SlideShare uma empresa Scribd logo
1 de 22
Presentation Topic
Present Trend of Cyber Crime in
Bangladesh: Regulatory Gaps
and Future Directions.
Presented To:
Dr. Jakerul Abedin
Department of Law & Justice,
Southeast University.
Presented By
Debashish Mojumder
Md. Main Uddin
Sohan Khan
Mahmudul Hasan
Md. Firoz Mahmud
Content
1. Introduction
2. What is Cyber Crime?
3. Internet and Cyber Crime
4. Types of Cyber Crime
5. Present Trend of Cyber Crime
6. Impact of Cyber Crime
7. Reasons of Cyber Crime
8. Cyber Law in Bangladesh
9. Regulatory Gaps
10. Necessary Legislations in Bangladesh to Tackle Cyber Crime
11. Conclusion
12. Future Directions or Recommendation
Introduction
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein
the computer either a tool or target or both.
 What is Cyber Crime?
Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the
victim directly or indirectly, using modern
telecommunication networks such as Internet and
mobile phones.
 Examples of Cyber Crime:
Copyright Infringement
Child Pornography
Piracy
Cyber extortion
Identity Theft
Phishing
Carding
 Internet Crime:
The Internet is known as the
World Wide Web. The Internet
may also be used to engage in
other activities such as sending
and receiving emails, trading
files, exchanging instant
messages, chatting online,
streaming audio and video, and
making voice calls.
 Examples of Computer Crimes:
Improperly accessing a computer, system, or network;
Modifying, damaging, using, disclosing, copying, or taking programs
or data;
Introducing a virus or other contaminant into a computer system;
Using a computer in a scheme to defraud;
Interfering with someone else's computer access or use;
Using encryption in aid of a crime;
Falsifying email source information; and
Stealing an information service from a provider.
 Types of Cyber Crime
CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER:
THE COMPUTER AS A TARGET: Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
THE COMPUTER AS A WEAPON: Using a computer to commit real world crimes.
E.g. Cyber Terrorism, Credit card frauds, Pornography etc.
TYPES OF CYBERCRIME:
1. Unauthorized use of a computer
2. Cybercrime may be committed by creating or releasing a malicious
computer program.
(E.g. computer virus, Trojan horse).
3. Cybercrime may be committed by stalking in cyberspace.
 BROAD CLASSIFICATION:
The subject of Cybercrime may be broadly classified into three groups. These are-
AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, online gambling, etc.
 Misuse of Information Technology
Unauthorized access and hacking
Virus dissemination
Software piracy
Credit card fraud
Illegal sales of articles
Email bombing
Email spoofing
Cyber deformation
Email spamming
Pornography
 Present Trend of Cyber Crime:
1. Bangladesh Bank Heist 2016
2. Skype Scandal over International War Crime Tribunal
3. Bangladesh Computer society website hacked in 2012
4. Stealing the transaction report of Dhaka Stock Exchange
5. Partho threatening prime minister Sheikh Hasina through
email in 2004
6. Inserting porn movies to the Bangladesh National
Parliament website.
 Impact of cyber crime:
1. Impact against individual
2. Impact against individuals property
3. Impact against organization
4. Impact against government
5. Impact against society
 Reasons of cyber crime:
1. Easy to access
2. Weak security
3. Negligence
4. Loss of evidence
5. Weak gateway security
6. Bad intention of uses Internet
7. Unfamiliarity of technology
8. Absence of proper filter
& Others
 Cyber Law in Bangladesh:
1. Bangladesh plans for strict Cyber-Crime laws
2. The Information and Communication
Technology Act, 2006
Drafted Act
1. The Digital Security Act, 2016
 Regulatory Gaps:
(i) The Act remains silent about various intellectual property rights like copy right, trade mark
and patent right of e-information and data.
(ii) The enactment has a major effect on e-commerce and m-commerce in Bangladesh. But it
keeps itself mum as to electronic payment of any transaction.
(iii) The legislation was initially supposed to be applied to crimes committed all over the
world; but nobody knows how this can be achieved in practice.
(iv) Spamming has become a peril in the west as such they have made anti spamming
provisions in cyber law. However, there is no anti spamming provision in our Act.
(v) Domain name is the major issue which relates to the internet world thoroughly. But the
ICT Act, 2006 does not define ‘domain name’ and the rights and liabilities relating to this.
(vi) The Act does not address any crime committed through using mobile phones.
(vii) This law made e-mails as evidence, conflicting with the country’s Evidence Act that does
not recognize as e-mails as evidence.
 Cyber Tribunal:
According to section 68 of the Information and Communication
Technology Act, 2006 for the speedy and effective disposal of
cases under this Act, Government shall establish one or more
cyber tribunal.
Cyber tribunal shall take a case for trial –
a) Upon the report of a police officer not below the rank of sub-
inspector or
b) Upon a complaint made by a controller appointed under this
Act or by any other person authorized by the controller.
 Cyber Appellate Tribunal:
The Government shall establish one or more cyber appellate
tribunal. The appellate tribunal shall be constituted by one
chairman and two members appointed by the Government.
They shall be appointed for 3-5 years.
Cyber Appellate Tribunal shall have no original jurisdiction.
It shall only hear and dispose of appeals from the order and
judgment of the Cyber Tribunal and Sessions Court in
appropriate cases. The decision of the appellate tribunal shall
be final.
 Conclusion:
Basically, no notable cyber crime has yet been committed in
Bangladesh. The gradual dependence and extensive use of computer
and information technology by the financial institutions like bank,
insurance company, and other non-government organizations
increase the fear of commission of cyber crime here. Computer has
been used as a tool of crime like making forged certificates and
documents for a number of years in Bangladesh though the incident
of targeting computer or computer system is very unusual.
 Future Directions:
suggest the government to enact cyber law in our country to prevent cyber
criminals from committing cyber crime in Bangladesh.
suggest Government to establish one digital forensic laboratory in our country for
investigation and detection of cyber crime.
urgent need to develop a cyber crime legislation that will protect cyber security in
Bangladesh.
Cyber police force is also needed in order to detect cyber criminals.
providing training for a group of professionals and developing software.
There is also a need to have more projects on cyber crime legislation and
enforcement capacity building and training courses through out the country.
Field Visit:
With Director of Legal & Licensing Division of BTRC
Thanks to All

Mais conteúdo relacionado

Mais procurados

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh Mohiuddin Murad
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 

Mais procurados (20)

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 

Semelhante a Present Trend of Cyber Crime in Bangladesh

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptxmohdadil02912
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 

Semelhante a Present Trend of Cyber Crime in Bangladesh (20)

Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
P B Anil- Political Science ppt.pptx
P B Anil- Political Science  ppt.pptxP B Anil- Political Science  ppt.pptx
P B Anil- Political Science ppt.pptx
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Último

THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersJillianAsdala
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt2020000445musaib
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...PsychicRuben LoveSpells
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...SUHANI PANDEY
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 

Último (20)

THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 

Present Trend of Cyber Crime in Bangladesh

  • 1. Presentation Topic Present Trend of Cyber Crime in Bangladesh: Regulatory Gaps and Future Directions.
  • 2. Presented To: Dr. Jakerul Abedin Department of Law & Justice, Southeast University. Presented By Debashish Mojumder Md. Main Uddin Sohan Khan Mahmudul Hasan Md. Firoz Mahmud
  • 3. Content 1. Introduction 2. What is Cyber Crime? 3. Internet and Cyber Crime 4. Types of Cyber Crime 5. Present Trend of Cyber Crime 6. Impact of Cyber Crime 7. Reasons of Cyber Crime 8. Cyber Law in Bangladesh 9. Regulatory Gaps 10. Necessary Legislations in Bangladesh to Tackle Cyber Crime 11. Conclusion 12. Future Directions or Recommendation
  • 4. Introduction Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5.  What is Cyber Crime? Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones.
  • 6.  Examples of Cyber Crime: Copyright Infringement Child Pornography Piracy Cyber extortion Identity Theft Phishing Carding
  • 7.  Internet Crime: The Internet is known as the World Wide Web. The Internet may also be used to engage in other activities such as sending and receiving emails, trading files, exchanging instant messages, chatting online, streaming audio and video, and making voice calls.
  • 8.  Examples of Computer Crimes: Improperly accessing a computer, system, or network; Modifying, damaging, using, disclosing, copying, or taking programs or data; Introducing a virus or other contaminant into a computer system; Using a computer in a scheme to defraud; Interfering with someone else's computer access or use; Using encryption in aid of a crime; Falsifying email source information; and Stealing an information service from a provider.
  • 9.  Types of Cyber Crime CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER: THE COMPUTER AS A TARGET: Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. THE COMPUTER AS A WEAPON: Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc. TYPES OF CYBERCRIME: 1. Unauthorized use of a computer 2. Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse). 3. Cybercrime may be committed by stalking in cyberspace.
  • 10.  BROAD CLASSIFICATION: The subject of Cybercrime may be broadly classified into three groups. These are- AGAINST INDIVIDUALS A. Person & B. Property of an individual AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, online gambling, etc.
  • 11.  Misuse of Information Technology Unauthorized access and hacking Virus dissemination Software piracy Credit card fraud Illegal sales of articles Email bombing Email spoofing Cyber deformation Email spamming Pornography
  • 12.  Present Trend of Cyber Crime: 1. Bangladesh Bank Heist 2016 2. Skype Scandal over International War Crime Tribunal 3. Bangladesh Computer society website hacked in 2012 4. Stealing the transaction report of Dhaka Stock Exchange 5. Partho threatening prime minister Sheikh Hasina through email in 2004 6. Inserting porn movies to the Bangladesh National Parliament website.
  • 13.  Impact of cyber crime: 1. Impact against individual 2. Impact against individuals property 3. Impact against organization 4. Impact against government 5. Impact against society
  • 14.  Reasons of cyber crime: 1. Easy to access 2. Weak security 3. Negligence 4. Loss of evidence 5. Weak gateway security 6. Bad intention of uses Internet 7. Unfamiliarity of technology 8. Absence of proper filter & Others
  • 15.  Cyber Law in Bangladesh: 1. Bangladesh plans for strict Cyber-Crime laws 2. The Information and Communication Technology Act, 2006 Drafted Act 1. The Digital Security Act, 2016
  • 16.  Regulatory Gaps: (i) The Act remains silent about various intellectual property rights like copy right, trade mark and patent right of e-information and data. (ii) The enactment has a major effect on e-commerce and m-commerce in Bangladesh. But it keeps itself mum as to electronic payment of any transaction. (iii) The legislation was initially supposed to be applied to crimes committed all over the world; but nobody knows how this can be achieved in practice. (iv) Spamming has become a peril in the west as such they have made anti spamming provisions in cyber law. However, there is no anti spamming provision in our Act. (v) Domain name is the major issue which relates to the internet world thoroughly. But the ICT Act, 2006 does not define ‘domain name’ and the rights and liabilities relating to this. (vi) The Act does not address any crime committed through using mobile phones. (vii) This law made e-mails as evidence, conflicting with the country’s Evidence Act that does not recognize as e-mails as evidence.
  • 17.  Cyber Tribunal: According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. Cyber tribunal shall take a case for trial – a) Upon the report of a police officer not below the rank of sub- inspector or b) Upon a complaint made by a controller appointed under this Act or by any other person authorized by the controller.
  • 18.  Cyber Appellate Tribunal: The Government shall establish one or more cyber appellate tribunal. The appellate tribunal shall be constituted by one chairman and two members appointed by the Government. They shall be appointed for 3-5 years. Cyber Appellate Tribunal shall have no original jurisdiction. It shall only hear and dispose of appeals from the order and judgment of the Cyber Tribunal and Sessions Court in appropriate cases. The decision of the appellate tribunal shall be final.
  • 19.  Conclusion: Basically, no notable cyber crime has yet been committed in Bangladesh. The gradual dependence and extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations increase the fear of commission of cyber crime here. Computer has been used as a tool of crime like making forged certificates and documents for a number of years in Bangladesh though the incident of targeting computer or computer system is very unusual.
  • 20.  Future Directions: suggest the government to enact cyber law in our country to prevent cyber criminals from committing cyber crime in Bangladesh. suggest Government to establish one digital forensic laboratory in our country for investigation and detection of cyber crime. urgent need to develop a cyber crime legislation that will protect cyber security in Bangladesh. Cyber police force is also needed in order to detect cyber criminals. providing training for a group of professionals and developing software. There is also a need to have more projects on cyber crime legislation and enforcement capacity building and training courses through out the country.
  • 21. Field Visit: With Director of Legal & Licensing Division of BTRC