FM Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to Banking LEGAL SERVICE in Bangladesh follow the down below link.
Website link: https://www.fmassociatesbd.com/blog/item/14-ict-amendment-ordinance-2013
Email: info@fmassociatesbd.com
I have presented this slide before my course teacher. Now I am publishing this slide for all Students in Bangladesh which may help them for their study.
With the apex court illegally abrogating the NJAC Act and no hope for the even more important NJ Accountability Commission, a fervent request is made to the PM for constituting a National Quasi Judicial Appointments and Accountability Commission
I have presented this slide before my course teacher. Now I am publishing this slide for all Students in Bangladesh which may help them for their study.
With the apex court illegally abrogating the NJAC Act and no hope for the even more important NJ Accountability Commission, a fervent request is made to the PM for constituting a National Quasi Judicial Appointments and Accountability Commission
Legal Obligations of Technology Service Providers as IntermediariesEquiCorp Associates
A database of millions of customers including their contact details are found freely accessible online and are available for sale at a very nominal price at various online social media platforms has brought a serious and basic question in focus- who all can be held responsible and accountable for such unauthorize and illegal acts?
Prima facie, the person who is selling the database is responsible under the eyes of law, but do the technology services providers or the platform where such database is been listed, owes any obligation to the customers and can be held responsible for unauthorized acts by a third party on their platform?
The intermediaries play a very important role in the enforcement of various provisions under the IT Act. In any technology services, there are multiple players involved in provision of services such as setting up web page or website, ISP providing internet connectivity, service provider for registration of domain name and hosting the domain, different service provider for uploading the web pages etc
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH MasyarakatLBH Masyarakat
Indonesia has been stunned by the drama of the rivalry
between the Indonesian National Police and the Corruption Eradication Commission (KPK) as the anti-corruption saga reaches new heights. There was public outcry when
police detained two of the KPK’s deputy commissioners. This sentiment escalated when the Constitutional Court heard wiretapped recordings of conversations between high-ranking law enforcement officials and suspects in corruption cases. The recordings indicate that there is a systemic plot to eliminate the KPK and further, that justice has not been served. In this state of affairs, President Susilo Bambang Yudhoyono’s awkward neutrality is disheartening. His strong commitment to fighting corruption must be translated into practice as the epic between the “gecko” (KPK) and the “crocodile” (Indonesian police) – as coined by the latter – is alarming and threatens to collapse the country’s rule of law.
Our main report in this edition of CAVEAT will take you along the journey of this saga and examine how
Indonesia should take the opportunity to complete a thorough reform of its law enforcement institutions.
In the additional feature, we present a joint open letter by LBH Masyarakat and Amnesty International addressed to
Commission III of the Indonesian House of Representatives regarding a review of the draft of the Indonesian Criminal Code. In the open letter, we focus on several issues:
Torture, freedom of expression, the death penalty, discrimination and violence against women, and crimes under international law.
Finally, Ricky Gunawan raises a recent torture case experienced by a transgender sex worker in his opinion piece entitled, “Indonesian Police Torture Must Be
Stopped.” He argues that the victim’s audacity in coming forward to complain of torture is heroic, given that he is a member of a vulnerable group that is often stigmatized and discriminated against. Thus, “his courage should not go to waste.”
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Somewhere amidst the unending human rights violations, prolonged court proceedings and bleak hopes, the word ‘justice’ has lost its meaning. In Hans Kelsen’s words, longing for justice is a man’s eternal longing for happiness.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
Defamation & Online Defamation; Why Internet for Defamation; Legislations related to defamatory; Freedom of Speech; Freedom of Speech under International Conventions and its limitation; Freedom of Speech under Federal Constitution of Malaysia and its limitation; Freedom of speech in Internet and Cyber Harassment; Instances of online defamation; Internet Content Regulation and Censorship.
Recommendation & Conclusion.
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
In compliance with the Budapest Convention, the CCA has recognised almost all the cyber-crime offences that are provided in the convention. Mere fact that the legal system recognises certain cyber-offences or that it provides a special mechanism to conduct investigations does not render the legislative framework effective. For the legislative framework to be considered effective, it should be capable of achieving the objective for which it was established. Accordingly, the effectiveness of the contemporary legislative framework shall be assessed based on its success in identifying and preventing cyber-crimes, conducting investigations, enforcing the enacted laws and in protecting human rights and liberties which are the objectives behind the enforcement of the cyber-crime legislative framework.
Democratic practice, privacy and fo e in nepal by shreedeep rayamajhiShreedeep Rayamajhi
Democratic practice, privacy and foe in nepal This documents scopes out the pros and con of the Right to Privacy bill in Nepal and also talks about the new amendments of Nepal government in the civil code act
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
The legislator has filed the petition asking the JSC to instigate disciplinary measures against Chief Justice David Maraga following the Supreme Court's decision to nullify President Uhuru Kenyatta's election on August 8. The petition was filed by NASA leader Raila Odinga
Legal Obligations of Technology Service Providers as IntermediariesEquiCorp Associates
A database of millions of customers including their contact details are found freely accessible online and are available for sale at a very nominal price at various online social media platforms has brought a serious and basic question in focus- who all can be held responsible and accountable for such unauthorize and illegal acts?
Prima facie, the person who is selling the database is responsible under the eyes of law, but do the technology services providers or the platform where such database is been listed, owes any obligation to the customers and can be held responsible for unauthorized acts by a third party on their platform?
The intermediaries play a very important role in the enforcement of various provisions under the IT Act. In any technology services, there are multiple players involved in provision of services such as setting up web page or website, ISP providing internet connectivity, service provider for registration of domain name and hosting the domain, different service provider for uploading the web pages etc
Caveat - VOLUME 06/I, NOVEMBER 2009 - LBH MasyarakatLBH Masyarakat
Indonesia has been stunned by the drama of the rivalry
between the Indonesian National Police and the Corruption Eradication Commission (KPK) as the anti-corruption saga reaches new heights. There was public outcry when
police detained two of the KPK’s deputy commissioners. This sentiment escalated when the Constitutional Court heard wiretapped recordings of conversations between high-ranking law enforcement officials and suspects in corruption cases. The recordings indicate that there is a systemic plot to eliminate the KPK and further, that justice has not been served. In this state of affairs, President Susilo Bambang Yudhoyono’s awkward neutrality is disheartening. His strong commitment to fighting corruption must be translated into practice as the epic between the “gecko” (KPK) and the “crocodile” (Indonesian police) – as coined by the latter – is alarming and threatens to collapse the country’s rule of law.
Our main report in this edition of CAVEAT will take you along the journey of this saga and examine how
Indonesia should take the opportunity to complete a thorough reform of its law enforcement institutions.
In the additional feature, we present a joint open letter by LBH Masyarakat and Amnesty International addressed to
Commission III of the Indonesian House of Representatives regarding a review of the draft of the Indonesian Criminal Code. In the open letter, we focus on several issues:
Torture, freedom of expression, the death penalty, discrimination and violence against women, and crimes under international law.
Finally, Ricky Gunawan raises a recent torture case experienced by a transgender sex worker in his opinion piece entitled, “Indonesian Police Torture Must Be
Stopped.” He argues that the victim’s audacity in coming forward to complain of torture is heroic, given that he is a member of a vulnerable group that is often stigmatized and discriminated against. Thus, “his courage should not go to waste.”
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Somewhere amidst the unending human rights violations, prolonged court proceedings and bleak hopes, the word ‘justice’ has lost its meaning. In Hans Kelsen’s words, longing for justice is a man’s eternal longing for happiness.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
Defamation & Online Defamation; Why Internet for Defamation; Legislations related to defamatory; Freedom of Speech; Freedom of Speech under International Conventions and its limitation; Freedom of Speech under Federal Constitution of Malaysia and its limitation; Freedom of speech in Internet and Cyber Harassment; Instances of online defamation; Internet Content Regulation and Censorship.
Recommendation & Conclusion.
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
In compliance with the Budapest Convention, the CCA has recognised almost all the cyber-crime offences that are provided in the convention. Mere fact that the legal system recognises certain cyber-offences or that it provides a special mechanism to conduct investigations does not render the legislative framework effective. For the legislative framework to be considered effective, it should be capable of achieving the objective for which it was established. Accordingly, the effectiveness of the contemporary legislative framework shall be assessed based on its success in identifying and preventing cyber-crimes, conducting investigations, enforcing the enacted laws and in protecting human rights and liberties which are the objectives behind the enforcement of the cyber-crime legislative framework.
Democratic practice, privacy and fo e in nepal by shreedeep rayamajhiShreedeep Rayamajhi
Democratic practice, privacy and foe in nepal This documents scopes out the pros and con of the Right to Privacy bill in Nepal and also talks about the new amendments of Nepal government in the civil code act
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
The legislator has filed the petition asking the JSC to instigate disciplinary measures against Chief Justice David Maraga following the Supreme Court's decision to nullify President Uhuru Kenyatta's election on August 8. The petition was filed by NASA leader Raila Odinga
Evaluation of Bangladesh’s Data Protection Bill.pdfM S Siddiqui
The draft Data Security Law did not make difference between data privacy and data security and a big concern was how to maintain the privacy of such data. The problem is that the government has expressed a controlling attitude to make the law a control mechanism rather than data security and data privacy.
In this modern era of technology, social media is becoming an important component of daily life and the majority of the youth today prefer to communicate their ideas, thoughts, and opinions through it. There are different social media platforms that allow users to access social news, blogs, vlogs, and others in an easy manner. Some of the social media networking sites used extensively include Instagram, Twitter, and Facebook.
Please be informed that currently there is no specific regulation regarding the protection of personal data in Turkey and protection of personal data is regulated under various legislation. However, the Draft Code on the Protection of Personal Data (the "Draft Code") is recently approved by the Prime Minister of Turkey to be submitted to the Parliament on January 18, 2016. As part of the European Union compliance procedure, the Draft Code is prepared by way of modelling European Union's Directive numbered 95/46 ("Directive No. 95/46") and published in 1995.Due to the fact that data protection is regulated under various laws and regulations, there is not any specific definition for “Personal Data” under our current legislation.
Legal Aid In Bangladesh: Application And Commitmentinventionjournals
ABSTRACT: Equality before law and ensuring social justice are important weapons to prevent social violence and development of societies in civilized countries. As per the modern justice system judicial adjudication is very costly and that cost has been the most difficult factor for the people to get justice in both developed and developing countries. In Bangladesh maximum of the population live under the poverty margin. If only rich persons can seek justice, the natural justice will be violated. So as a welfare state justice shall have to be ensured for all people of the state. For this reason there is a system in Bangladesh to make the justice available to the poor which may be called legal Aid. The constitution of Bangladesh has, in clear terms, recognized the basic fundamental human rights that are “equal before law” and “equal protection of law”. A large number of people in the country do not have any financial and other logistic support to get the appropriate service from the judicial system. This research focuses on the present legal aid services of Bangladesh, clarifies the system and suggests potential methods to improve this service.
Recently, the judgment of the Delhi High Court granted the bail to three activists, who have been in jail for over a year without trial, for their alleged role in the 2020 Delhi riots.
The judgment assumes significance because the charges were under the Unlawful Activities Prevention Act (UAPA), 1967. UAPA is criticized by the civil society as antithetical to constitutional freedom to dissent, rule of law and fair trial.
The Delhi high court judgement is a step in the right direction, but there are many issues associated with the UAPA.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
3. 3
The ICT (Information and Communication Technology) Act
2006, a law designed to combat cybercrimes, was passed by
the Bangladesh National Parliament on 8th October 2006 and
under this Act, the provisions were counted as noncognizable
and hence the police or the law enforcers could not arrest
anyone without the prior approval from an authority or court
and it further stipulated that the police cannot lodge any case
for a non cognizable offence. Section 57, the most criticized
provision of the 2006 Act stated that if any person
deliberately publishes any material in electronic form
5. that causes to deteriorate law and order, prejudice the image
of the State or person or causes to hurt religious belief the
offender shall be punishable with imprisonment for a term
which may extend to 10 years and with fine which may
extend to Taka 1 crore. Several human right activists
considered this provision as an infringement of the right to
freedom of expression.
5
7. 7
Afterwards the ICT Act 2006 was made stricter by the
Government when they approved the proposed draft ICT
(Amendment) Ordinance 2013. Under the new Ordinance,
the law enforcers have been empowered to arrest any person
without any warrant and has increased the maximum
punishment for violation of section 57 of the 2006 Act to 14
years from 10 years. The offence has also been categorized as
cognizable and non-bailable which means the police can
make arrests without any judicial warrant and bail can only be
granted at the discretion of the High Court Division of the
Supreme Court.
8. 8
The new draconian 2013 Ordinance would not have created
such concern if our law enforcers were professional enough or
could work out of political influence. There is no assurance
that the law will not be abused. The police force may lack the
educational and technical expertise to comprehend whether a
comment posted on the internet is derogatory or not and it
would give the police officers an unfettered power to interfere
in citizens’ personal lives. It also can be said with some
conviction that it is a total question of our morale that by
seeing something on the internet,
9. 9
some might react and some might discard it from their mind so
by stating in the Section 57(1) of the 2006 Act, that anyone
who can influence another person’s perspective seems to have
made the section completely ill founded. It will constrict
freedom of thought and thereby democracy. The 2006 Act has
already taken toll on journalists, bloggers, human rights
defenders and even social media activists, specially Facebook
users.
10. 10
Article 57 of the 2006 Act was quite contentious as it will not
be possible to decipher by the law enforcers that whether a
writing published on internet can create the possibility of
hurting someone’s religious belief or deteriorate law and order
because then anyone may be culpable without even knowing
about it. Hence this conclusion can be drawn that citizens
should also write or post comments on internet very
responsibly and not abuse their right to freedom of expression
and simultaneously, the government should also take
sufficient care to ensure that innocent citizens are not made
victims of this law.
11. 11
Since the Act has imposed extreme punishment provision for
the suspects, hence a responsible behavior from both the
citizens and the government will make the ICT more effective
and the laws of the Act should be further well balanced so that
no one can use it as a tool for oppression.
12. 12
At FM Associates, we work to serve the best interest of our
clients, by attending legal concerns towards a dignified
outcome which serves our clients purpose. Legal Service in
Bangladesh are the most needful among any other developing
countries due to its over-growing family dispute. We
understand how difficult and emotionally distressing legal
issues can get, for which we facilitates to resolve disputes with
discretion and empathy. Our skilled and professional teams of
lawyers deal with disputes following a pragmatic and
intelligent approach. The firm is proficient and has years of
experience in all areas of Legal System in Bangladesh.