This document is the Information and Communication Technology Act of Sri Lanka from 2003. It establishes:
1) A National Committee on Information and Communication Technology to discuss policies and oversee implementation.
2) A Task Force on Information and Communication Technology to prepare an action plan, coordinate implementation, and issue directions.
3) The Information and Communication Technology Agency of Sri Lanka as the executive agency to assist the Task Force and Committee in implementing the national ICT policy.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
The document discusses various aspects of intellectual property, including copyright, trademarks, patents, and databases. It provides definitions and explanations of key concepts such as the different types of intellectual property, the rights they provide, and how intellectual property laws apply in areas like the internet and new technologies. The document is intended to serve as an overview and introduction to intellectual property for non-experts.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
This document summarizes the existing Sri Lankan legal framework regarding cybercrimes. It outlines several key cybercrime offenses recognized under Sri Lankan law, including computer hacking, computer cracking, unauthorized modification of computers, crimes against national security/economy/public order, unlawful acquisition of information, illegal interception of data, and use of unlawful devices. It discusses the elements and penalties for each offense based on provisions in the Computer Crimes Act and other Sri Lankan legislation such as the Intellectual Property Act and Sri Lanka Telecommunications Act.
Virtual reality uses electronic equipment to simulate a 3D environment that can be interacted with, while cyberspace refers to the notional environment where communication over computer networks occurs. Cyberspace can be thought of as a virtual reality where one can navigate computer networks. Cyberspace provides opportunities to reshape society and culture through hidden identities and borderless communication, though some argue its use of spatial metaphors is misleading.
Cyber security & Importance of Cyber SecurityMohammed Adam
Cybersecurity is important to protect online information and systems from cyber threats. It encompasses physical, technical, and environmental security as well as regulations and third parties. As technology and internet usage increases, cyber threats are also growing. Cybersecurity aims to maintain the confidentiality, integrity, and availability of data and systems. It helps secure data from theft, misuse, and viruses. Common cyber threats include viruses, hackers, malware, trojans, and password cracking. Cybersecurity objectives work to prevent unauthorized access to information and ensure information is authentic and accessible by authorized users. Governments and organizations work to address these threats and improve cybersecurity.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
Bangladesh Cyber Security Status in Global PerspectiveFakrul Alam
The document discusses cyber security issues from a global and Bangladeshi perspective. Globally, spam, DDoS attacks, and application layer attacks are increasing concerns. In Bangladesh, many government and private websites have been hacked or defaced by local hacker groups using social media to organize attacks. The country is working to develop its cyber security through digital transformation programs but still faces challenges like lack of monitoring, awareness, and cyber security expertise.
This document discusses cyber security and the need for it. It begins by defining cyber security as the security offered through online services to protect information. It then discusses how security threats are increasing as more people go online. The document covers the meaning of the term "cyber," major security problems like viruses and hackers, and ways to implement and maintain cyber security, such as using strong passwords and firewalls. It concludes by emphasizing that cyber security is everyone's responsibility.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
The document discusses various aspects of intellectual property, including copyright, trademarks, patents, and databases. It provides definitions and explanations of key concepts such as the different types of intellectual property, the rights they provide, and how intellectual property laws apply in areas like the internet and new technologies. The document is intended to serve as an overview and introduction to intellectual property for non-experts.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
This document summarizes the existing Sri Lankan legal framework regarding cybercrimes. It outlines several key cybercrime offenses recognized under Sri Lankan law, including computer hacking, computer cracking, unauthorized modification of computers, crimes against national security/economy/public order, unlawful acquisition of information, illegal interception of data, and use of unlawful devices. It discusses the elements and penalties for each offense based on provisions in the Computer Crimes Act and other Sri Lankan legislation such as the Intellectual Property Act and Sri Lanka Telecommunications Act.
Virtual reality uses electronic equipment to simulate a 3D environment that can be interacted with, while cyberspace refers to the notional environment where communication over computer networks occurs. Cyberspace can be thought of as a virtual reality where one can navigate computer networks. Cyberspace provides opportunities to reshape society and culture through hidden identities and borderless communication, though some argue its use of spatial metaphors is misleading.
Cyber security & Importance of Cyber SecurityMohammed Adam
Cybersecurity is important to protect online information and systems from cyber threats. It encompasses physical, technical, and environmental security as well as regulations and third parties. As technology and internet usage increases, cyber threats are also growing. Cybersecurity aims to maintain the confidentiality, integrity, and availability of data and systems. It helps secure data from theft, misuse, and viruses. Common cyber threats include viruses, hackers, malware, trojans, and password cracking. Cybersecurity objectives work to prevent unauthorized access to information and ensure information is authentic and accessible by authorized users. Governments and organizations work to address these threats and improve cybersecurity.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
Bangladesh Cyber Security Status in Global PerspectiveFakrul Alam
The document discusses cyber security issues from a global and Bangladeshi perspective. Globally, spam, DDoS attacks, and application layer attacks are increasing concerns. In Bangladesh, many government and private websites have been hacked or defaced by local hacker groups using social media to organize attacks. The country is working to develop its cyber security through digital transformation programs but still faces challenges like lack of monitoring, awareness, and cyber security expertise.
This document discusses cyber security and the need for it. It begins by defining cyber security as the security offered through online services to protect information. It then discusses how security threats are increasing as more people go online. The document covers the meaning of the term "cyber," major security problems like viruses and hackers, and ways to implement and maintain cyber security, such as using strong passwords and firewalls. It concludes by emphasizing that cyber security is everyone's responsibility.
What is Software Piracy?
Common Types of Piracy
End User Piracy
Client-Server Overuse
Internet Piracy
Hard-Disk Loading
Software Counterfeiting
Piracy in the World
Most Pirated Medium
Ways to Battle Piracy
Arrests involving Piracy
Summary
End
Cyber crime involves unlawful activities using computers and the internet. The document categorizes cyber crimes as those using computers to attack other computers or as tools to enable real-world crimes. It provides examples of various cyber crimes like hacking, child pornography, viruses, and cyber terrorism. It stresses the importance of cyber security to defend against attacks through prevention, detection and response. The document advises safety tips like using antivirus software, firewalls, and strong passwords. India's cyber laws address both traditional crimes committed online and new crimes defined in the Information Technology Act.
The document discusses ethical hacking, which involves using the same tools and techniques as criminal hackers but in a legal and responsible way to test an organization's security. It defines different types of hackers, the hacking process, and skills required of an ethical hacker. The document also outlines the advantages and disadvantages of ethical hacking, areas for future enhancement, and concludes that keeping systems updated and educating users are important defenses against hacking.
This document is a report on visual effects (VFX) submitted to a professor. It includes a forwarding letter, preface, acknowledgements, synopsis, and table of contents outlining the chapters to come. The introduction provides an overview of VFX in filmmaking and its categories. A brief history of VFX is given, noting its origins in the 1930s in America and later spread to European and Asian countries like Japan, China, Korea, and India. An example still image from Spider-Man 3 is shown to depict the incredible use of VFX in Hollywood movies.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
This document discusses theories of cyberspace regulation proposed by Lawrence Lessig. Lessig argues that four factors regulate behavior in cyberspace: norms, markets, law, and code (or architecture). Code plays a particularly important role as it determines what actions are possible or impossible. Lessig proposes reforms to copyright law and policies promoting open code to balance control and innovation on the internet. Critics argue surveillance should also be considered a form of regulation and that "architecture" is a more accurate term than "code." The document examines issues around balancing control, privacy, and innovation in cyberspace.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
The document discusses jurisdiction in cyberspace. It defines jurisdiction and international law principles related to jurisdiction. It discusses issues like prescriptive jurisdiction, enforcement jurisdiction, and personal jurisdiction in cyberspace. Personal jurisdiction online is complex due to factors like online contracts, forum selection clauses, and location of web servers. Courts examine minimum contacts and due process to determine if they can exercise jurisdiction over foreign online entities. International conventions also guide jurisdiction over cybercrimes.
The document summarizes the evolution of wireless technologies from 1G to 5G. It discusses the key features and limitations of each generation including the increasing data speeds and capabilities. The document compares technologies such as 2G, 3G, 4G and highlights how each new generation improved upon the previous by offering higher speeds and new services like texting, multimedia messaging and video calling. It concludes that 5G will provide wireless connectivity with almost no limitations and will be the next wireless standard after fully deploying in 2020.
One of the most extensive and coolest presentations i have made so far on the IT act in India, its implementation and an overview of cyber crimes in India
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
The document discusses the concept of the metaverse and its potential future impact. It defines the metaverse as a virtual reality space where users can interact with a computer-generated environment and each other. Large companies like Meta, Microsoft, and Epic Games are investing in developing aspects of the metaverse using technologies like virtual reality headsets. In the future, the metaverse could allow users to socialize, work, learn, and be entertained in virtual environments. However, concerns exist around increased screen time, privacy, and the potential for the metaverse to blur the lines between reality and virtual worlds.
The document summarizes a seminar report on Money-Pad, a proposed future wallet that holds digital cash and financial information rather than paper cash. Money-Pad uses biometric fingerprint recognition for secure authentication of transactions. It allows for instant clearing of funds without transaction fees or credit limits. In the future, as internet access expands globally, financial transactions may be conducted via small fingerprint recognition devices without need for physical cards or pads.
The document discusses cyber laws and cybercrime in India. It defines key terms related to cyber law such as computer, electronic record, digital signature. It outlines categories of cybercrime such as those against persons, property, and government. Examples of cybercrime include hacking, identity theft, and child pornography. The document also summarizes India's Information Technology (Amendment) Act of 2008 which introduced amendments to strengthen cyber security and address new cybercrimes.
Software piracy involves illegally copying or distributing copyrighted software without permission from the copyright holder. It deprives software companies of significant earnings each year from lost sales. Some of the most commonly pirated software titles in 2007 included Norton Anti-Virus, Adobe Photoshop, and AutoCAD. While software piracy may seem like a victimless crime, it negatively impacts both individuals and society by potentially exposing people to malware, costing jobs, raising legal software prices, and undermining the creative work of software developers. Individuals can help address this issue by educating themselves and others, reporting known cases of piracy, and only using properly licensed software.
1. The document lists over 100 potential seminar topics in computer science and information technology, ranging from embedded systems and extreme programming to biometrics, quantum computing, and more.
2. Some examples include elastic quotas, electronic ink, gesture recognition, graphics processing units, grid computing, and honeypots.
3. The broad range of topics provide many options for students or professionals to explore emerging technologies and issues in computing.
Cyber security expert Vivek Agarwal presented on cyber security. His presentation covered internet security, types of cyber crimes like hacking, child pornography, virus dissemination and cyber terrorism. It also discussed primary online risks like cyberbullies, predators, viruses and identity theft. The presentation provided steps individuals can take to boost cyber security such as using firewalls, automatic updates, antivirus and antispyware software. It emphasized educating families on internet safety and managing personal information.
This document discusses cyber jurisdiction in India. It begins with an introduction to cyber jurisdiction and defines cyber crimes. It then provides background on the history and development of cyber law in India, including the passage of the Information Technology Act of 2000. The document discusses the key issues around jurisdiction of cyber crimes, as the internet has no boundaries. It notes that the IT Act provides for extraterritorial jurisdiction over cyber crimes impacting India or involving Indian computers. However, the boundaryless nature of the internet still poses challenges to jurisdiction. The document aims to understand the position of cyber jurisdiction in India.
Cyber law & Intellectual property issuesatuljaybhaye
This document discusses cyber law and intellectual property issues from the Indian perspective. It begins by defining cyber law and explaining the need for cyber law due to the disadvantages of increased internet accessibility and rampant cyber crimes. It then discusses the history and scope of the Information Technology Act of 2000 in India, which was enacted to respond to UN recommendations on electronic transactions and governance. The document also covers the different types of intellectual property, forms of copyright and trademark infringement online, and landmark cases related to domains and trademarks. It concludes by suggesting areas where Indian cyber law could be strengthened.
5G will provide high-speed internet, ubiquitous service, and unlock solutions to many problems. However, since 4G and 3G networks are still being implemented in many areas, the future of 5G is unclear. 5G is designed to offer incredible data capabilities, unlimited call volume, and vast data broadcasting through an advanced mobile system. It will interconnect the entire world without limits and provide universal access to information and communication that will change lifestyles. Governments can use 5G to support good governance and create healthy environments.
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
This document provides an introduction to key Sri Lankan laws relating to electronic commerce and computer crimes. It summarizes several Acts that were established to address legal issues arising from increased IT use, including the Evidence (Special Provisions) Act, Electronic Transactions Act, Computer Crimes Act, Payment Devices Frauds Act, and Intellectual Property Act. These Acts aim to facilitate electronic transactions, define new computer-based offenses, and regulate areas like digital signatures, software protection, and credit card fraud. The document urges further reading on this topic from experts and sources like specific Acts to gain deeper understanding beyond this introductory overview.
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
The document discusses the appreciation and admissibility of digital evidence under Sri Lankan law. It notes that prior to 1995, there were no provisions for admitting computer evidence. The Evidence (Special Provisions) Act of 1995 was introduced to efficiently and legally manage computer-based evidence in civil and criminal court proceedings. The act defines computers broadly and allows computer-generated evidence to be admitted if it meets certain conditions regarding the computer's operation and the accuracy of information supplied. Several other acts also address digital evidence admission. Digital evidence poses challenges regarding discovery due to its volume, persistence, and multiple storage locations.
What is Software Piracy?
Common Types of Piracy
End User Piracy
Client-Server Overuse
Internet Piracy
Hard-Disk Loading
Software Counterfeiting
Piracy in the World
Most Pirated Medium
Ways to Battle Piracy
Arrests involving Piracy
Summary
End
Cyber crime involves unlawful activities using computers and the internet. The document categorizes cyber crimes as those using computers to attack other computers or as tools to enable real-world crimes. It provides examples of various cyber crimes like hacking, child pornography, viruses, and cyber terrorism. It stresses the importance of cyber security to defend against attacks through prevention, detection and response. The document advises safety tips like using antivirus software, firewalls, and strong passwords. India's cyber laws address both traditional crimes committed online and new crimes defined in the Information Technology Act.
The document discusses ethical hacking, which involves using the same tools and techniques as criminal hackers but in a legal and responsible way to test an organization's security. It defines different types of hackers, the hacking process, and skills required of an ethical hacker. The document also outlines the advantages and disadvantages of ethical hacking, areas for future enhancement, and concludes that keeping systems updated and educating users are important defenses against hacking.
This document is a report on visual effects (VFX) submitted to a professor. It includes a forwarding letter, preface, acknowledgements, synopsis, and table of contents outlining the chapters to come. The introduction provides an overview of VFX in filmmaking and its categories. A brief history of VFX is given, noting its origins in the 1930s in America and later spread to European and Asian countries like Japan, China, Korea, and India. An example still image from Spider-Man 3 is shown to depict the incredible use of VFX in Hollywood movies.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
This document discusses theories of cyberspace regulation proposed by Lawrence Lessig. Lessig argues that four factors regulate behavior in cyberspace: norms, markets, law, and code (or architecture). Code plays a particularly important role as it determines what actions are possible or impossible. Lessig proposes reforms to copyright law and policies promoting open code to balance control and innovation on the internet. Critics argue surveillance should also be considered a form of regulation and that "architecture" is a more accurate term than "code." The document examines issues around balancing control, privacy, and innovation in cyberspace.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
The document discusses jurisdiction in cyberspace. It defines jurisdiction and international law principles related to jurisdiction. It discusses issues like prescriptive jurisdiction, enforcement jurisdiction, and personal jurisdiction in cyberspace. Personal jurisdiction online is complex due to factors like online contracts, forum selection clauses, and location of web servers. Courts examine minimum contacts and due process to determine if they can exercise jurisdiction over foreign online entities. International conventions also guide jurisdiction over cybercrimes.
The document summarizes the evolution of wireless technologies from 1G to 5G. It discusses the key features and limitations of each generation including the increasing data speeds and capabilities. The document compares technologies such as 2G, 3G, 4G and highlights how each new generation improved upon the previous by offering higher speeds and new services like texting, multimedia messaging and video calling. It concludes that 5G will provide wireless connectivity with almost no limitations and will be the next wireless standard after fully deploying in 2020.
One of the most extensive and coolest presentations i have made so far on the IT act in India, its implementation and an overview of cyber crimes in India
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
The document discusses the concept of the metaverse and its potential future impact. It defines the metaverse as a virtual reality space where users can interact with a computer-generated environment and each other. Large companies like Meta, Microsoft, and Epic Games are investing in developing aspects of the metaverse using technologies like virtual reality headsets. In the future, the metaverse could allow users to socialize, work, learn, and be entertained in virtual environments. However, concerns exist around increased screen time, privacy, and the potential for the metaverse to blur the lines between reality and virtual worlds.
The document summarizes a seminar report on Money-Pad, a proposed future wallet that holds digital cash and financial information rather than paper cash. Money-Pad uses biometric fingerprint recognition for secure authentication of transactions. It allows for instant clearing of funds without transaction fees or credit limits. In the future, as internet access expands globally, financial transactions may be conducted via small fingerprint recognition devices without need for physical cards or pads.
The document discusses cyber laws and cybercrime in India. It defines key terms related to cyber law such as computer, electronic record, digital signature. It outlines categories of cybercrime such as those against persons, property, and government. Examples of cybercrime include hacking, identity theft, and child pornography. The document also summarizes India's Information Technology (Amendment) Act of 2008 which introduced amendments to strengthen cyber security and address new cybercrimes.
Software piracy involves illegally copying or distributing copyrighted software without permission from the copyright holder. It deprives software companies of significant earnings each year from lost sales. Some of the most commonly pirated software titles in 2007 included Norton Anti-Virus, Adobe Photoshop, and AutoCAD. While software piracy may seem like a victimless crime, it negatively impacts both individuals and society by potentially exposing people to malware, costing jobs, raising legal software prices, and undermining the creative work of software developers. Individuals can help address this issue by educating themselves and others, reporting known cases of piracy, and only using properly licensed software.
1. The document lists over 100 potential seminar topics in computer science and information technology, ranging from embedded systems and extreme programming to biometrics, quantum computing, and more.
2. Some examples include elastic quotas, electronic ink, gesture recognition, graphics processing units, grid computing, and honeypots.
3. The broad range of topics provide many options for students or professionals to explore emerging technologies and issues in computing.
Cyber security expert Vivek Agarwal presented on cyber security. His presentation covered internet security, types of cyber crimes like hacking, child pornography, virus dissemination and cyber terrorism. It also discussed primary online risks like cyberbullies, predators, viruses and identity theft. The presentation provided steps individuals can take to boost cyber security such as using firewalls, automatic updates, antivirus and antispyware software. It emphasized educating families on internet safety and managing personal information.
This document discusses cyber jurisdiction in India. It begins with an introduction to cyber jurisdiction and defines cyber crimes. It then provides background on the history and development of cyber law in India, including the passage of the Information Technology Act of 2000. The document discusses the key issues around jurisdiction of cyber crimes, as the internet has no boundaries. It notes that the IT Act provides for extraterritorial jurisdiction over cyber crimes impacting India or involving Indian computers. However, the boundaryless nature of the internet still poses challenges to jurisdiction. The document aims to understand the position of cyber jurisdiction in India.
Cyber law & Intellectual property issuesatuljaybhaye
This document discusses cyber law and intellectual property issues from the Indian perspective. It begins by defining cyber law and explaining the need for cyber law due to the disadvantages of increased internet accessibility and rampant cyber crimes. It then discusses the history and scope of the Information Technology Act of 2000 in India, which was enacted to respond to UN recommendations on electronic transactions and governance. The document also covers the different types of intellectual property, forms of copyright and trademark infringement online, and landmark cases related to domains and trademarks. It concludes by suggesting areas where Indian cyber law could be strengthened.
5G will provide high-speed internet, ubiquitous service, and unlock solutions to many problems. However, since 4G and 3G networks are still being implemented in many areas, the future of 5G is unclear. 5G is designed to offer incredible data capabilities, unlimited call volume, and vast data broadcasting through an advanced mobile system. It will interconnect the entire world without limits and provide universal access to information and communication that will change lifestyles. Governments can use 5G to support good governance and create healthy environments.
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
This document provides an introduction to key Sri Lankan laws relating to electronic commerce and computer crimes. It summarizes several Acts that were established to address legal issues arising from increased IT use, including the Evidence (Special Provisions) Act, Electronic Transactions Act, Computer Crimes Act, Payment Devices Frauds Act, and Intellectual Property Act. These Acts aim to facilitate electronic transactions, define new computer-based offenses, and regulate areas like digital signatures, software protection, and credit card fraud. The document urges further reading on this topic from experts and sources like specific Acts to gain deeper understanding beyond this introductory overview.
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
The document discusses the appreciation and admissibility of digital evidence under Sri Lankan law. It notes that prior to 1995, there were no provisions for admitting computer evidence. The Evidence (Special Provisions) Act of 1995 was introduced to efficiently and legally manage computer-based evidence in civil and criminal court proceedings. The act defines computers broadly and allows computer-generated evidence to be admitted if it meets certain conditions regarding the computer's operation and the accuracy of information supplied. Several other acts also address digital evidence admission. Digital evidence poses challenges regarding discovery due to its volume, persistence, and multiple storage locations.
The document summarizes copyright law in Sri Lanka. It discusses that copyright is governed by the Intellectual Property Act No. 36 of 2003. Copyright protects literary and artistic works and provides economic and moral rights to authors. Works are automatically protected upon creation without registration. Copyright lasts for the life of the author plus 70 years. Fair use provisions allow limited use for purposes like research and education. Infringement of copyright is a criminal offense punishable by fines and imprisonment.
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
Cyber security in Sri Lanka faces several challenges. Sri Lanka's cyber security body, SLCERT, is understaffed and has limited technical knowledge compared to the private sector. Sri Lankan cyber security resources and attention are also less than neighboring countries. To improve, Sri Lanka should coordinate cyber activities across institutions, regulate with business involvement, and extend national security policies to include cyber security. Public-private partnerships and international cooperation are also needed to bolster Sri Lanka's cyber defenses.
ICTA is the implementing agency of Sri Lanka's e-Sri Lanka ICT development roadmap. ICTA aims to harness ICT to drive economic and social advancement by bringing the benefits of ICT to every citizen, village, and business, and transforming how the government works. ICTA's key roles include creating an enabling environment for ICT development, providing ICT infrastructure and services, developing Sri Lanka's ICT industry and workforce, and promoting an e-Society through innovative social applications of ICT.
This document provides an introduction to different types of intellectual property including patents, copyrights, and trademarks. It explains that patents protect technological inventions for a period of 20 years and are intended to encourage innovation. Copyrights protect original creative works, including literary and artistic works, and provide economic rights to authors for their lifetime plus 50 years. Trademarks distinguish the goods and services of different businesses and provide exclusive rights to mark owners upon registration. The document outlines eligibility requirements for intellectual property protections and enforcement mechanisms against infringement.
Ergonomics, intellectual property, and inclusivity are three major social and ethical issues in software design and development. Ergonomics considers how easy software is to use for different groups, while intellectual property laws protect software developers' work from being copied. Inclusivity requires software be accessible to users from various cultures, economic backgrounds, and with disabilities. License agreements are used to legally enforce intellectual property rights and protect developers.
Good practice in witness protection legislationEUROsociAL II
The document provides guidance on good practices for witness protection legislation based on international standards and country examples. It discusses that witness protection programs are an important tool for law enforcement and anti-corruption efforts by encouraging witnesses to testify without fear of intimidation. Key recommendations for legislation include specifying the authority responsible, admission criteria, protection measures, rights and obligations of parties, and penalties for disclosure of protected information. The scope of coverage should include witnesses, victims, experts and related persons for corruption and other serious crimes. Legislation should also consider including protections for whistleblowers and informants in some circumstances.
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
Highlights of the 2015 Scalar Security Study, The Cyber Security Readiness of Canadian Organizations, published February 2015. The full report can be downloaded at: http://hubs.ly/y0tFbr0
The document discusses security aspects of the Lanka Gate Initiative. It describes trends in user-centric digital identities like OpenID and Information Cards. The Lanka Gate architecture includes a Sri Lanka country portal for accessing backend services through portals. Identity is provided as a service to integrate identity management and decouple it from applications. The country portal uses an identity provider for authentication and backend services evaluate authorization. Policies can be defined and evaluated using XACML for standards-based authorization. Other security aspects discussed include auditing of authentication and authorization decisions.
This document discusses the use of information and communication technology (ICT) in human resource management (HRM) activities within judiciaries. It defines e-HRM as the application of IT to support HR activities and interactions between actors. Large judiciaries are more likely to adopt e-HRM due to benefits of automation, information sharing, and collaboration. ICT can be used in various HR processes like recruitment, selection, and training. Examples include storing employee information, sorting job candidates, producing competence profiles, and providing online training resources. The use of ICT in HRM is growing and can help profile employees, track information and processes, and manage talent.
This document discusses computer network security. It begins with an introduction discussing how computer networks bring security risks due to openness and connectivity. It then discusses influential elements of network security such as hackers, software vulnerabilities, and information leaks. The document also covers research findings on basic network security technologies like firewalls, encryption, and intrusion detection. It analyzes internet attack methods including eavesdropping, phishing, denial of service attacks and malware. Finally, it discusses measures that can be taken to improve network security.
DANE: The Future of Transport Layer Security (TLS)
Dan York (Internet Society)
If you connect to a “secure” server using TLS/SSL (such as a web server, email server or xmpp server), how do you know you are using the correct certificate? With DNSSEC now being deployed, a new protocol has emerged called “DANE” (“DNS-Based Authentication of Named Entities“), which allows you to securely specify exactly which TLS/SSL certificate an application should use to connect to your site. DANE has great potential to make the Internet much more secure by marrying the strong integrity protection of DNSSEC with the confidentiality of SSL/TLS certificates. In this session, we will explain how DANE works and how you can use it to secure your websites, email, XMPP, VoIP, and other web services.
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
This document discusses rallying youth against cyber crime through awareness and prevention. It proposes a three-pronged strategy focusing on prevention, preparedness, and awareness creation. This would involve conducting forums to educate youth, promoting cyber safety drills, and lobbying for legal changes. The strategy argues that youth are well-positioned to catalyze change given their role as major users of technology. By making youth aware of the serious financial and social impacts of cyber crimes, this approach could drastically reduce such incidents worldwide.
Nato — the north atlantic treaty organization — military alliance facts part ihindujudaic
NATO is a military alliance of 28 European and North American countries that was formed after World War II to provide collective security against the Soviet Union. Key facts about NATO include that its headquarters are in Brussels, Belgium, its secretary general is Jens Stoltenberg of Norway, and its founding treaty was signed in 1949 committing members to defend each other against attack.
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
Executive Summary of the 2016 Scalar Security Study, The Cyber Security Readiness of Canadian Organizations, published February 2016. The full report can be downloaded at: scalar.ca/security-study-2016/
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
This document is Vietnam's Law on Information Technology from 2006. It provides definitions for key terms related to information technology such as digital information, software, and computer virus. It outlines Vietnam's state policies to prioritize IT development and promote investment in the IT sector. It also establishes rights and responsibilities for individuals and organizations regarding IT application and development activities in Vietnam.
The document summarizes communications policies, regulations and the fast growth of Tanzania's ICT sector. It outlines national ICT policies from 1997-2014 and legislation governing the communications authority and sector. Regulations cover quality of service, licensing, interconnection and more. The converged licensing framework introduced in 2005 consists of four license types. The ICT sector is growing rapidly, with voice subscriptions increasing from 3 million in 2005 to over 27 million in 2012. Spectrum opportunities and undersea cables are facilitating expansion. Interconnection rates are declining under new determinations. Financial inclusion and digital broadcasting networks are also discussed.
The document proposes amendments to Kenya's ICT legislation to strengthen protections and promote further growth of Kenya's ICT industry. It suggests changes such as limiting ministerial discretion, strengthening data privacy protections, increasing penalties for cyber crimes, and providing liability protections for internet service providers. The goal of the amendments is to improve investment and development in Kenya's ICT sector, which the document identifies as a key driver of economic growth, in order to help advance Kenya's Vision 2030 development plan.
The document summarizes Sri Lanka's cybercrime legislation and policies from the perspective of a developing country. It provides an overview of Sri Lanka's key cybercrime laws, including the Computer Crimes Act of 2007, and discusses some of the challenges in enforcing cybercrime laws and addressing them through awareness programs, improved digital forensics capabilities, and the creation of computer emergency response teams.
This document presents Cyprus's "Digital Strategy for Cyprus" plan for 2012-2020 to promote the use of information and communication technologies. The plan aims to connect Cyprus with high-speed networks, modernize public administration through e-government services, include all citizens in the digital economy, promote digital education and learning, and support digital entrepreneurship. Key objectives include achieving universal broadband access, developing e-health systems, issuing digital IDs, and creating a knowledge park for technology companies. The plan is aligned with the European Digital Agenda and aims to boost economic growth through greater ICT use.
Suriname ICT Vision 2020 by ICT Associatie Suriname June 2015Cyril Soeri
This document presents Suriname's ICT Vision for 2020. It analyzes the strengths, weaknesses, opportunities, and threats for Suriname's ICT sector. It provides recommendations to optimize the sector, including improving education, legislation, infrastructure, and funding. The goal is to guide effective growth of the ICT sector and maximize its contribution to Suriname's economy. Key actions include developing a national ICT strategy, establishing an ICT association, and creating a business model for the sector.
The document provides an overview of the Ministry of Information and Communications Technology (MoICT) in Uganda. It outlines the ministry's mandate, vision, mission and strategic objectives which are to provide leadership and coordination in ICT development. It describes the ministry's departments and functions in developing ICT infrastructure, policies and services. It also identifies key challenges faced in achieving its goals such as underfunding and inadequate ICT infrastructure.
This document is a bill to repeal and replace the National Information Technology Development Agency Act of 2007 in Nigeria. The bill aims to create an effective regulatory framework for developing Nigeria's information technology sector and digital economy. It establishes the National Information Technology Development Agency to regulate IT systems and practices, promote policies and strategies, encourage investment, and protect consumers in the digital economy. The bill outlines the agency's functions, such as regulating data use, digital services/systems, issuing standards and guidelines, and advising the government on IT and cybersecurity matters. It also provides the agency with enforcement powers to implement this new regulatory framework.
The National Security Framework (ENS) provides the basic principles and minimum security requirements, proportionality through categorization into three steps, security measures updated and adapted to Digital Government, flexibility mechanisms through compliance profiles, accreditation and conformity through a certification scheme with the National Accreditation Entity, ENAC, and monitoring through the Annual Report on State of Security, along with more than 100 support guides ( CCN-STIC) and a collection of support tools provided by CCN-CERT, plus the references in the instruments for central procurement of IT services and products.
The ENS is applicable to the entire public sector, to systems that process classified information, to those who provide services or provide solutions to public sector entities, and to the supply chain of such contractors on the basis of risk analysis.
Gebran Bassil's 2009 Telecom General RulesCedarcom News
A vision and roadmap for the Lebanese telecom sector's future by Minister Gebran Bassil. Cedarcom News highlighted the core elements of the General Rules for your convenience. The General Rules can also be found on the International Telecommunication Union (ITU) website in both Arabic and English (http://www.itu.int/ITU-D/treg/Events/Seminars/GSR/GSR09/papers.html)
Regulating Data: The Implications of Informatics on International LawJon Garon
Description: Because of the increasing ease of digitization, all information has the potential to be digitized and as such, all information is becoming part of a single, incomprehensibly large, multinational, multicultural data system. The resulting data ecosystem is subject to local regulation by state and national laws which have often been drafted to address a conflicting set of jurisdictional rules and normative expectations regarding the creation, ownership, collection, storage and dissemination of information. The laws vary from country to country, resisting efforts at bringing international harmony because of deeply rooted historical differences. The presentation is an overview of the steps necessary for developing a comprehensive informatics regulatory system that protects privacy, telecom policy and copyright.
The document summarizes the achievements and priorities of Uganda's Ministry of Information and Communications Technology for fiscal years 2010/11 and 2011/12. It discusses policies passed and developed, infrastructure projects implemented, and trainings conducted in 2010/11. It also outlines the ministry's proposed budget and planned activities for 2011/12, and lists several unfunded priority programs and the funding gaps. Key strategies mentioned to realign priorities and accommodate emerging challenges include holistic project packaging, promoting internet usage, and harmonizing public ICT infrastructure.
The document summarizes the achievements and priorities of Uganda's Ministry of Information and Communications Technology for fiscal years 2010/11 and 2011/12. It discusses policies passed and developed, infrastructure projects implemented, and trainings conducted in 2010/11. It also outlines the ministry's proposed budget and planned activities for 2011/12, and lists several unfunded priority programs and the funding gaps. Key strategies mentioned to realign priorities and accommodate emerging challenges include holistic project packaging, promoting internet usage, and harmonizing public ICT infrastructure.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
NATIONAL ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT STRATEGIC PLAN Daniel Dufourt
"This AI R&D Strategic Plan defines a high-level framework that can be used to identify scientific and technological gaps in AI and track the Federal R&D investments that are designed to fill those gaps. The AI R&D Strategic Plan identifies strategic priorities for both near-term and long-term support of AI that address important technical and societal challenges. The AI R&D Strategic Plan, however, does not define specific research agendas for individual Federal agencies. Instead, it sets objectives for the Executive Branch, within which agencies may pursue priorities consistent with their missions, capabilities, authorities, and budgets, so that the overall research portfolio is consistent with the AI R&D Strategic Plan."
1. The document discusses database views, which provide a virtual representation of data from base tables without occupying storage space themselves.
2. Views allow for security, query simplicity, and a natural interface for users by presenting tailored representations of the data.
3. While views behave similarly to tables, there are limitations on operations like updates and restrictions on processing complex views efficiently.
The document outlines proposed revisions to the curriculum for the Higher National Diploma in Information Technology program at the Sri Lanka Institute for Advanced Technological Studies. Key points include:
1. The current curriculum is outdated and lacks specialization options, depth in subjects, and industry relevance.
2. The proposed revisions include changes to the program structure with specialization tracks and allowing for in-depth study, as well as updating the curriculum content.
3. A new curriculum was developed through stakeholder input and benchmarking other programs. It includes specialization options beginning in the third semester and a focus on projects and practical skills.
This document discusses configuration management and version control. It defines configuration management as the unique identification, controlled storage, change control, and status reporting of work products during a system's life. It then outlines the key components of configuration management: identification, storage, change control, and status reporting. For each component, it describes the main activities and considerations. Overall, the document provides an overview of configuration management principles and best practices.
This document provides information about open source software including definitions, history, licenses, examples of leading open source projects, and comparisons to other software types. It discusses the open standard requirements for technologies to be considered open source and defines the key aspects of open source licenses including free redistribution, availability of source code, ability to create derivative works, and non-discrimination terms. The document also outlines some pros and cons of the open source model.
The document discusses various open source business models including support sellers, loss leader, widget frosting, sell it free it, service enabler, and software franchising. It provides details on how each model generates revenue, such as selling support services for a free open source product, using a free product to sell other goods and services, or licensing the commercial use of an open source product. The goal of these models is to use free or low-cost open source software to attract customers and build brand loyalty in order to generate revenue through other means.
This document provides an overview of C# programming fundamentals including: introducing the .NET platform, steps for C# program development, computer programming languages, what .NET is, writing simple C# programs, commenting code, identifiers and keywords, coding conventions and style, and getting started with C# and Visual Studio 2008. References for further information are also provided.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
1. PARLIAMENT OF THE DEMOCRATIC
SOCIALIST REPUBLIC OF
SRI LANKA
——————————
INFORMATION AND COMMUNICATION
TECHNOLOGY ACT, No. 2 7 OF 2003
——————————
[Certified on 09th September, 2003]
Printed on the Order of Government
——————————
Published as a Supplement to Part II of the Gazette of the Democratic Socialist
Republic of Sri Lanka of September 12, 2003
PRINTED AT THE DEPARTMENT OF GOVERNMENT PRINTING, SRI LANKA
TO BE PURCHASED AT THE GOVERNMENT PUBLICATIONS BUREAU, COLOMBO 1
Price : Rs. 8.25 Postage : Rs. 4.50
2. Information and Communication 1
Technology Act , No. 27 of 2003
[Certified on 09th September, 2003]
L.D.—O. 7/2003.
AN ACT TO PROVIDE FOR THE ESTABLISHMENT OF THE NATIONAL
C OMMITTEE ON I NFORMATION AND C OMMUNICATION
TECHNOLOGY OF SRI LANKA ; TO PROVIDE FOR THE SETTING
OUT OF A N ATIONAL P OLICY ON I NFORMATION AND
COMMUNICATION TECHNOLOGY AND FOR THE PREPARATION OF
AN ACTION PLAN ; TO PROVIDE FOR THE APPOINTMENT OF A TASK
FORCE FOR INFORMATION AND COMMUNICATION TECHNOLOGY ;
TO PROVIDE FOR THE ESTABLISHMENT OF THE INFORMATION AND
COMMUNICATION TECHNOLOGY AGENCY OF SRI LANKA CHARGED
WITH THE IMPLEMENTATION OF THE NATIONAL POLICY IN BOTH
THE PUBLIC AND PRIVATE SECTORS ; AND TO PROVIDE FOR MATTERS
CONNECTED THEREWITH OR INCIDENTAL THERETO.
BE it enacted by the Parliament of the Democratic Socialist
Republic of Sri Lanka as follows :—
1. (1) This Act may be cited as the Information and Short title and
Communication Technology Act, No. 27 of 2003 and shall date of operation
and duration of
come into operation on such date as the Minister is in charge
Act.
of the subject of Information Technology may appoint, by
Order published in the Gazette.
(2) The provisions of this Act shall be in operation for a
period of five years from the date on which such Act shall
have come into operation.
PART I
NATIONAL POLICY AND ACTION PLAN ON INFORMATION AND
COMMUNICATION TECHNOLOGY
2. The Cabinet of Ministers shall from time to time, having National Policy on
Information and
regard to the interests of the industry, approve the National Communication
Policy Framework in relation to Information and Technology to be
approved by the
Communication Technology. Cabinet of
Ministers.
2—H 018088—5,650 (05/2003)
3. 2 Information and Communication
Technology Act, No. 27 of 2003
Appointment of 3. (1) In order to ensure the proper implementation of
Task Force on
the Information and communication Technology Policy
Information and
Communication formulated under section 2, within Sri Lanka, the Cabinet of
Technology. Ministers shall appoint a Task Force on Information and
Communication Technology (hereinafter referred to as the
“Task Force”) consisting of not more than twenty members.
One of the members so appointed shall be appointed as the
Chairman of the Task Force.
(2) The members of the Task Force shall be chosen from
among persons who have expertise in the fields of information
and communication technology, telecommunications, law,
business and finance.
Functions of the 4. The functions of the Task Force shall be—
Task Force.
(a) to prepare an action plan in accordance with the
National Policy on Information and Communication
Technology ;
(b) to co-ordinate the implementation of the National
Policy on Information and Communication
Technology and the action plan in both the government
sector and the private sector and facilitate the
implementation of the same ;
(c) to supervise the implementation of the National Policy
on Information and Communication Technology and
the action plan and where necessary issue directions
from time to time to the implementing agencies ;
(d) to draw up plans identifying the manner in which
Information and Communication Technology can be
made popular within Sri Lanka ;
(e) to identify, develop and cause to be adopted standards
of international renown for human resources
development, products, services, markets and
transactions in their application to the field of
Information and Communication Technology ; and
(f) recommend where necessary the making of
regulations to give effect to the provisions of the Act.
4. Information and Communication 3
Technology Act , No. 27 of 2003
PART II
NATIONAL COMMITTEE ON INFORMATION AND COMMUNICATION
TECHNOLOGY
5. (1) There shall be a National Committee on National
Information and Communication Technology (hereinafter Committee on
Information and
referred to as “the Committee”).
Communication
Technology.
(2) The Committee shall consist of—
(a) the Minister, who shall preside at all meetings of the
Committee ;
(b) The Minister in charge of the subject of
Telecommunications ;
(c) the Minister in charge of the subject of Education ;
(d) the Minister in charge of the subject of Higher
Education ;
(e) the Minister in charge of the subject of Public
Administration ;
(f) such number of members in respect of each category
of stakeholders, as is determined by the Cabinet of
Ministers taking into consideration the needs of the
Information and Communication Technology
industry. Such members shall be appointed by the
respective Ministers.
(3) The Committee shall be charged with the task of
discussing policies, preparation of programmes and plans for
Information and Communication Technology and for periodic
review of its implementation.
(4) The Committee shall meet at least once in every four
months.
5. 4 Information and Communication
Technology Act, No. 27 of 2003
(5) The procedure to be followed at the meetings of the
Council shall be as prescribed.
(6) The Committee shall issue guidelines and directions
as are necessary for implementation of the National Policy
on Information and Communication Technology and the
action plan, to the Task Force.
PART III
GENERAL
ESTABLISHMENT OF THE INFORMATION AND COMMUNICATION
TECHNOLOGY AGENCY OF SRI LANKA
The information 6. (1) The Information and Communication Technology
and Agency of Sri Lanka (registered under the Companies Act,
Communication
Technology No. 17 of 1982) shall be the Executive Agency to assist the
Agency of Sri Task Force and the Committee.
Lanka to assist
Task Force and
(2) In addition to the powers and functions of the
Committee.
Agency as set out in the Memorandum and Articles of
Association, the Agency shall have the following powers and
functions :—
(a) to provide all information necessary for the
formulation of the National Policy on Information and
Communication Technology and assist the Cabinet of
Ministers and the Committee ;
(b) to submit proposals to be included in the National
Policy and action plan ;
(c) to take all such steps as are necessary to facilitate the
implementation of the National Policy and the action
plans as are formulated, and to periodically monitor
and review the same ;
6. Information and Communication 5
Technology Act , No. 27 of 2003
(d) to prepare the strategy and programmes which needs
to be implemented in both the government and the
private sectors in keeping with the National Policy on
Information and Communication Technology and the
action plan ;
(e) to provide all information necessary for the formation
of the National Policy on Information Technology ;
(f) to recommend to the Task Force, matters which need
to be taken into consideration in the preparation of
the action plan ;
(g) to submit proposals in respect of matters which
needs to be included in the National Policy and action
plan ; and
(h) to prepare the strategies and programmes which need
to be implemented in both the government sector and
the private sector in keeping with the National Policy
on Information and Communication Technology and
the action plan.
7. (1) The Minister may from time to time issue to the Minister to issue
Agency and other respective government agencies such directions.
directions and guidelines on matters of National Policy on
Information and Communication Technology and the action
plan as have been approved by the Cabinet of Ministers.
(2) The Minister may from time to time issue to the Task
Force such directions and guidelines relating to the manner,
mode and extent of implementation, in so far as it is relevant
to the implementation of the National Policy on Information
and Communication Technology and the action plan, within
both the public and the private sectors.
(3) It shall be the duty of the Task Force, the Agency and
the relevant Ministries, government departments, statutory
bodies, institutions other the agencies of the public and private
sector to comply with such directions and guidelines.
7. 6 Information and Communication
Technology Act, No. 27 of 2003
Agency to be 8. (1) The Agency shall with the concurrence of the
exempt from
Minister in charge of the subject of Finance, be exempt from
payment of tax .
the payment of any tax on the income or profits of the Agency
to such extent as is permitted in terms of the Inland Revenue
Act, No. 38 of 2000.
(2) The Minister with the concurrence of the Minister in
charge of the subject of Finance may exempt the Agency from
the payment of any customs or excise duty on any goods
donated to the Agency or imported or purchased out of its
funds by the Agency, if the donation or import or purchase of
any such goods is considered to be conducive for the
advancement of the objects of the Agency.
(3) Any person making a payment to the agency of services
rendered or as a contribution to the general support of the
Agency, may claim the amount of such payment as a deduction
from income in the year in which such payment is actually
made for the purpose of computing liability for income tax.
Regulations. 9. (1) The Minister may make regulations for the
purpose of giving effect to the principles and provisions of
this Act and in respect of any matter which is required or
authorized by this Act to be prescribed.
(2) Subject to the provisions of subsection (1), regulations
may be made in respect of all or any of the following
matters :—
(a) Codes of Conduct for the different sectors in so far as
they are necessary, within the framework of the
National Policy on Information and Communication
Technology, for the purpose of the implemention of
such policy ;
(b) the form and content of any action plan to be
formulated in terms of the National Policy ;
8. Information and Communication 7
Technology Act , No. 27 of 2003
(c) the standards of international renown for human
resources development, products, services, markets
and transactions in their application to the field of
Information and Communication Technology ; and
(d) the functions of the Committee.
(3) Every regulation made under subsection (1) shall be
published in the Gazette and shall come into operation on the
date of such publication or on such later date as may be
specified in the regulation.
(4) Every regulation made under subsection (1) shall as
soon as convenient be placed before Parliament for its
approval. Any regulation which is not so approved shall be
deemed to be disapproved with effect from the date of
disapproval but without prejudice to anything previously done
thereunder.
(5) Notification of the date of disapproval of any regulation
shall be published in the Gazette.
10. (1) Part III of the Science and Technology Repeal.
Development Act, No. 11 of 1994, which provided for the
establishment of the Council for Information Technology
(CINTEC), is hereby repealed.
(2) All property movable and immovable which is owned
by the Council for Information Technology (CINTEC) and
all assets and liabilities of such Council shall with effect
from the date of the coming into operation of this Act, be
transferred to the Information and Communication
Technology Agency of Sri Lanka which is the Executive
Agency, in terms of section 6 of the Act.
(3) Notwithstanding such repeal, the Council for
Information Technology (CINTEC ) may carry out and
conclude all matters being carried out in relation to the
functions of the Council as set out in section 14 of the Science
and Technology Development Act, No. 11 of 1994, until such
matters are completed.
11. In the event of any inconsistency between the Sinhala Sinhala text to
and Tamil texts of this Act, the Sinhala text shall prevail. prevail in case of
inconsistency.
9. 8 Information and Communication
Technology Act, No. 27 of 2003
Annual subscription of English Bills and Acts of the Parliament Rs. 885 (Local), Rs. 1,180(Foreign),
payable to the SUPERINTENDENT, GOVERNMENT PUBLICATIONS BUREAU, NO. 32, TRANSWORKS HOUSE,
LOTUS ROAD, COLOMBO 01 before 15th December each year in respect of the year following.