SlideShare uma empresa Scribd logo
1 de 22
Presentation Topic
Present Trend of Cyber Crime in
Bangladesh: Regulatory Gaps
and Future Directions.
Presented To:
Dr. Jakerul Abedin
Department of Law & Justice,
Southeast University.
Presented By
Debashish Mojumder
Md. Main Uddin
Sohan Khan
Mahmudul Hasan
Md. Firoz Mahmud
Content
1. Introduction
2. What is Cyber Crime?
3. Internet and Cyber Crime
4. Types of Cyber Crime
5. Present Trend of Cyber Crime
6. Impact of Cyber Crime
7. Reasons of Cyber Crime
8. Cyber Law in Bangladesh
9. Regulatory Gaps
10. Necessary Legislations in Bangladesh to Tackle Cyber Crime
11. Conclusion
12. Future Directions or Recommendation
Introduction
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein
the computer either a tool or target or both.
 What is Cyber Crime?
Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the
victim directly or indirectly, using modern
telecommunication networks such as Internet and
mobile phones.
 Examples of Cyber Crime:
Copyright Infringement
Child Pornography
Piracy
Cyber extortion
Identity Theft
Phishing
Carding
 Internet Crime:
The Internet is known as the
World Wide Web. The Internet
may also be used to engage in
other activities such as sending
and receiving emails, trading
files, exchanging instant
messages, chatting online,
streaming audio and video, and
making voice calls.
 Examples of Computer Crimes:
Improperly accessing a computer, system, or network;
Modifying, damaging, using, disclosing, copying, or taking programs
or data;
Introducing a virus or other contaminant into a computer system;
Using a computer in a scheme to defraud;
Interfering with someone else's computer access or use;
Using encryption in aid of a crime;
Falsifying email source information; and
Stealing an information service from a provider.
 Types of Cyber Crime
CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER:
THE COMPUTER AS A TARGET: Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
THE COMPUTER AS A WEAPON: Using a computer to commit real world crimes.
E.g. Cyber Terrorism, Credit card frauds, Pornography etc.
TYPES OF CYBERCRIME:
1. Unauthorized use of a computer
2. Cybercrime may be committed by creating or releasing a malicious
computer program.
(E.g. computer virus, Trojan horse).
3. Cybercrime may be committed by stalking in cyberspace.
 BROAD CLASSIFICATION:
The subject of Cybercrime may be broadly classified into three groups. These are-
AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, online gambling, etc.
 Misuse of Information Technology
Unauthorized access and hacking
Virus dissemination
Software piracy
Credit card fraud
Illegal sales of articles
Email bombing
Email spoofing
Cyber deformation
Email spamming
Pornography
 Present Trend of Cyber Crime:
1. Bangladesh Bank Heist 2016
2. Skype Scandal over International War Crime Tribunal
3. Bangladesh Computer society website hacked in 2012
4. Stealing the transaction report of Dhaka Stock Exchange
5. Partho threatening prime minister Sheikh Hasina through
email in 2004
6. Inserting porn movies to the Bangladesh National
Parliament website.
 Impact of cyber crime:
1. Impact against individual
2. Impact against individuals property
3. Impact against organization
4. Impact against government
5. Impact against society
 Reasons of cyber crime:
1. Easy to access
2. Weak security
3. Negligence
4. Loss of evidence
5. Weak gateway security
6. Bad intention of uses Internet
7. Unfamiliarity of technology
8. Absence of proper filter
& Others
 Cyber Law in Bangladesh:
1. Bangladesh plans for strict Cyber-Crime laws
2. The Information and Communication
Technology Act, 2006
Drafted Act
1. The Digital Security Act, 2016
 Regulatory Gaps:
(i) The Act remains silent about various intellectual property rights like copy right, trade mark
and patent right of e-information and data.
(ii) The enactment has a major effect on e-commerce and m-commerce in Bangladesh. But it
keeps itself mum as to electronic payment of any transaction.
(iii) The legislation was initially supposed to be applied to crimes committed all over the
world; but nobody knows how this can be achieved in practice.
(iv) Spamming has become a peril in the west as such they have made anti spamming
provisions in cyber law. However, there is no anti spamming provision in our Act.
(v) Domain name is the major issue which relates to the internet world thoroughly. But the
ICT Act, 2006 does not define ‘domain name’ and the rights and liabilities relating to this.
(vi) The Act does not address any crime committed through using mobile phones.
(vii) This law made e-mails as evidence, conflicting with the country’s Evidence Act that does
not recognize as e-mails as evidence.
 Cyber Tribunal:
According to section 68 of the Information and Communication
Technology Act, 2006 for the speedy and effective disposal of
cases under this Act, Government shall establish one or more
cyber tribunal.
Cyber tribunal shall take a case for trial –
a) Upon the report of a police officer not below the rank of sub-
inspector or
b) Upon a complaint made by a controller appointed under this
Act or by any other person authorized by the controller.
 Cyber Appellate Tribunal:
The Government shall establish one or more cyber appellate
tribunal. The appellate tribunal shall be constituted by one
chairman and two members appointed by the Government.
They shall be appointed for 3-5 years.
Cyber Appellate Tribunal shall have no original jurisdiction.
It shall only hear and dispose of appeals from the order and
judgment of the Cyber Tribunal and Sessions Court in
appropriate cases. The decision of the appellate tribunal shall
be final.
 Conclusion:
Basically, no notable cyber crime has yet been committed in
Bangladesh. The gradual dependence and extensive use of computer
and information technology by the financial institutions like bank,
insurance company, and other non-government organizations
increase the fear of commission of cyber crime here. Computer has
been used as a tool of crime like making forged certificates and
documents for a number of years in Bangladesh though the incident
of targeting computer or computer system is very unusual.
 Future Directions:
suggest the government to enact cyber law in our country to prevent cyber
criminals from committing cyber crime in Bangladesh.
suggest Government to establish one digital forensic laboratory in our country for
investigation and detection of cyber crime.
urgent need to develop a cyber crime legislation that will protect cyber security in
Bangladesh.
Cyber police force is also needed in order to detect cyber criminals.
providing training for a group of professionals and developing software.
There is also a need to have more projects on cyber crime legislation and
enforcement capacity building and training courses through out the country.
Field Visit:
With Director of Legal & Licensing Division of BTRC
Thanks to All

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 

Semelhante a Present Trend of Cyber Crime in Bangladesh

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 

Semelhante a Present Trend of Cyber Crime in Bangladesh (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber law
Cyber lawCyber law
Cyber law
 

Último

Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 

Último (20)

Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 

Present Trend of Cyber Crime in Bangladesh

  • 1. Presentation Topic Present Trend of Cyber Crime in Bangladesh: Regulatory Gaps and Future Directions.
  • 2. Presented To: Dr. Jakerul Abedin Department of Law & Justice, Southeast University. Presented By Debashish Mojumder Md. Main Uddin Sohan Khan Mahmudul Hasan Md. Firoz Mahmud
  • 3. Content 1. Introduction 2. What is Cyber Crime? 3. Internet and Cyber Crime 4. Types of Cyber Crime 5. Present Trend of Cyber Crime 6. Impact of Cyber Crime 7. Reasons of Cyber Crime 8. Cyber Law in Bangladesh 9. Regulatory Gaps 10. Necessary Legislations in Bangladesh to Tackle Cyber Crime 11. Conclusion 12. Future Directions or Recommendation
  • 4. Introduction Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5.  What is Cyber Crime? Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones.
  • 6.  Examples of Cyber Crime: Copyright Infringement Child Pornography Piracy Cyber extortion Identity Theft Phishing Carding
  • 7.  Internet Crime: The Internet is known as the World Wide Web. The Internet may also be used to engage in other activities such as sending and receiving emails, trading files, exchanging instant messages, chatting online, streaming audio and video, and making voice calls.
  • 8.  Examples of Computer Crimes: Improperly accessing a computer, system, or network; Modifying, damaging, using, disclosing, copying, or taking programs or data; Introducing a virus or other contaminant into a computer system; Using a computer in a scheme to defraud; Interfering with someone else's computer access or use; Using encryption in aid of a crime; Falsifying email source information; and Stealing an information service from a provider.
  • 9.  Types of Cyber Crime CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER: THE COMPUTER AS A TARGET: Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. THE COMPUTER AS A WEAPON: Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc. TYPES OF CYBERCRIME: 1. Unauthorized use of a computer 2. Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse). 3. Cybercrime may be committed by stalking in cyberspace.
  • 10.  BROAD CLASSIFICATION: The subject of Cybercrime may be broadly classified into three groups. These are- AGAINST INDIVIDUALS A. Person & B. Property of an individual AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, online gambling, etc.
  • 11.  Misuse of Information Technology Unauthorized access and hacking Virus dissemination Software piracy Credit card fraud Illegal sales of articles Email bombing Email spoofing Cyber deformation Email spamming Pornography
  • 12.  Present Trend of Cyber Crime: 1. Bangladesh Bank Heist 2016 2. Skype Scandal over International War Crime Tribunal 3. Bangladesh Computer society website hacked in 2012 4. Stealing the transaction report of Dhaka Stock Exchange 5. Partho threatening prime minister Sheikh Hasina through email in 2004 6. Inserting porn movies to the Bangladesh National Parliament website.
  • 13.  Impact of cyber crime: 1. Impact against individual 2. Impact against individuals property 3. Impact against organization 4. Impact against government 5. Impact against society
  • 14.  Reasons of cyber crime: 1. Easy to access 2. Weak security 3. Negligence 4. Loss of evidence 5. Weak gateway security 6. Bad intention of uses Internet 7. Unfamiliarity of technology 8. Absence of proper filter & Others
  • 15.  Cyber Law in Bangladesh: 1. Bangladesh plans for strict Cyber-Crime laws 2. The Information and Communication Technology Act, 2006 Drafted Act 1. The Digital Security Act, 2016
  • 16.  Regulatory Gaps: (i) The Act remains silent about various intellectual property rights like copy right, trade mark and patent right of e-information and data. (ii) The enactment has a major effect on e-commerce and m-commerce in Bangladesh. But it keeps itself mum as to electronic payment of any transaction. (iii) The legislation was initially supposed to be applied to crimes committed all over the world; but nobody knows how this can be achieved in practice. (iv) Spamming has become a peril in the west as such they have made anti spamming provisions in cyber law. However, there is no anti spamming provision in our Act. (v) Domain name is the major issue which relates to the internet world thoroughly. But the ICT Act, 2006 does not define ‘domain name’ and the rights and liabilities relating to this. (vi) The Act does not address any crime committed through using mobile phones. (vii) This law made e-mails as evidence, conflicting with the country’s Evidence Act that does not recognize as e-mails as evidence.
  • 17.  Cyber Tribunal: According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. Cyber tribunal shall take a case for trial – a) Upon the report of a police officer not below the rank of sub- inspector or b) Upon a complaint made by a controller appointed under this Act or by any other person authorized by the controller.
  • 18.  Cyber Appellate Tribunal: The Government shall establish one or more cyber appellate tribunal. The appellate tribunal shall be constituted by one chairman and two members appointed by the Government. They shall be appointed for 3-5 years. Cyber Appellate Tribunal shall have no original jurisdiction. It shall only hear and dispose of appeals from the order and judgment of the Cyber Tribunal and Sessions Court in appropriate cases. The decision of the appellate tribunal shall be final.
  • 19.  Conclusion: Basically, no notable cyber crime has yet been committed in Bangladesh. The gradual dependence and extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations increase the fear of commission of cyber crime here. Computer has been used as a tool of crime like making forged certificates and documents for a number of years in Bangladesh though the incident of targeting computer or computer system is very unusual.
  • 20.  Future Directions: suggest the government to enact cyber law in our country to prevent cyber criminals from committing cyber crime in Bangladesh. suggest Government to establish one digital forensic laboratory in our country for investigation and detection of cyber crime. urgent need to develop a cyber crime legislation that will protect cyber security in Bangladesh. Cyber police force is also needed in order to detect cyber criminals. providing training for a group of professionals and developing software. There is also a need to have more projects on cyber crime legislation and enforcement capacity building and training courses through out the country.
  • 21. Field Visit: With Director of Legal & Licensing Division of BTRC