...RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way to make any crime easily. For committing...
Words: 1924 - Pages: 8
...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly...
Words: 14728 - Pages: 59
...committed suicide. It is not only about her, in all over the Bangladesh there are lots of women or girls who are facing problems of cyber crime and taking some deadly attempt. In the article “Cyber Crime” the author Supan (2015), he describes the definitions of cyber crime. To begin with, there are many cyber crimes which are actually women centered (morphing, cyber stalking, cyber pornography etc.). However, these types of cyber crime mainly destroy women’s reputation and the reason behind of this inexperienced in cyber world. Moreover, Supan (2015) morphing is basically done for blackmailing women or girls by changing their pictures using graphic animation. Furthermore, cyber stalking is another cyber crime which is done by former friend or ex-lover of women or girls with whom she shared her feeling and emotions, so they bother her taking this advantage. In addition, cyber pornography means criminals made a private video of a girl and upload it over the internet for destroying her respect. He also says, in our country dealing with rules and regulation for preventing cyber crime by information and communication technology act, 2006 (ICTA) and pornography control act, 2012 (PCA). The purpose of this essay is to analyze the article, discuss my points of agreement which include common effects (destroying reputation, create fear, harassing etc.) of cyber crime and also discuss my points of disagreements of which include cyber crime not only women centered. Reading the article has made it...
Words: 698 - Pages: 3
...Ahmed 3rd Batch [CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case study regarding crime in cyber café …………………………….…...
Words: 6680 - Pages: 27
...Efficiencies of Cyber law in Bangladesh জুন 26, 2011 0 inShare Technology is getting more frequently used and seems like a blessing going cover Bangladesh. But sometimes we can see some bad- naughty peoples use the same technology to make crime in the cyber area. As well as day by day Cyber crimes are increasing in the world as well as our country. Therefore in Bangladesh a bundle of laws has been enacted to protect the people. Cyber law in Bangladesh In the Information Communication Technology Act of Bangladesh does not define what the Cyber law by any section is. But Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The said Act enable (a) Legal recognition of electronic transaction, (b) Legal recognition of digital signature, (c) Acceptance to con- tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of the crime relation with information Communication Technology. Objectives of the ICT Act, 2006 The objectives of the ICT Act, 2006 has been provided following purposes such as To smooth the progress of electronic filing of documents...
Words: 695 - Pages: 3
...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...
Words: 6414 - Pages: 26
...Cyber and technology related crime is on the increase and current trends indicate that itwill be a significant issue in Bangladesh. It has already been seen that a glomming threatbecomes visible in the arena of information technology. Recently the hacking of RABwebsite and e-mail threats of former prime minister are example for few of them.In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safeside to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information andCommunication Technology act is not the concert one. By enacting this act, there is achance to become safe side after committing crimes. So, considering these facts acomprehensive Cybercrime Protection Act should be imposed.This report incorporates the impacts of cybercrime in Bangladesh especially focuses onthe area of Personal life, Workplace as well as Policy making Bodies or thinkers. Webelieve the report would help all relevant concerns and especially policy makers Computer literacy in Bangladesh is steadily on the rise. There is also a growing number of Internet users; cellular phone is widespread and so is accessibility of technology like SMS. While even a few years ago computers were vastly used as digital ‘typewriters’, they are now being employed to maintain accounts worth tens of millions of takas and more importantly...
Words: 299 - Pages: 2
...theory and practice for developing a knowledge and technology based police by integrating governance, social system, crime aspects and technology. I have had my graduation in Political Science along with a Diploma in ICT and DDD (Database Design and Development). Moreover I have an international certification as named OCP (Oracle Certified Professional) along with comprehensive more than three year experience in programming. Thus I want to re-rearrange my past educational and professional career in ICT Sector in the framework of rising usages of ICT and good governance. The focal areas should be E-POLICING, E-GOVERNANCE, New Approaches of Information War (HACKING), Information Technology based Crime (Cyber Crime) etc. Police Reform Program is now running in its second phase to enhance policing in Bangladesh. I want to be a key player to reform Bangladesh Police with the help of Information Management Technology and Techniques. This post graduate course is a rich one in the area of IT related post graduate courses. This university has a great reputation in the world context as being the top ranked technology based educational institute. However in the previous column I mentioned my career objectives in the light of current technology based policing. The present government of Bangladesh has a keen interest on digitalization of government works. We the Bangladesh Police is also trying to foster its functioning with the use of newly emerged technology like information technology...
Words: 391 - Pages: 2
...INFORMATION TECHNOLOGY AND CRIME: AN ANALYSIS 1.Introduction In the era of technology all activities are being conducted with the help of technology in all over the world. Now it is considered that ‘information is power’ and so the widely used term ‘information’ is combined with ‘technology’ that encompasses the term ‘information technology’. Information technology generally means processing and distribution of data using computer hardware and software, telecommunications and digital electronics. So the common medium of information technology is computer, internet, and mostly used cellular phone. This system helps us take the optimum benefit from this ‘Global Ocean of knowledge’ that much our every day needs. The strength of internet in which everybody’s knowledge is open for use by everybody within a global village for better living standards. On the other hand crime is a social and economic phenomenon and is as old as the human society has become a legal concept and has the sanction of the law. So in combination the term of information technology and crime if positive relation then makes a definition that information technological crime is those facts which is made by digital way getting economical and social benefit illegally and legally prohibited by law, on the other hand if opposite relation then make definition is a method if reducing crime by digital way in the digital era. From the view of positive technology stimulates not only a free trade and economic...
Words: 5282 - Pages: 22
...INFORMATION AND COMMUNICATION TECNNOLOGY ACT, 2006 Prepared for Md. Ziaul Haque Senior Lecturer, Dept. Of Business Administration East West University Prepared by Bus-361 Sec: 6 Name | ID | 1. Md.Musrukh Ruhaim | 2010-2-10-091 | 2. MD. Tajul Islam | 2011-2-10-240 | 3. MD. Naiem Bhuiyan | 2011-2-10-110 | 4. Sunjida Haque | 2010-2-10-355 | 5. Md.Mahfuzur Rahman | 2011-1-10-049 | 6. MD. Mahmudul Hasan | 2011-1-13-060 | Date of Submission: December-03, 2014 Acknowledgement We are very pleased to accomplish the assign task given by our honorable course instructor Md. Ziaul Haque on the subject “Legal Environment of Business”. We are very much obliged to those persons who gave their valuable time in the organization overview part, opinion and advice to complete this report. At first, our profound gratification goes to, Md. Ziaul Haque the honorable course instructor of Business Communication for his supervision to complete the assignment successfully. By providing us the opportunity of preparing this assignment, he has made us able to relate the academic knowledge of Business law with practical scenario. Not only this, he has also contributed much in this term paper by giving us proper guideline. We are acknowledging to all of those web sites from which we have taken necessary helps. Our gratitude also goes to some senior students for their guidance in various stages of completing the term paper and our...
Words: 12177 - Pages: 49
... there is a human right crisis of sexual abuse of millions of women, children and thousands of men in the prostitution & other form of sexual abuse. Child prostitution is the major part of total prostitution. Children are also involved in prostitution when they engage in sex in return for basic needs such as food, shelter or safety, or pocket money to purchase consumer goods. My paper explores the criminological factors associated with child prostitution in Bangladesh such as human trafficking and child prostitution, forced into prostitution, street children, broken home, social reintegration, livelihood and poverty, marital relationship and children in cyber world. My paper is based on secondary analysis and available studies, journals, reports and internet publications. Child and child prostitution concept To identify child prostitution first we have to know about the minimum age that has legal approval of child in Bangladeshi aspects. The definition of children is not uniform in the laws of Bangladesh....
Words: 3781 - Pages: 16
...Globalization has brought in many changes in the business scenario with the whole world inching towards a big market place. Communication between buyers and sellers become critical as each can opt to explore a greater number of alternatives than before. E-commerce through the use of internet, e-mails, websites and other facilities enables a businessman to be linked with every corner of the world and thus opens up greater opportunities in the world market. As a signatory of WTO practices Bangladesh has accepted The Code of Good Practices of WTO agreement on Technical Barriers to Trade. E-commerce facilitates the very process of International transactions; this involves securing and finalizing a contract, delivery of a product and finally payment for the performance of the product. The movement of goods and services and payment mechanism within a country and outside of a country is governed by regulatory and legal issues. Though Bangladesh Govt. has a strategic vision and policy framework to boost up e-commerce, a lot of factors are also hindering the way of doing E-commerce. Definition of E-Commerce: E-Commerce refers to the process of buying or selling products or service over an electronic network. The most popular medium in which e-commerce is conducted is the internet. It combines a range of process such as: • Electronic Data Interchange (EDI). • Electronic mail (E-mail). • World Wide Web (WWW). • Internet Applications. • Network Applications. ...
Words: 4033 - Pages: 17
...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...
Words: 8365 - Pages: 34
...ABSTRACT This paper gives an outline of the developing cybercrime issue and surveys two criminological speculations that have been connected to the investigation of cybercrime and cybercrime exploitation. Enactment which characterizes cybercrimes. Also gives the lawful base to arraigning such wrongdoings has been produced at both the government and state level. Numerous government law requirement orgs have offices that endeavor to battle a wide scope of PC unlawful acts from PC interruptions to licensed innovation burglary. This paper additionally surveys different meanings of cybercrimes and orders these unlawful acts into three general classes. It then goes ahead to analyze the current level of cybercrime exploitation for both organizations and people in internationally. Digital exploitation has influenced numerous people and organizations in the very states and this issue appears to have expanded as the utilization of PCs and the web expanded in the course of the most recent decade. In the wake of investigating the current level of cybercrime internationally in this paper inspects the use of restraint and routine movement hypothesis to the investigation of cybercrime. Both of these hypotheses can be connected to the investigation of PC wrongdoing and exploitation. We also going to take interview with some IT experts of software and network companies based on cybercrimes. At long last this paper closes with a few proposals for territories of future exploration. ...
Words: 1780 - Pages: 8
...http://en.wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a...
Words: 6044 - Pages: 25