SlideShare a Scribd company logo
 What is cyber-crime?
You often hear the term ‘cybercrime’ bandied about these days, as it's a bigger risk
now than ever before due to the sheer number of connected people and devices. But
what is it exactly? In a nutshell, it is simply a crime that has some kind of computer
or cyber aspect to it.
Common types of cybercrime include hacking, online scams and fraud, identity
theft, attacks on computer systems and illegal or prohibited online content. The
effect of cybercrime can be extremely upsetting for victims, and not necessarily just
for financial reasons.
What is hacking?
During the 1990s, the term "hacker" originally denoted a skilled programmer
proficient in machine code and computer operating systems. In particular, these
individuals could always hack on an unsatisfactory system to solve problems and
engage in a little software company espionage by interpreting a competitor's code.
Unfortunately, some of these hackers also became experts at accessing password-
protected computers, files, and networks and came to known as "crackers." Of
course, an effective and dangerous "cracker" must be a good hacker and the terms
became intertwined. Hacker won out in popular use and in the media and today
refers to anyone who performs some form of computer sabotage.
 What is online scams?
An Internet fraud (online scam) is the use of Internet services or software with
Internet access to defraud victims or to otherwise take advantage of them; for
example, by stealing personal information, which can even lead to identity theft. A
very common form of Internet fraud is the distribution of rogue security software.
Internet services can be used to present fraudulent solicitations to prospective
victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to
financial institutions or to others connected with the scheme. Research suggests that
online scams can happen through social engineering and social influence. It can
occur in chat rooms, social media, email, message boards, or on websites.
 What is an attack on computer system?
Sophisticated criminals are able to exploit vulnerabilities on computers and other
devices. Some of the techniques they use include:
unauthorized access or hacking – when someone gains access to your computer or
device without permission,
malware – malicious software (such as viruses, trojans and spyware) which monitor
your online activity and cause damage to the computer,
denial of service attacks – an attack which floods a computer or website with data,
causing it to overload and prevent it from functioning properly. This type of attack is
more frequently targeted at businesses, rather than individuals.
Attacks can result in a criminal accessing your personal or financial details and can
prevent you from being able to use your device or computer system properly.
Cyber Law in Bangladesh is an interesting yet evolving sector of Law. But what is it
that contemplates the true meaning of Cyber Law? Well, the term Cyber Law
derived from its generic term called Cybernetics, which means that this sector of
law tend to resolves issues, and legal consequences that are raised in the Internet.
And what makes Cyber Law in Bangladesh even a legal factor, honestly speaking,
everything does. With time and generation the virtual world is becoming more
familiar than reality, however, even than check and balances for the crimes
committed in the virtual world can only be resolved through a practical commission
of natural judicial process. Which in turn needs assistance from Cyber Law.
Currently, the realm under which cyber law resides in Bangladesh is the ICT Act
2006 as amended in 2013. Funny but true the Act does not provide any definition as
to what is Cyber Law.
One of the most important provisions, probably most controversial as well, is the
section 57 of the ICT Act. Basically, the section heavily condemned several online
crimes such as defamation, pornography, illicit propaganda against the government
or religious belief into one section.
1. Now this section is very controversial due to its vague nature, which is subject
to several different interpretations, hence it’s not specific as to what may
constitute an offense under the section.
2. Recently, amended version of the section in 2013, increased the penalty for
violation of the provision from maximum imprisonment of 10 years to 14 years
and a minimum of 7 years. Now that’s a heavy penalty imposed for the lenient
version of the crime.
In the mist of all these, as of now the section is the ultimate resort for people who
are being defamed or aggrieved online. The Act further considers other technical
crimes such as hacking and spamming. Nevertheless, its always better to be cautious
than ignorant, and irrespective of all the legal jargons, it is wise to refrain ourselves
from commenting or posting materials that may harm others both ethically and from
legal point of view. Because You never know you might easily be an offender under
Cyber Law.
Out of all legal remedies offered by the state, Writ is a crucial form of legal
remedies against the infringement of the administrative actions which is getting
much more popular upon several successful applications as a remedy in the context
of the adverse activities of the state bodies. If effective measures are taken and
brought to the court maintaining the proper procedure, Writ Petition in Bangladesh
can be demonstrated as an effective remedy for the public as a special modification
in the existing legal and administrative system of Bangladesh.
Thank You!

More Related Content

What's hot

forms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceforms, extent & cause of poloice deviance
forms, extent & cause of poloice deviance
Chaitanya Limbachiya
 
privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)
Chaitanya Limbachiya
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
IshitaSrivastava21
 
Classes of Criminal Courts in Bangladesh
Classes of Criminal Courts in BangladeshClasses of Criminal Courts in Bangladesh
Classes of Criminal Courts in Bangladesh
A K DAS's | Law
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
Schools of criminology
Schools of criminologySchools of criminology
Schools of criminology
WARIFVACIM
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
gagan deep
 
Freedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitutionFreedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitution
Bangladesh University of Professionals
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
White collar-crimes-in-india
White collar-crimes-in-indiaWhite collar-crimes-in-india
White collar-crimes-in-india
Ricky Chopra
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
Orko Abir
 
Transnational organized crime its concept
Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its concept
gagan deep
 
Prevention of Crime
Prevention of CrimePrevention of Crime
Prevention of Crime
godwindaniel
 
Lentin Commission Report
Lentin Commission ReportLentin Commission Report
Lentin Commission Report
Chaitanya Limbachiya
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Rahul Bharati
 

What's hot (20)

forms, extent & cause of poloice deviance
forms, extent & cause of poloice devianceforms, extent & cause of poloice deviance
forms, extent & cause of poloice deviance
 
privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)privileged class deviance ( concept &nature)
privileged class deviance ( concept &nature)
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Classes of Criminal Courts in Bangladesh
Classes of Criminal Courts in BangladeshClasses of Criminal Courts in Bangladesh
Classes of Criminal Courts in Bangladesh
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Schools of criminology
Schools of criminologySchools of criminology
Schools of criminology
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Freedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitutionFreedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitution
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
White collar-crimes-in-india
White collar-crimes-in-indiaWhite collar-crimes-in-india
White collar-crimes-in-india
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Cyber law
Cyber lawCyber law
Cyber law
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Transnational organized crime its concept
Transnational organized crime its conceptTransnational organized crime its concept
Transnational organized crime its concept
 
Prevention of Crime
Prevention of CrimePrevention of Crime
Prevention of Crime
 
Lentin Commission Report
Lentin Commission ReportLentin Commission Report
Lentin Commission Report
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 

Similar to Cyber law in bangladesh

Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Cyber crime
Cyber crimeCyber crime
Cyber crime
MrunalBakshi
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
SSPTRGCELL
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
Nikhil Chaudhary
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
varunbamba
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
Rajesh Satpathy, Regional College of Management (RCM), Bhubaneswar
 

Similar to Cyber law in bangladesh (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 

Recently uploaded

1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 

Recently uploaded (20)

1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 

Cyber law in bangladesh

  • 1.
  • 2.  What is cyber-crime? You often hear the term ‘cybercrime’ bandied about these days, as it's a bigger risk now than ever before due to the sheer number of connected people and devices. But what is it exactly? In a nutshell, it is simply a crime that has some kind of computer or cyber aspect to it. Common types of cybercrime include hacking, online scams and fraud, identity theft, attacks on computer systems and illegal or prohibited online content. The effect of cybercrime can be extremely upsetting for victims, and not necessarily just for financial reasons.
  • 3.
  • 4. What is hacking? During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a little software company espionage by interpreting a competitor's code. Unfortunately, some of these hackers also became experts at accessing password- protected computers, files, and networks and came to known as "crackers." Of course, an effective and dangerous "cracker" must be a good hacker and the terms became intertwined. Hacker won out in popular use and in the media and today refers to anyone who performs some form of computer sabotage.
  • 5.
  • 6.  What is online scams? An Internet fraud (online scam) is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Research suggests that online scams can happen through social engineering and social influence. It can occur in chat rooms, social media, email, message boards, or on websites.
  • 7.
  • 8.  What is an attack on computer system? Sophisticated criminals are able to exploit vulnerabilities on computers and other devices. Some of the techniques they use include: unauthorized access or hacking – when someone gains access to your computer or device without permission, malware – malicious software (such as viruses, trojans and spyware) which monitor your online activity and cause damage to the computer, denial of service attacks – an attack which floods a computer or website with data, causing it to overload and prevent it from functioning properly. This type of attack is more frequently targeted at businesses, rather than individuals. Attacks can result in a criminal accessing your personal or financial details and can prevent you from being able to use your device or computer system properly.
  • 9.
  • 10. Cyber Law in Bangladesh is an interesting yet evolving sector of Law. But what is it that contemplates the true meaning of Cyber Law? Well, the term Cyber Law derived from its generic term called Cybernetics, which means that this sector of law tend to resolves issues, and legal consequences that are raised in the Internet. And what makes Cyber Law in Bangladesh even a legal factor, honestly speaking, everything does. With time and generation the virtual world is becoming more familiar than reality, however, even than check and balances for the crimes committed in the virtual world can only be resolved through a practical commission of natural judicial process. Which in turn needs assistance from Cyber Law.
  • 11. Currently, the realm under which cyber law resides in Bangladesh is the ICT Act 2006 as amended in 2013. Funny but true the Act does not provide any definition as to what is Cyber Law. One of the most important provisions, probably most controversial as well, is the section 57 of the ICT Act. Basically, the section heavily condemned several online crimes such as defamation, pornography, illicit propaganda against the government or religious belief into one section.
  • 12. 1. Now this section is very controversial due to its vague nature, which is subject to several different interpretations, hence it’s not specific as to what may constitute an offense under the section. 2. Recently, amended version of the section in 2013, increased the penalty for violation of the provision from maximum imprisonment of 10 years to 14 years and a minimum of 7 years. Now that’s a heavy penalty imposed for the lenient version of the crime.
  • 13. In the mist of all these, as of now the section is the ultimate resort for people who are being defamed or aggrieved online. The Act further considers other technical crimes such as hacking and spamming. Nevertheless, its always better to be cautious than ignorant, and irrespective of all the legal jargons, it is wise to refrain ourselves from commenting or posting materials that may harm others both ethically and from legal point of view. Because You never know you might easily be an offender under Cyber Law.
  • 14.
  • 15. Out of all legal remedies offered by the state, Writ is a crucial form of legal remedies against the infringement of the administrative actions which is getting much more popular upon several successful applications as a remedy in the context of the adverse activities of the state bodies. If effective measures are taken and brought to the court maintaining the proper procedure, Writ Petition in Bangladesh can be demonstrated as an effective remedy for the public as a special modification in the existing legal and administrative system of Bangladesh.