SlideShare a Scribd company logo
CYBER	
  SECURITY	
  IN	
  
BANGLADESH	
  
ANEEK	
  R.	
  HAQUE	
  
BARRISTER	
  AT	
  LAW	
  
ADVOCATE,	
  SUPREME	
  COURT	
  
BANGLADESH	
  
Crime	
  1.0	
  
In	
  1908,	
  Henry	
  Ford	
  brought	
  affordable	
  cars	
  and	
  
this	
   technology	
   was	
   immediately	
   used	
   by	
  
Criminals	
  for	
  robbing	
  and	
  geSng	
  away.	
  
	
  
Aneek	
  R.	
  Haque	
  
Crime	
  2.0	
  
Fast	
  forward	
  a	
  100	
  years,	
  	
  
Enter	
  the	
  computer	
  age	
  
And	
  voila,	
  Crime	
  2.0	
  is	
  here	
  
i.e.	
  High	
  tech	
  crime	
  using	
  
Computers	
  &	
  computer	
  
Networks.	
  
Aneek	
  R.	
  Haque	
  
A cyber-crime is estimated to take place every
20 seconds...	
  	
  
	
  
	
  
	
  
	
  
	
  
Over 500,000 web pages contain some form of
hacker tool	
  	
  
Aneek	
  R.	
  Haque	
  
What is Cyber crime: Definition (1)
Council of Europe
	
  •  Criminal offences committed against or
with the help of computer networks
•  Offence against the confidentiality, integrity
and availability of computer data and
systems.	
  
Aneek	
  R.	
  Haque	
  
What is Cyber crime: Definition (2)
Cyber Crime Convention
	
  •  Offences against computer data and
systems
- Illegal access
- Illegal interception
- Data interference
- System interference
- Misuse of devices
	
  
Aneek	
  R.	
  Haque	
  
What is Cyber crime : Definition (3)	
  	
  
•  General	
  crimes	
  by	
  using	
  new	
  technologies	
  
	
   	
  -­‐	
  Defama[on	
  
•  New	
  crimes	
  using	
  Internet-­‐based	
  
technologies	
  
	
   	
  -­‐	
  Fraud	
  on	
  on-­‐line	
  trade	
  
•  A9acks	
  upon	
  the	
  computer	
  systems	
  and	
  
networks	
  themselves	
  
	
   	
  -­‐	
  Illegal	
  access	
  
	
   Aneek	
  R.	
  Haque	
  
A	
  characterisa[on	
  of	
  cybercrime	
  &	
  
cyber	
  security	
  incidents	
  	
  
Primary	
  scope	
  	
  
of	
  interest	
  for	
  	
  
n/g	
  CERTs	
  	
  
	
  	
  
Non	
  inten[onal	
  ICT	
  security	
  incidents	
  	
  
Disasters;	
  Technical	
  failure;	
  Human	
  error	
  
	
  	
  
Inten=onal	
  ICT	
  a9acks	
  against	
  the	
  confiden=ality,	
  availability	
  and	
  
integrity	
  of	
  ICT	
  (“Type	
  I”)	
  
State	
  Actors;	
  Non-­‐state	
  actors;	
  Terrorists;	
  Criminals;	
  A^acks	
  against	
  CIIP;	
  
Other	
  a^acks	
  against	
  ICT	
  
	
  	
  
Primary	
  scope	
  of	
  
interest	
  for	
  LEAs	
  
	
  	
  
Offences	
  by	
  means	
  of	
  ICT	
  (“Type	
  II”)	
  
Fraud;	
  Child	
  Exploita[on;	
  IPR	
  the`	
  
	
  	
  
Offences	
  involving	
  ICT	
  (“Type	
  III”)	
  
Any	
  offence	
  where	
  electronic	
  evidence	
  is	
  involved	
  	
  
	
  	
  
Aneek	
  R.	
  Haque	
  
Bangladesh	
  Cyber	
  law	
  
•  Informa[on	
  and	
  Communica[on	
  Technology	
  Act	
  
2006	
  
	
  
•  Pornography	
  Control	
  Act	
  2012	
  
	
  
•  Indecent	
  Adver[sement	
  Prohibi[on	
  Act	
  1963	
  
•  Bangladesh	
  Telecommunica[on	
  Regula[on	
  Act	
  
2001	
  
	
  
	
  
Aneek	
  R.	
  Haque	
  
ICT	
  Act	
  2006	
  
Sec[on	
  54	
  to	
  67	
  of	
  the	
  ICT	
  Act	
  2006	
  describe	
  the	
  cybercrimes	
  
both	
  civil	
  and	
  criminal	
  ma^ers.	
  The	
  followings	
  shall	
  be	
  treated	
  
as	
  crime;	
  
•  Unauthorized	
  copying,	
  extrac[ng	
  and	
  downloading	
  of	
  any	
  
data,	
  database	
  
•  Introduc[on	
  of	
  virus	
  
•  	
  Damage	
  and	
  disrup[on	
  to	
  computer	
  system	
  and	
  computer	
  
network	
  
•  Denial	
  of	
  access	
  to	
  authorized	
  person	
  to	
  computer	
  
•  Providing	
  assistance	
  to	
  make	
  possible	
  to	
  commit	
  to	
  crime	
  
•  Hacking	
  with	
  computer	
  system	
  
Aneek	
  R.	
  Haque	
  
ICT	
  Act	
  2006	
  
•  Tampering	
  computer	
  source	
  documents	
  
•  Electronic	
  forger	
  for	
  the	
  purpose	
  of	
  chea[ng	
  and	
  harming	
  
reputa[on	
  
•  Using	
  a	
  forged	
  Electronic	
  record	
  
•  Publica[on	
  of	
  digital	
  signature	
  cer[ficate	
  for	
  the	
  fraudulent	
  
purpose	
  
•  Confisca[on	
  of	
  computer,	
  network	
  etc	
  
•  Publica[on	
  of	
  informa[on	
  which	
  is	
  obscene	
  in	
  electronic	
  form	
  
•  Misrepresenta[on	
  and	
  suppressing	
  material	
  facts	
  for	
  obtaining	
  
digital	
  signature	
  cer[ficate	
  
•  Breach	
  of	
  confiden[ality	
  and	
  privacy	
  
•  Publishing	
  false	
  digital	
  signature	
  cer[ficate	
  
Aneek	
  R.	
  Haque	
  
ICT	
  Act	
  2006	
  
Sec[on	
  57:	
  
•  57.	
   Punishment	
   for	
   publishing	
   fake,	
   obscene	
   or	
   defaming	
  
informa=on	
  in	
  electronic	
  form.-­‐-­‐	
  
•  (1)	
  If	
  any	
  person	
  deliberately	
  publishes	
  or	
  transmits	
  or	
  causes	
  to	
  be	
  
published	
   or	
   transmi^ed	
   in	
   the	
   website	
   or	
   in	
   electronic	
   form	
   any	
  
material	
  which	
  is	
  fake	
  and	
  obscene	
  or	
  its	
  effect	
  is	
  such	
  as	
  to	
  tend	
  to	
  
deprave	
   and	
   corrupt	
   persons	
   who	
   are	
   likely,	
   having	
   regard	
   to	
   all	
  
relevant	
  circumstances,	
  to	
  read,	
  see	
  or	
  hear	
  the	
  ma^er	
  contained	
  or	
  
embodied	
   in	
   it,	
   or	
   causes	
   to	
   deteriorate	
   or	
   creates	
   possibility	
   to	
  
deteriorate	
   law	
   and	
   order,	
   prejudice	
   the	
   image	
   of	
   the	
   State	
   or	
  
person	
   or	
   causes	
   to	
   hurt	
   or	
   may	
   hurt	
   religious	
   belief	
   or	
   ins[gate	
  
against	
  any	
  person	
  or	
  organiza[on,	
  then	
  this	
  ac[vity	
  of	
  his	
  will	
  be	
  
regarded	
  as	
  an	
  offence.	
  
•  (2)	
  Whoever	
  commits	
  offence	
  under	
  sub-­‐sec[on	
  (1)	
  of	
  this	
  sec[on	
  
he	
   shall	
   be	
   punishable	
   with	
   imprisonment	
   for	
   a	
   term	
   which	
   may	
  
extend	
  to	
  ten	
  years	
  and	
  with	
  fine	
  which	
  may	
  extend	
  to	
  Taka	
  one	
  
crore.	
  
Aneek	
  R.	
  Haque	
  
Pornography	
  Control	
  Act	
  2012	
  
Pornography	
  is	
  any	
  dialogue,	
  ac[ng,	
  posture,	
  unclothed	
  
or	
   par[ally	
   unclothed	
   dance	
   in	
   cinema,	
   video,	
  
photography,	
   graphics,	
   audio-­‐visual	
   image	
   or	
   imagery	
  
otherwise	
  captured	
  and	
  displayable,	
  which	
  causes	
  sexual	
  
arousal	
   and	
   has	
   no	
   ar[s[c	
   or	
   educa[onal	
   value.	
   Also,	
  
such	
  books,	
  magazines,	
  sculptures,	
  cartoons	
  and	
  leaflets	
  
which	
  cause	
  the	
  sexual	
  arousal,	
  and	
  their	
  nega[ves	
  and	
  
so`	
  copies	
  would	
  also	
  be	
  considered	
  pornography.	
  
	
  
any	
   person	
   convicted	
   under	
   the	
   above	
   men[oned	
  
offences	
   can	
   be	
   sentenced	
   up	
   to	
   7	
   (seven)	
   years	
   of	
  
imprisonment.	
  
Aneek	
  R.	
  Haque	
  
Pornography	
  Control	
  Act	
  2012	
  
The	
   Act	
   has	
   a	
   separate	
   sec[on	
   for	
   child	
  
pornography	
  and	
  for	
  this	
  act	
  any	
  person	
  below	
  
the	
   age	
   of	
   18	
   is	
   a	
   child	
   and	
   any	
   pornography	
  
recording,	
  pictures	
  with	
  a	
  child	
  being	
  filmed	
  will	
  
carry	
  a	
  sentence	
  of	
  10	
  years	
  imprisonment	
  and	
  
five	
  lac	
  taka	
  fine.	
  Few	
  other	
  feature	
  of	
  the	
  Act	
  is	
  
that	
   it	
   empowers	
   the	
   Court	
   to	
   take	
   expert	
  
opinion/help	
  from	
  IT	
  experts	
  and	
  empowers	
  the	
  
Inves[ga[on	
   Officer	
   to	
   siege	
   or	
   search	
   any	
  
device,	
  book,	
  CD	
  etc.	
  as	
  evidence.	
  
Aneek	
  R.	
  Haque	
  
The	
  Bangladesh	
  Scenario	
  
•  Malicious	
  Mail	
  to	
  Foreign	
  Diploma[c	
  Mission	
  
and	
  Other	
  VIPs	
  
•  Pornography	
  
•  Use	
  of	
  e-­‐mail	
  for	
  illegal	
  ac[vi[es	
  
•  Use	
  of	
  Internet	
  for	
  transmiSng	
  false	
  and	
  
malicious	
  informa[on	
  
•  Use	
  of	
  Internet	
  for	
  Pros[tu[on	
  
•  Use	
  of	
  Internet	
  for	
  Women	
  &	
  Child	
  Trafficking	
  
	
  
Aneek	
  R.	
  Haque	
  
Illegal	
  Pros[tu[on	
  Promo[on	
  Sites	
  	
  
from	
  Bangladesh	
  
n  Search	
  result	
  from	
  Google	
  
n  Bangladesh	
  Escorts:	
  Free	
  Personals	
  and	
  Reviews	
  of	
  Bangladesh	
  ...	
  
n  Welcome	
  to	
  Bangladesh	
  Escort	
  Agency.	
  It	
  is	
  an	
  adult	
  entertainment	
  
agency	
  of	
  Dhaka,	
  Bangladesh	
  that	
  specializes	
  in	
  providing	
  
personalized	
  fun	
  and	
  ...	
  
www.sexyescortads.com/escorts/female/bangladesh/	
  -­‐	
  61k	
  -­‐	
  
Cached	
  -­‐	
  Similar	
  pages	
  
n  Dhaka	
  Escorts	
  
n  escort	
  girls	
  available	
  for	
  you	
  in	
  Dhaka,	
  Bangladesh.	
  ...	
  Hey	
  this	
  is	
  
Rafi	
  from	
  Dhaka	
  Bangladesh.Independent	
  male	
  escort	
  for	
  the	
  
lonely,	
  bored	
  of	
  life	
  ladies	
  ...	
  
www.sexyescortads.com/search/Dhaka_escorts.html	
  -­‐	
  34k	
  -­‐	
  
Cached	
  -­‐	
  Similar	
  pages	
  
	
  
Aneek	
  R.	
  Haque	
  
Illegal	
  Pros[tu[on	
  Promo[on	
  Sites	
  	
  from	
  
Bangladesh	
  
	
  
•  Search	
  results(2115	
  profiles	
  in	
  BANGLADESH)	
  	
  
•  h^p://www.hornymatches.com/geolist.php	
  	
  
•  ISHURDI	
  BANGLADESH	
  Independent	
  Escorts,	
  Escort	
  
Agency,	
  and	
  Massage	
  ...	
  
•  ISHURDI	
  SexyDepo.com	
  has	
  independent	
  escorts	
  and	
  
massage	
  providers	
  in	
  Bangladesh	
  and	
  Interna[onal.	
  
We	
  have	
  several	
  regions	
  in	
  Barisal,	
  Bhola,	
  Bogra,	
  ...	
  
maine.topescortreview.com/html/area/Bangladesh/	
  
Bangladesh-­‐ISHURDI-­‐escorts-­‐escort-­‐massage-­‐incall-­‐
outcall.htm	
  -­‐	
  17k	
  -­‐	
  Cached	
  -­‐	
  Similar	
  pages	
  	
  
	
  
And	
  to	
  say	
  nothing	
  about	
  the	
  Facebook	
  pages	
  and	
  groups	
  
etc.	
  
Aneek	
  R.	
  Haque	
  
ISP’s	
  Role	
  &	
  Responsibility	
  
ISPs	
   have	
   a	
   unique	
   posi[on	
   and	
   possibility	
   of	
  
promo[ng	
   the	
   exercise	
   of	
   and	
   respect	
   for	
  
human	
   rights	
   and	
   fundamental	
   freedoms	
   &	
  
prevent	
  the	
  offences	
  above.	
  
as	
   a	
   general	
   rule	
   intermediaries	
   in	
   the	
  
communica[on	
  chain	
  should	
  not	
  be	
  held	
  liable	
  
for	
   content	
   transmi^ed	
   through	
   their	
   services,	
  
except	
  in	
  certain	
  limited	
  circumstances.	
  
Aneek	
  R.	
  Haque	
  
•  Ensure	
  that	
  your	
  customers	
  have	
  access	
  to	
  informa[on	
  about	
  poten[al	
  risks	
  
to	
  their	
  rights,	
  security	
  and	
  privacy	
  online,	
  including	
  informa[on	
  on	
  what	
  
you	
  are	
  doing	
  to	
  help	
  your	
  customers	
  counter	
  those	
  risks.	
  Provide	
  
informa[on	
  about	
  available	
  tools	
  and	
  so`ware	
  that	
  your	
  customers	
  may	
  
use	
  to	
  protect	
  themselves	
  further.	
  
	
  
•  Provide	
  informa[on	
  or	
  link	
  to	
  informa[on	
  about	
  risks	
  of	
  encountering	
  or	
  
contribu[ng	
  to	
  the	
  dissemina[on	
  of	
  illegal	
  content	
  on	
  the	
  Internet	
  as	
  well	
  
as	
  the	
  risks	
  for	
  children	
  of	
  being	
  exposed	
  to	
  harmful	
  content	
  or	
  behaviour	
  
when	
  they	
  are	
  online.	
  
	
  
•  If	
  appropriate,	
  explain	
  what	
  you	
  are	
  doing	
  to	
  protect	
  your	
  customers	
  against	
  
security	
  risks.	
  Such	
  risks	
  may	
  concern	
  data	
  integrity	
  (viruses,	
  worms,	
  trojans,	
  
etc.),	
  confiden[ality	
  (e.g.	
  when	
  making	
  transac[ons	
  online),	
  network	
  
security	
  or	
  other	
  risks	
  (e.g.	
  phishing).	
  
•  Raise	
  your	
  customers’	
  awareness	
  or	
  link	
  your	
  customers	
  to	
  further	
  informa[on	
  on	
  
how	
  to	
  counter	
  risks	
  to	
  their	
  security	
  on	
  the	
  Internet.	
  
Aneek	
  R.	
  Haque	
  
•  Make	
  sure	
  any	
  filtering	
  or	
  blocking	
  of	
  services	
  carried	
  out	
  is	
  legi[mate,	
  propor[onal	
  
and	
  transparent	
  to	
  your	
  customers	
  
•  In	
  respect	
  of	
  filtering,	
  blocking	
  or	
  removal	
  of	
  illegal	
  content,	
  you	
  should	
  do	
  so	
  only	
  
a`er	
  a	
  verifica[on	
  of	
  the	
  illegality	
  of	
  the	
  content,	
  for	
  instance	
  by	
  contac[ng	
  the	
  
competent	
  law	
  enforcement	
  authori[es.	
  
•  Inform	
   your	
   customers	
   about	
   your	
   general	
   policy	
   dealing	
   with	
   complaints	
   on	
  
alleged	
  illegal	
  content	
  you	
  might	
  be	
  hos[ng.	
  Give	
  clear	
  indica[ons	
  to	
  the	
  general	
  
public	
   on	
   how	
   to	
   complain,	
   and	
   to	
   your	
   customers	
   on	
   how	
   to	
   respond	
   to	
   such	
  
complaints.	
  
•  Although	
  you	
  will	
  not	
  be	
  expected	
  to	
  provide	
  advice	
  on	
  what	
  content	
  or	
  behaviours	
  
are	
   illegal	
   and/or	
   harmful,	
   you	
   could	
   usefully	
   give	
   informa[on	
   to	
   teachers	
   and	
  
parents	
  on	
  risks	
  to	
  children	
  when	
  using	
  applica[on	
  services	
  provided	
  by	
  you	
  (chat	
  
rooms,	
   message	
   boards	
   etc.),	
   in	
   par[cular	
   the	
   risks	
   of	
   encountering	
   harmful	
  
content	
  or	
  behaviour	
  (grooming,	
  bullying,	
  etc.)	
  when	
  using	
  your	
  services.	
  
•  If	
  you	
  provide	
  content	
  services	
  to	
  your	
  customers,	
  such	
  as	
  web	
  based	
  informa[on	
  
or	
   news	
   services,	
   consider	
   offering	
   users	
   a	
   right	
   of	
   reply	
   allowing	
   the	
   rapid	
  
correc[on	
  of	
  incorrect	
  informa[on	
  
	
   Aneek	
  R.	
  Haque	
  
•  Establish	
   appropriate	
   procedures	
   and	
   use	
   available	
   technologies	
   to	
   protect	
   the	
  
privacy	
  of	
  users	
  and	
  secrecy	
  of	
  content	
  and	
  traffic	
  data,	
  especially	
  by	
  ensuring	
  data	
  
integrity,	
  confiden[ality	
  as	
  well	
  as	
  physical	
  and	
  logical	
  security	
  of	
  the	
  network	
  and	
  
of	
   the	
   services	
   provided	
   over	
   the	
   network.	
   The	
   level	
   of	
   protec[on	
   should	
   be	
  
adapted	
  to	
  the	
  type	
  of	
  service	
  you	
  provide	
  accordingly.	
  
•  Offer	
   further	
   informa[on	
   and	
   guidance	
   to	
   your	
   customers	
   about	
   the	
   technical	
  
means	
   they	
   may	
   use	
   to	
   protect	
   themselves	
   against	
   security	
   risks	
   to	
   data	
   and	
  
communica[ons	
   (such	
   as	
   an[-­‐spyware	
   so`ware	
   tools,	
   firewalls,	
   encryp[on	
  
technology	
  or	
  digital	
  signatures,	
  etc.).	
  
•  When	
  ac[ng	
  with	
  regard	
  to	
  the	
  communica[ons	
  of	
  users	
  (for	
  example	
  by	
  allowing	
  
the	
   intercep[on	
   or	
   monitoring	
   of	
   users’	
   e-­‐mails)	
   such	
   ac[on	
   should	
   only	
   be	
  
undertaken	
  in	
  case	
  of	
  a	
  legal	
  duty	
  to	
  do	
  so,	
  on	
  specific	
  orders	
  or	
  instruc[ons	
  from	
  a	
  
competent	
  public	
  authority	
  made	
  in	
  accordance	
  with	
  the	
  law.	
  
•  Do	
   not	
   to	
   reveal	
   the	
   iden[ty	
   of	
   users,	
   their	
   traffic	
   data	
   or	
   the	
   content	
   of	
   data	
  
accessed	
  by	
  them	
  to	
  a	
  third	
  party,	
  unless	
  under	
  a	
  legal	
  duty	
  to	
  do	
  so	
  or	
  following	
  
specific	
   orders	
   or	
   instruc[ons	
   from	
   the	
   competent	
   public	
   authority	
   made	
   in	
  
accordance	
  with	
  the	
  law.	
  
Aneek	
  R.	
  Haque	
  
•  Inform	
  your	
  customers	
  in	
  which	
  circumstances	
  you	
  are	
  under	
  a	
  legal	
  duty	
  to	
  
reveal	
   their	
   iden[fica[on,	
   connec[on	
   or	
   traffic	
   data	
   by	
   request	
   from	
   law	
  
enforcement	
  agencies	
  etc.	
  Such	
  informa[on	
  could	
  par[cularly	
  be	
  provided	
  by	
  
associa[ons	
  of	
  ISPs	
  to	
  whom	
  you	
  might	
  want	
  to	
  link.	
  If	
  you	
  receive	
  a	
  request	
  to	
  
disclose	
  such	
  data,	
  make	
  sure	
  to	
  check	
  the	
  authen[city	
  of	
  the	
  request	
  and	
  that	
  
it	
  is	
  made	
  by	
  a	
  competent	
  authority	
  in	
  accordance	
  with	
  the	
  law.	
  
•  Do	
  not	
  collect,	
  process	
  or	
  store	
  data	
  about	
  users,	
  unless	
  this	
  is	
  necessary	
  for	
  
explicit,	
  specified	
  and	
  legi[mate	
  purposes	
  in	
  accordance	
  with	
  data	
  protec[on	
  
laws.	
  Do	
  not	
  store	
  data	
  for	
  longer	
  than	
  required	
  by	
  law	
  or	
  than	
  is	
  necessary	
  to	
  
achieve	
  the	
  purpose	
  of	
  processing	
  of	
  the	
  data.	
  
•  Do	
   not	
   use	
   personal	
   data	
   on	
   users	
   for	
   your	
   own	
   promo[onal	
   or	
   marke[ng	
  
purposes	
  unless	
  the	
  user	
  concerned,	
  a`er	
  having	
  been	
  informed,	
  has	
  given	
  his	
  
or	
  her	
  consent	
  and	
  this	
  consent	
  has	
  not	
  been	
  revoked.	
  Do	
  not	
  make	
  personal	
  
data	
   publicly	
   available!	
   Such	
   publica[on	
   may	
   infringe	
   other	
   people’s	
   privacy	
  
and	
  may	
  also	
  be	
  prohibited	
  by	
  law.	
  
Aneek	
  R.	
  Haque	
  
Aneek	
  R.	
  Haque	
  

More Related Content

What's hot

Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
Mark Peralta
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Jahid Khan Rahat
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
Bangladesh Network Operators Group
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
ITM UNIVERSITY, RAIPUR- SCHOOL OF LAW
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
Karnika Seth
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
Orko Abir
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
Vishni Ganepola
 
Software piracy
Software piracySoftware piracy
Software piracy
K. M. Rokonuzzaman
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Piracy
PiracyPiracy
Piracy
Manasa Mona
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
Apostolos Syropoulos
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
armaexen
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
Bank Alfalah Limited
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 

What's hot (20)

Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Piracy
PiracyPiracy
Piracy
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 

Viewers also liked

Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
Bangladesh Network Operators Group
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
Md. Atiqur Rahman
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
Bangladesh Network Operators Group
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
India Brand Equity Foundation
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
Bangladesh Network Operators Group
 
ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
Bangladesh Network Operators Group
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
Bangladesh Network Operators Group
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
Bangladesh Network Operators Group
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
Bangladesh Network Operators Group
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
Roberto Polillo
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
Team Pramkaew
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011
ResearchInChina
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Fakrul Alam
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
Ateeq Ur Rehman
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
Mike Crabb
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Viewers also liked (19)

Internet Development Experiences and Lessons
Internet Development Experiences and Lessons Internet Development Experiences and Lessons
Internet Development Experiences and Lessons
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
 
History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet History and Evolution of Bangladesh Internet
History and Evolution of Bangladesh Internet
 
India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013India :Telecommunication Sector Report_August 2013
India :Telecommunication Sector Report_August 2013
 
IP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple CalculationIP Transit : Simple Math - Simple Calculation
IP Transit : Simple Math - Simple Calculation
 
ISP status in Bangladesh 2016
ISP status in Bangladesh 2016ISP status in Bangladesh 2016
ISP status in Bangladesh 2016
 
Awareness of Children Internet Addiction
Awareness of Children Internet Addiction Awareness of Children Internet Addiction
Awareness of Children Internet Addiction
 
Broadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPABBroadband for Digital Bangladesh & recommendation from ISPAB
Broadband for Digital Bangladesh & recommendation from ISPAB
 
Fast Convergence Techniques
Fast Convergence TechniquesFast Convergence Techniques
Fast Convergence Techniques
 
Internet for Development
Internet for DevelopmentInternet for Development
Internet for Development
 
Children of the internet
Children of the internetChildren of the internet
Children of the internet
 
Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011Africa telecom market report, 2010 2011
Africa telecom market report, 2010 2011
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Design and Development of Internet System for Residential Smart-Grid
Design and Development of Internet System for Residential  Smart-Grid Design and Development of Internet System for Residential  Smart-Grid
Design and Development of Internet System for Residential Smart-Grid
 
Introduction to Development for the Internet
Introduction to Development for the InternetIntroduction to Development for the Internet
Introduction to Development for the Internet
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to Cyber Security law in Bangladesh

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
TheMuslimLady
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
Ayesha Majid
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
NISHAGPARDESHI
 
Digital law
Digital lawDigital law
Digital law
makylahh
 
Digital law
Digital lawDigital law
Digital law
makylahh
 
Digital law
Digital lawDigital law
Digital law
Alieyn_
 
Digital law
Digital lawDigital law
Digital law
CAQUES01
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
ParasSehgal12
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
mhavzgreda1
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shivu1234
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
RomanoGabrillo1
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
Olusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
kamalbhatt9229
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
ShazidNawasShovon
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Sanjith261
 

Similar to Cyber Security law in Bangladesh (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 

More from Bangladesh Network Operators Group

Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
Bangladesh Network Operators Group
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
Bangladesh Network Operators Group
 
Data Centre Design Consideration for Bangladesh
Data Centre Design Consideration for BangladeshData Centre Design Consideration for Bangladesh
Data Centre Design Consideration for Bangladesh
Bangladesh Network Operators Group
 
DNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem BreakdownDNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem Breakdown
Bangladesh Network Operators Group
 
Team Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public servicesTeam Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public services
Bangladesh Network Operators Group
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
Bangladesh Network Operators Group
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
Bangladesh Network Operators Group
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
Bangladesh Network Operators Group
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
Bangladesh Network Operators Group
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Bangladesh Network Operators Group
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Bangladesh Network Operators Group
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
Bangladesh Network Operators Group
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
Bangladesh Network Operators Group
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
Bangladesh Network Operators Group
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
Bangladesh Network Operators Group
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
Bangladesh Network Operators Group
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
Bangladesh Network Operators Group
 

More from Bangladesh Network Operators Group (20)

Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)Maximizing Network Efficiency with Large Language Models (LLM)
Maximizing Network Efficiency with Large Language Models (LLM)
 
Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18Geolocation and Geofeed Implementation bdNOG18
Geolocation and Geofeed Implementation bdNOG18
 
Data Centre Design Consideration for Bangladesh
Data Centre Design Consideration for BangladeshData Centre Design Consideration for Bangladesh
Data Centre Design Consideration for Bangladesh
 
DNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem BreakdownDNS Troubleshooting - Assumptions and Problem Breakdown
DNS Troubleshooting - Assumptions and Problem Breakdown
 
Team Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public servicesTeam Cymru Community Services,Overview of all public services
Team Cymru Community Services,Overview of all public services
 
Open Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using GraylogOpen Source TCP or Netflow Log Server Using Graylog
Open Source TCP or Netflow Log Server Using Graylog
 
Enhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfedEnhancing seamless access using TIGERfed
Enhancing seamless access using TIGERfed
 
Software Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical ImplementationsSoftware Defined Networking, Concepts and Practical Implementations
Software Defined Networking, Concepts and Practical Implementations
 
IPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security ConsiderationsIPv6 Deployment Planning and Security Considerations
IPv6 Deployment Planning and Security Considerations
 
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and CephAccelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
Accelerating Hyper-Converged Enterprise Virtualization using Proxmox and Ceph
 
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJRecent IRR changes by Yoshinobu Matsuzaki, IIJ
Recent IRR changes by Yoshinobu Matsuzaki, IIJ
 
Fact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in BangladeshFact Sheets : Network Status in Bangladesh
Fact Sheets : Network Status in Bangladesh
 
AI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the PyramidAI Driven Wi-Fi for the Bottom of the Pyramid
AI Driven Wi-Fi for the Bottom of the Pyramid
 
IPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCTIPv6 Security Overview by QS Tahmeed, APNIC RCT
IPv6 Security Overview by QS Tahmeed, APNIC RCT
 
Network eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life Product
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
IPv6 Deployment in South Asia 2022
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
RPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in Bangladesh
 
An Overview about open UDP Services
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP Services
 

Recently uploaded

How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdfHow-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
Dolphin Data Lab
 
AWS Networking Basic , tanapat limsaiprom
AWS Networking Basic , tanapat limsaipromAWS Networking Basic , tanapat limsaiprom
AWS Networking Basic , tanapat limsaiprom
ธนาพัฒน์ ลิ้มสายพรหม
 
Dewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show caseDewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show case
DEWANSTUDIO.COM
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Thiên Đường Tình Yêu
 
Trading Strategy for London silver bullet
Trading Strategy for London silver bulletTrading Strategy for London silver bullet
Trading Strategy for London silver bullet
OkgatoSemadi1
 
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
ffg01100
 
Web development Platform Constraints.pptx
Web development Platform Constraints.pptxWeb development Platform Constraints.pptx
Web development Platform Constraints.pptx
ssuser2f6682
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
RohitRoshanBengROHIT
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
Zsolt Nemeth
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
ffg01100
 
Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)
Kashyap J
 
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdfTop 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Krishna L
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
cenocb
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
adelewhite125
 
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaipromInformation Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
TanapatLimsaiprom1
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
mahigarg2024#G05
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
byubyu7
 
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
ffg01100
 
Effective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptxEffective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptx
AirtoryInc
 

Recently uploaded (20)

How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdfHow-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
How-to-Diagnose-Hard-Drives-by-DFL-DDP-2024.pdf
 
AWS Networking Basic , tanapat limsaiprom
AWS Networking Basic , tanapat limsaipromAWS Networking Basic , tanapat limsaiprom
AWS Networking Basic , tanapat limsaiprom
 
Dewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show caseDewanstudio Project Portfolio 2023 show case
Dewanstudio Project Portfolio 2023 show case
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
 
Trading Strategy for London silver bullet
Trading Strategy for London silver bulletTrading Strategy for London silver bullet
Trading Strategy for London silver bullet
 
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
 
Web development Platform Constraints.pptx
Web development Platform Constraints.pptxWeb development Platform Constraints.pptx
Web development Platform Constraints.pptx
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
 
2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage2023. Archive - Gigabajtos selfpublisher homepage
2023. Archive - Gigabajtos selfpublisher homepage
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
 
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
202254.com全网最高清影视香蕉影视,热门电影推荐,热门电视剧在线观看,免费电影,电影在线,在线观看。球华人在线電視劇,免费点播,免费提供最新高清的...
 
Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)Quiz Quiz Hota Hai (School Quiz 2018-19)
Quiz Quiz Hota Hai (School Quiz 2018-19)
 
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdfTop 50 Telephone Conversation Sample Examples For IT Industries.pdf
Top 50 Telephone Conversation Sample Examples For IT Industries.pdf
 
UMN degree offer diploma Transcript
UMN degree offer diploma TranscriptUMN degree offer diploma Transcript
UMN degree offer diploma Transcript
 
Why Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAEWhy Your Business Needs a Professional Web Design Company UAE
Why Your Business Needs a Professional Web Design Company UAE
 
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaipromInformation Systems Auditing, Controls and Assurance , tanapat limsaiprom
Information Systems Auditing, Controls and Assurance , tanapat limsaiprom
 
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
Girls Call Mahipalpur 000XX00000 Provide Best And Top Girl Service And No1 in...
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
 
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
202254.com香蕉影视,在线观看《我才不要和你做朋友呢》在线观看最新电影,香蕉影视在线观看《我才不要和你做朋友呢》在线观看高清电影
 
Effective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptxEffective Tips for Creating the Best Rich Media Ads .pptx
Effective Tips for Creating the Best Rich Media Ads .pptx
 

Cyber Security law in Bangladesh

  • 1. CYBER  SECURITY  IN   BANGLADESH   ANEEK  R.  HAQUE   BARRISTER  AT  LAW   ADVOCATE,  SUPREME  COURT   BANGLADESH  
  • 2. Crime  1.0   In  1908,  Henry  Ford  brought  affordable  cars  and   this   technology   was   immediately   used   by   Criminals  for  robbing  and  geSng  away.     Aneek  R.  Haque  
  • 3. Crime  2.0   Fast  forward  a  100  years,     Enter  the  computer  age   And  voila,  Crime  2.0  is  here   i.e.  High  tech  crime  using   Computers  &  computer   Networks.   Aneek  R.  Haque  
  • 4. A cyber-crime is estimated to take place every 20 seconds...               Over 500,000 web pages contain some form of hacker tool     Aneek  R.  Haque  
  • 5. What is Cyber crime: Definition (1) Council of Europe  •  Criminal offences committed against or with the help of computer networks •  Offence against the confidentiality, integrity and availability of computer data and systems.   Aneek  R.  Haque  
  • 6. What is Cyber crime: Definition (2) Cyber Crime Convention  •  Offences against computer data and systems - Illegal access - Illegal interception - Data interference - System interference - Misuse of devices   Aneek  R.  Haque  
  • 7. What is Cyber crime : Definition (3)     •  General  crimes  by  using  new  technologies      -­‐  Defama[on   •  New  crimes  using  Internet-­‐based   technologies      -­‐  Fraud  on  on-­‐line  trade   •  A9acks  upon  the  computer  systems  and   networks  themselves      -­‐  Illegal  access     Aneek  R.  Haque  
  • 8. A  characterisa[on  of  cybercrime  &   cyber  security  incidents     Primary  scope     of  interest  for     n/g  CERTs         Non  inten[onal  ICT  security  incidents     Disasters;  Technical  failure;  Human  error       Inten=onal  ICT  a9acks  against  the  confiden=ality,  availability  and   integrity  of  ICT  (“Type  I”)   State  Actors;  Non-­‐state  actors;  Terrorists;  Criminals;  A^acks  against  CIIP;   Other  a^acks  against  ICT       Primary  scope  of   interest  for  LEAs       Offences  by  means  of  ICT  (“Type  II”)   Fraud;  Child  Exploita[on;  IPR  the`       Offences  involving  ICT  (“Type  III”)   Any  offence  where  electronic  evidence  is  involved         Aneek  R.  Haque  
  • 9. Bangladesh  Cyber  law   •  Informa[on  and  Communica[on  Technology  Act   2006     •  Pornography  Control  Act  2012     •  Indecent  Adver[sement  Prohibi[on  Act  1963   •  Bangladesh  Telecommunica[on  Regula[on  Act   2001       Aneek  R.  Haque  
  • 10. ICT  Act  2006   Sec[on  54  to  67  of  the  ICT  Act  2006  describe  the  cybercrimes   both  civil  and  criminal  ma^ers.  The  followings  shall  be  treated   as  crime;   •  Unauthorized  copying,  extrac[ng  and  downloading  of  any   data,  database   •  Introduc[on  of  virus   •   Damage  and  disrup[on  to  computer  system  and  computer   network   •  Denial  of  access  to  authorized  person  to  computer   •  Providing  assistance  to  make  possible  to  commit  to  crime   •  Hacking  with  computer  system   Aneek  R.  Haque  
  • 11. ICT  Act  2006   •  Tampering  computer  source  documents   •  Electronic  forger  for  the  purpose  of  chea[ng  and  harming   reputa[on   •  Using  a  forged  Electronic  record   •  Publica[on  of  digital  signature  cer[ficate  for  the  fraudulent   purpose   •  Confisca[on  of  computer,  network  etc   •  Publica[on  of  informa[on  which  is  obscene  in  electronic  form   •  Misrepresenta[on  and  suppressing  material  facts  for  obtaining   digital  signature  cer[ficate   •  Breach  of  confiden[ality  and  privacy   •  Publishing  false  digital  signature  cer[ficate   Aneek  R.  Haque  
  • 12. ICT  Act  2006   Sec[on  57:   •  57.   Punishment   for   publishing   fake,   obscene   or   defaming   informa=on  in  electronic  form.-­‐-­‐   •  (1)  If  any  person  deliberately  publishes  or  transmits  or  causes  to  be   published   or   transmi^ed   in   the   website   or   in   electronic   form   any   material  which  is  fake  and  obscene  or  its  effect  is  such  as  to  tend  to   deprave   and   corrupt   persons   who   are   likely,   having   regard   to   all   relevant  circumstances,  to  read,  see  or  hear  the  ma^er  contained  or   embodied   in   it,   or   causes   to   deteriorate   or   creates   possibility   to   deteriorate   law   and   order,   prejudice   the   image   of   the   State   or   person   or   causes   to   hurt   or   may   hurt   religious   belief   or   ins[gate   against  any  person  or  organiza[on,  then  this  ac[vity  of  his  will  be   regarded  as  an  offence.   •  (2)  Whoever  commits  offence  under  sub-­‐sec[on  (1)  of  this  sec[on   he   shall   be   punishable   with   imprisonment   for   a   term   which   may   extend  to  ten  years  and  with  fine  which  may  extend  to  Taka  one   crore.   Aneek  R.  Haque  
  • 13. Pornography  Control  Act  2012   Pornography  is  any  dialogue,  ac[ng,  posture,  unclothed   or   par[ally   unclothed   dance   in   cinema,   video,   photography,   graphics,   audio-­‐visual   image   or   imagery   otherwise  captured  and  displayable,  which  causes  sexual   arousal   and   has   no   ar[s[c   or   educa[onal   value.   Also,   such  books,  magazines,  sculptures,  cartoons  and  leaflets   which  cause  the  sexual  arousal,  and  their  nega[ves  and   so`  copies  would  also  be  considered  pornography.     any   person   convicted   under   the   above   men[oned   offences   can   be   sentenced   up   to   7   (seven)   years   of   imprisonment.   Aneek  R.  Haque  
  • 14. Pornography  Control  Act  2012   The   Act   has   a   separate   sec[on   for   child   pornography  and  for  this  act  any  person  below   the   age   of   18   is   a   child   and   any   pornography   recording,  pictures  with  a  child  being  filmed  will   carry  a  sentence  of  10  years  imprisonment  and   five  lac  taka  fine.  Few  other  feature  of  the  Act  is   that   it   empowers   the   Court   to   take   expert   opinion/help  from  IT  experts  and  empowers  the   Inves[ga[on   Officer   to   siege   or   search   any   device,  book,  CD  etc.  as  evidence.   Aneek  R.  Haque  
  • 15. The  Bangladesh  Scenario   •  Malicious  Mail  to  Foreign  Diploma[c  Mission   and  Other  VIPs   •  Pornography   •  Use  of  e-­‐mail  for  illegal  ac[vi[es   •  Use  of  Internet  for  transmiSng  false  and   malicious  informa[on   •  Use  of  Internet  for  Pros[tu[on   •  Use  of  Internet  for  Women  &  Child  Trafficking     Aneek  R.  Haque  
  • 16. Illegal  Pros[tu[on  Promo[on  Sites     from  Bangladesh   n  Search  result  from  Google   n  Bangladesh  Escorts:  Free  Personals  and  Reviews  of  Bangladesh  ...   n  Welcome  to  Bangladesh  Escort  Agency.  It  is  an  adult  entertainment   agency  of  Dhaka,  Bangladesh  that  specializes  in  providing   personalized  fun  and  ...   www.sexyescortads.com/escorts/female/bangladesh/  -­‐  61k  -­‐   Cached  -­‐  Similar  pages   n  Dhaka  Escorts   n  escort  girls  available  for  you  in  Dhaka,  Bangladesh.  ...  Hey  this  is   Rafi  from  Dhaka  Bangladesh.Independent  male  escort  for  the   lonely,  bored  of  life  ladies  ...   www.sexyescortads.com/search/Dhaka_escorts.html  -­‐  34k  -­‐   Cached  -­‐  Similar  pages     Aneek  R.  Haque  
  • 17. Illegal  Pros[tu[on  Promo[on  Sites    from   Bangladesh     •  Search  results(2115  profiles  in  BANGLADESH)     •  h^p://www.hornymatches.com/geolist.php     •  ISHURDI  BANGLADESH  Independent  Escorts,  Escort   Agency,  and  Massage  ...   •  ISHURDI  SexyDepo.com  has  independent  escorts  and   massage  providers  in  Bangladesh  and  Interna[onal.   We  have  several  regions  in  Barisal,  Bhola,  Bogra,  ...   maine.topescortreview.com/html/area/Bangladesh/   Bangladesh-­‐ISHURDI-­‐escorts-­‐escort-­‐massage-­‐incall-­‐ outcall.htm  -­‐  17k  -­‐  Cached  -­‐  Similar  pages       And  to  say  nothing  about  the  Facebook  pages  and  groups   etc.   Aneek  R.  Haque  
  • 18. ISP’s  Role  &  Responsibility   ISPs   have   a   unique   posi[on   and   possibility   of   promo[ng   the   exercise   of   and   respect   for   human   rights   and   fundamental   freedoms   &   prevent  the  offences  above.   as   a   general   rule   intermediaries   in   the   communica[on  chain  should  not  be  held  liable   for   content   transmi^ed   through   their   services,   except  in  certain  limited  circumstances.   Aneek  R.  Haque  
  • 19. •  Ensure  that  your  customers  have  access  to  informa[on  about  poten[al  risks   to  their  rights,  security  and  privacy  online,  including  informa[on  on  what   you  are  doing  to  help  your  customers  counter  those  risks.  Provide   informa[on  about  available  tools  and  so`ware  that  your  customers  may   use  to  protect  themselves  further.     •  Provide  informa[on  or  link  to  informa[on  about  risks  of  encountering  or   contribu[ng  to  the  dissemina[on  of  illegal  content  on  the  Internet  as  well   as  the  risks  for  children  of  being  exposed  to  harmful  content  or  behaviour   when  they  are  online.     •  If  appropriate,  explain  what  you  are  doing  to  protect  your  customers  against   security  risks.  Such  risks  may  concern  data  integrity  (viruses,  worms,  trojans,   etc.),  confiden[ality  (e.g.  when  making  transac[ons  online),  network   security  or  other  risks  (e.g.  phishing).   •  Raise  your  customers’  awareness  or  link  your  customers  to  further  informa[on  on   how  to  counter  risks  to  their  security  on  the  Internet.   Aneek  R.  Haque  
  • 20. •  Make  sure  any  filtering  or  blocking  of  services  carried  out  is  legi[mate,  propor[onal   and  transparent  to  your  customers   •  In  respect  of  filtering,  blocking  or  removal  of  illegal  content,  you  should  do  so  only   a`er  a  verifica[on  of  the  illegality  of  the  content,  for  instance  by  contac[ng  the   competent  law  enforcement  authori[es.   •  Inform   your   customers   about   your   general   policy   dealing   with   complaints   on   alleged  illegal  content  you  might  be  hos[ng.  Give  clear  indica[ons  to  the  general   public   on   how   to   complain,   and   to   your   customers   on   how   to   respond   to   such   complaints.   •  Although  you  will  not  be  expected  to  provide  advice  on  what  content  or  behaviours   are   illegal   and/or   harmful,   you   could   usefully   give   informa[on   to   teachers   and   parents  on  risks  to  children  when  using  applica[on  services  provided  by  you  (chat   rooms,   message   boards   etc.),   in   par[cular   the   risks   of   encountering   harmful   content  or  behaviour  (grooming,  bullying,  etc.)  when  using  your  services.   •  If  you  provide  content  services  to  your  customers,  such  as  web  based  informa[on   or   news   services,   consider   offering   users   a   right   of   reply   allowing   the   rapid   correc[on  of  incorrect  informa[on     Aneek  R.  Haque  
  • 21. •  Establish   appropriate   procedures   and   use   available   technologies   to   protect   the   privacy  of  users  and  secrecy  of  content  and  traffic  data,  especially  by  ensuring  data   integrity,  confiden[ality  as  well  as  physical  and  logical  security  of  the  network  and   of   the   services   provided   over   the   network.   The   level   of   protec[on   should   be   adapted  to  the  type  of  service  you  provide  accordingly.   •  Offer   further   informa[on   and   guidance   to   your   customers   about   the   technical   means   they   may   use   to   protect   themselves   against   security   risks   to   data   and   communica[ons   (such   as   an[-­‐spyware   so`ware   tools,   firewalls,   encryp[on   technology  or  digital  signatures,  etc.).   •  When  ac[ng  with  regard  to  the  communica[ons  of  users  (for  example  by  allowing   the   intercep[on   or   monitoring   of   users’   e-­‐mails)   such   ac[on   should   only   be   undertaken  in  case  of  a  legal  duty  to  do  so,  on  specific  orders  or  instruc[ons  from  a   competent  public  authority  made  in  accordance  with  the  law.   •  Do   not   to   reveal   the   iden[ty   of   users,   their   traffic   data   or   the   content   of   data   accessed  by  them  to  a  third  party,  unless  under  a  legal  duty  to  do  so  or  following   specific   orders   or   instruc[ons   from   the   competent   public   authority   made   in   accordance  with  the  law.   Aneek  R.  Haque  
  • 22. •  Inform  your  customers  in  which  circumstances  you  are  under  a  legal  duty  to   reveal   their   iden[fica[on,   connec[on   or   traffic   data   by   request   from   law   enforcement  agencies  etc.  Such  informa[on  could  par[cularly  be  provided  by   associa[ons  of  ISPs  to  whom  you  might  want  to  link.  If  you  receive  a  request  to   disclose  such  data,  make  sure  to  check  the  authen[city  of  the  request  and  that   it  is  made  by  a  competent  authority  in  accordance  with  the  law.   •  Do  not  collect,  process  or  store  data  about  users,  unless  this  is  necessary  for   explicit,  specified  and  legi[mate  purposes  in  accordance  with  data  protec[on   laws.  Do  not  store  data  for  longer  than  required  by  law  or  than  is  necessary  to   achieve  the  purpose  of  processing  of  the  data.   •  Do   not   use   personal   data   on   users   for   your   own   promo[onal   or   marke[ng   purposes  unless  the  user  concerned,  a`er  having  been  informed,  has  given  his   or  her  consent  and  this  consent  has  not  been  revoked.  Do  not  make  personal   data   publicly   available!   Such   publica[on   may   infringe   other   people’s   privacy   and  may  also  be  prohibited  by  law.   Aneek  R.  Haque