus
 
Comercializadora salem s
Comercializadora salem sComercializadora salem s
Comercializadora salem s
jlmalvall
 

Viewers also liked (20)

Plan your own cybercafé
Plan your own cybercaféPlan your own cybercafé
Plan your own cybercafé
 
Carta de recomendacion
Carta de recomendacionCarta de recomendacion
Carta de recomendacion
 
Cyber cafe
Cyber cafeCyber cafe
Cyber cafe
 
Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2
 
Travesías entre refugios
Travesías entre refugiosTravesías entre refugios
Travesías entre refugios
 
2015-Polyform Catalog
2015-Polyform Catalog2015-Polyform Catalog
2015-Polyform Catalog
 
Un largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelUn largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papel
 
Minimum Vital - Alberto Masferrer
Minimum Vital - Alberto MasferrerMinimum Vital - Alberto Masferrer
Minimum Vital - Alberto Masferrer
 
Internet in rural india
Internet in rural indiaInternet in rural india
Internet in rural india
 
Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)
 
Diaposotivas proyecto futuro I Oscar David G.M
Diaposotivas proyecto futuro I Oscar David G.MDiaposotivas proyecto futuro I Oscar David G.M
Diaposotivas proyecto futuro I Oscar David G.M
 
IPAC Brochure
IPAC BrochureIPAC Brochure
IPAC Brochure
 
Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?
 
Del mito al logo
Del mito al logoDel mito al logo
Del mito al logo
 
Lesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentLesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the present
 
Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013
 
Manualcamtasia
ManualcamtasiaManualcamtasia
Manualcamtasia
 
WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016
 
Comercializadora salem s
Comercializadora salem sComercializadora salem s
Comercializadora salem s
 

Similar to Cyber cafe

PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
Fizaril Amzari Omar
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Sanil Shrivastava
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesGener Luis Morada
 
E-learning
E-learning E-learning
E-learning
akash sah
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
BryanBangiban1
 
Word computer shop
Word computer shopWord computer shop
Word computer shop
Johana Bautista
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Mojgan aslian
Mojgan aslianMojgan aslian
Mojgan aslian
MojganAslian
 
Cyber security
Cyber securityCyber security
Cyber security
KrishnanPoddar
 
I School Presentation
I School PresentationI School Presentation
I School Presentationguestaab445
 
Ischool Presentation
Ischool PresentationIschool Presentation
Ischool Presentationguestaab445
 
Kirabo cyber cafe business plan
Kirabo cyber cafe business planKirabo cyber cafe business plan
Kirabo cyber cafe business plan
Kisakye Stephen
 
ICT 2.pptx
ICT 2.pptxICT 2.pptx
Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Shamsee Mustafa
 
Information technology act
Information technology actInformation technology act
Information technology act
DeepthiPrabhu9
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
sonali talkar
 

Similar to Cyber cafe (20)

Ordinances And Permits
Ordinances And PermitsOrdinances And Permits
Ordinances And Permits
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business Philippines
 
Business Module
Business ModuleBusiness Module
Business Module
 
E-learning
E-learning E-learning
E-learning
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
 
Word computer shop
Word computer shopWord computer shop
Word computer shop
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Mojgan aslian
Mojgan aslianMojgan aslian
Mojgan aslian
 
Cyber security
Cyber securityCyber security
Cyber security
 
I School Presentation
I School PresentationI School Presentation
I School Presentation
 
Ischool Presentation
Ischool PresentationIschool Presentation
Ischool Presentation
 
Sustainable Itc Integration
Sustainable Itc IntegrationSustainable Itc Integration
Sustainable Itc Integration
 
Kirabo cyber cafe business plan
Kirabo cyber cafe business planKirabo cyber cafe business plan
Kirabo cyber cafe business plan
 
ICT 2.pptx
ICT 2.pptxICT 2.pptx
ICT 2.pptx
 
Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 

More from azad12915

Cos conf 11.03.14 final
Cos conf 11.03.14 finalCos conf 11.03.14 final
Cos conf 11.03.14 final
azad12915
 
Dmp organogram (2013) final/azad
Dmp organogram (2013)  final/azadDmp organogram (2013)  final/azad
Dmp organogram (2013) final/azadazad12915
 
Telephone DMP ALL
Telephone  DMP ALLTelephone  DMP ALL
Telephone DMP ALLazad12915
 
Thana computer operator mobile number
Thana computer operator mobile numberThana computer operator mobile number
Thana computer operator mobile numberazad12915
 
All division thana name
All division thana nameAll division thana name
All division thana nameazad12915
 
Web based pims user identification form
Web based pims  user identification formWeb based pims  user identification form
Web based pims user identification formazad12915
 
Asi miraj cl application
Asi miraj cl applicationAsi miraj cl application
Asi miraj cl applicationazad12915
 
Pl application
Pl applicationPl application
Pl applicationazad12915
 
Live protibedon
Live protibedonLive protibedon
Live protibedonazad12915
 

More from azad12915 (20)

Cos conf 11.03.14 final
Cos conf 11.03.14 finalCos conf 11.03.14 final
Cos conf 11.03.14 final
 
Dmp organogram (2013) final/azad
Dmp organogram (2013)  final/azadDmp organogram (2013)  final/azad
Dmp organogram (2013) final/azad
 
Telephone DMP ALL
Telephone  DMP ALLTelephone  DMP ALL
Telephone DMP ALL
 
Thana computer operator mobile number
Thana computer operator mobile numberThana computer operator mobile number
Thana computer operator mobile number
 
Mis it
Mis itMis it
Mis it
 
Gd 1
Gd 1Gd 1
Gd 1
 
Gd
GdGd
Gd
 
Call sign
Call signCall sign
Call sign
 
All division thana name
All division thana nameAll division thana name
All division thana name
 
Vpn user
Vpn  userVpn  user
Vpn user
 
Web based pims user identification form
Web based pims  user identification formWeb based pims  user identification form
Web based pims user identification form
 
Asi miraj cl application
Asi miraj cl applicationAsi miraj cl application
Asi miraj cl application
 
Pl application
Pl applicationPl application
Pl application
 
Live
LiveLive
Live
 
Live protibedon
Live protibedonLive protibedon
Live protibedon
 
Leave
LeaveLeave
Leave
 
Leave cl
Leave clLeave cl
Leave cl
 
L.a.p
L.a.pL.a.p
L.a.p
 
Cl
ClCl
Cl
 
Leave pl
Leave plLeave pl
Leave pl
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Cyber cafe

  • 1.
  • 2. Cyber Cafe in Bangladesh
  • 3. Introduction of cyber cafe Cyber Cafe is a place where one can use a computer with internet access, most for a fee, usually per hour or minute. In Bangladeshi Commission decided to issue the following Categories of ISP including cyber Cafe Service License with an open licensing procedure Category A : Category B : Category C : For each Police Station (P/S) of Dhaka Metropolitan Area. For each Police Station (P/S) of Chittagong, Rajshahi, Khulan, Sylhet and Barisal Metropolitan Area. For each Police Station (P/S) of other than Metropolitan Area. Status of issued license of ISP for Cyber Cafe (2008-2009) SI No Category Number of licenses 1 Category A 99 2 Category B 16 3 Category C 4
  • 4. Condition of BTRC 1. Cyber Cafe must have an office with valid address and there must be at least two contact phone numbers and one e-mail address. 2. Cyber Cafe has to keep the record of the browser’s name and address of National ID Card No. in a register. 3. To provide privacy, only for monitor, a partition may be used but the maximum height is to be four feet from the floor level. Any kind of door or restriction is not allowed in the entrance of booth (work station/terminal). 4. On school time uniformed students are not allowed to browse. If they have any recommendation from the school authority of guardian only then they will be allowed to browse for educational needs. 5. A complaint box should be provided in an open place of the cyber cafe.
  • 5. Types of Crime 1. Unauthorized Threaten e-mail for a nation’s security and others. 2. Un-Social activities. 3. Abuses of porn and adult site by under aged. 4. Online gambling. 5. Cyber defamation. 6. Unauthorized access to computer system or networks. 7. Illegally Data transfer. 8. Sale of illegal articles.
  • 6. Instruction Given by CCOAB. 1. To Maintain of Users name and Particular in a resister. 2. Privacy partition must be four feet high from floor. 3. Can’t be kept CD Rom and hard disk in user’s computer. 4. To Ensure a fixed time for school students. 5. Must be ensuring a good environment for users. 6. CCOAB and Others law and Enforcement agencies must be visit the Cafe at any time.
  • 7. For Users Safety 1. Please write your name and address in a cyber cafe’s resister. 2. Please don’t misuse e-mail’s .It’s a punishable offence. 3. Below 18 year’s old students will not allowed except education matter.