Course Content
Lecture 1 (Basic Concepts Cyber and ICT Act- BANGLADESH PERSPECTIVE)
• What is The Internet? • Who Controls the Internet? • What is The World Wide Web? • What’s the Relationship Between WWW and the Internet? • Understanding TCP/IP • Understanding HTML • Understanding HTTP • Uniform Resource Locators (URLs) • Web Hosting • Types of Hosting • How the Internet Works? • Where to Begin? • Internet Addresses • Protocol Stacks and Packets • Domain Names and Address Resolution • Application Protocols: HTTP and the World Wide Web • Application Protocols: SMTP and Electronic Mail • Transmission Control Protocol • Historical Background Of Internet • Growth of The World Wide Web • Growth of The Internet • Scope of Cyber Law • Definition of Cyber Law • Advantages of Cyber Law • Cyber Property • Cyber Jurisprudence • Why Cyber Laws • Strengths of the Information and Communication Technology Act, 2006 • Criticism and Weakness of the ICT Act, 2006 • Essentials of Cyber Laws for IT or ICT Professionals • What are Some of The Key Cyber Law Issues That You Think Must Be Taught and Addressed In Communication/Journalism Schools? • Classification of Cyber Law • Need for Cyber Law in Bangladesh • Historical Background of the Information and Communication Technology Law or Cyber Law • Sides of Cyber Law or ICT Act of Bangladesh • Cyber Law in Bangladesh • Objectives of the ICT Act, 2006 • What Does the ICT Act or Cyber Law Enable? • Definition of Various Terminology under Section 2 of the ICT Act, 2006 (internet; electronic mail; data; website; chairman; civil procedure; penal code; prescribed; verification; originator; regulation; criminal procedure; adjudicating officer; medium; licence; certifying authority; certification practice and description of procedure; signatory; signature generating machine; cyber tribunal; tribunal; cyber appeal tribunal; Digital Signature; Digital Signature Certificate; Electronic; Electronic Data Interchange; Electronic Form; Electronic Gazette; Electronic Record; Internet; Computer; Computer Network; Computer System; Computer Resource; Controller; Certifying Authority; Subscriber; Verify; Key Pair; Private Key; Public Key; Encryption; Decryption; Originator; Addressee; Intermediary; Cyber Offense; Access; Secure System; Security Procedure; Affixing Digital Signature; authentication service provider etc.)
0/31
Lecture 3 (DIGITAL SIGNATURE & ELECTRONIC RECORDS)
Lecture 3 (DIGITAL SIGNATURE & ELECTRONIC RECORDS)
0/2
Lecture 4 (Attribution, Acknowledgement, Dispatch & Attribution of Electronic Records [Sec 13-15]))
Lecture 4 (Attribution, Acknowledgement and Dispatch of Electronic Records Attribution of Electronic Record) • Attribution, Acknowledgement and Dispatch of Electronic Records Attribution of Electronic Record • Attribution of Electronic Record • Acknowledgement of Receipt
0/2
Lecture 5 (SECURE ELECTRONIC RECORDS & DIGITAL SIGNATURES) [Sec16-17]
Lecture 5 (SECURE ELECTRONIC RECORDS & DIGITAL SIGNATURES) SECURE ELECTRONIC RECORDS & DIGITAL SIGNATURES (Sec16-17)
0/3
Lecture 6 (CONTROLLER & CERTIFYING AUTHORITIES) [Sec 18-40]
Lecture 6 (CONTROLLER & CERTIFYING AUHORITIES (Sec 18-40)) CONTROLLER & CERTIFYING AUTHORITIES (Sec 18-40)
0/2
Lecture 7 (Duties of the Subscriber) [Sec 41-44]
Lecture 7 (Duties of the Subscriber) [Sec 41-44] Chapter VI of the ICT Act, 2006 DUTIES OF SUBSCRIBERS 41. Application of security procedure 42. Acceptance of Digital Signature Certificate 43. Presumption of represented information of obtaining Digital Signature Certificate 44. Control of safety measure of subscriber
0/2
Lecture 8 (BREACHING RULES, PREVENTION, PENALTIES ETC.) [Sec 45-53]
Lecture 8 (BREACHING RULES, PREVENTION, PENALTIES ETC. (Sec 45-53) 45. Power of Controller to give directions 46. Power of Controller to give directions in emergency 47. Power to announce protected systems 48. Penalty for failure to furnish document, return and report 49. Penalty for failure to file return, information, book etc. 50. Penalty for failure to maintain books of accounts or record 51. Residuary penalty 52. Power of Controller to issue prohibition of possible breaching of rules 53. Penalties
0/2
Lecture 9 (Offences & Penalties under ICT Act, 2006) [Sec 54-67]
Lecture 9 (Offences & Penalties under ICT Act, 2006)
0/2
Lecture 10 (Establishment of Cyber Tribunal, Investigation of Offences, Adjudication, Appeal Etc.) [Sec 68-81]
Lecture 10 (Establishment of Cyber Tribunal, Investigation of Offences, Adjudication, Appeal Etc.)
0/2
Lecture 11 (Establishment of Cyber Appellate Tribunal, Etc.)[Sec 82-84]
Lecture 11 (Establishment of Cyber Appellate Tribunal, Etc.)
0/2
Lecture 12 (Cyber Law Bangladesh-Public servants/Protection of action in good faith/Augmented use of few definitions used in few acts) [Sec 85-90]
Lecture 12 (Cyber Law Bangladesh-Public servants/Protection of action in good faith/Augmented use of few definitions used in few acts)
0/3
Lecture 13 (Digital Security Act, 2018 Repealed)
Lecture 13 (Digital Security Act, 2018 Repealed) • Assurance by Certifying Authority • Revocation of Digital Signature Certificate • Suspension of Digital Signature Certificate • Duties of Subscribers
0/6
Lecture 14 (Cyber Security Act, 2023 [Repealed])
Lecture 14 (Cyber Security Act, 2023 [Repealed]) • Penalties and Adjudication • Penalty for Failure to Furnish Document, Return or Report • Penalty for Failure to Maintain Books of Accounts or Records • Fine for Infringement of Rules or Regulations of ICT Act, 2006 • Crime and Investigation and Punishment • Investigation and adjudication of cyber crimes • Digital evidence • Methodology of Cyber Crime Investigation • Basic Investigation Techniques • Investigating Emails
Lecture 15 (Cyber Suroksha/Protection Ordinance, 2024)
Lecture 15 (Cyber Suroksha/Protection Ordinance, 2024) • ICT Act of 2006 to Cyber Suroksha/Protection Ordinance, 2024: Bangladesh’s Zombie Cyber Security Law A. POLITICAL AND LEGAL CONTEXT: ICT ACT B. POLITICAL AND LEGAL CONTEXT: DSA C. POLITICAL AND LEGAL CONTEXT: CSA D. POLITICAL AND LEGAL CONTEXT: CPO, 2024 E. IMPACT OF THE CPO ON ONGOING ICT ACT CASE • Objectives of the CPO, 2024 • Meaning of Computer Contaminant Objectives of the Cyber Protection Ordinance, 20204; Definition of Cyber Protection, cyber space, Tribunal, Agency, Council, Computer Emergency Response Team, computer system, computer data, traffic data, critical information infrastructure, digital, digital device, digital forensic lab, police officer, programme, Criminal Procedure, person, illegal access, Director General, malware, service provider; Application of the Act; Extra territorial application of the Act; Cyber Protection Agency- Establishment of Agency, Office, etc; Appointment of the Director General and the Directors, tenure; Manpower of the Agency; Preventive Measures- Power to remove or block some data-information; Emergency Response Team; Digital forensic lab; Quality control of digital forensic lab; Cyber Protection Council- National Cyber Protection Council; Power, etc. of the Council; Meeting, etc. of the Council; Critical Information Infrastructure- What is Critical information infrastructure; Monitoring and inspection of the safety of a critical information infrastructure; Offence and Punishment- Punishment for illegal access to any critical information infrastructure, etc.; Illegal access to computer, digital device, computer system, etc. and punishment; Damage of computer, computer system, etc. and punishment; Offence and Punishment of forgery on cyber space; Offence and Punishment of fraud on cyber space; Offence and punishment for committing cyber terrorism; Offence and punishment for e-transaction without legal authority; Offence and punishment for blackmailing and publishing obscene content; Publication of information in cyber space that hurts the religious values or sentiment; Abetment of committing an offence and punishment thereof; Offences and punishment for filing false cases, complaints, etc.; Offence committed by a company; Power to issue order for compensation; The service provider not to be responsible; Investigation of Offence and Trial- Investigation & of a police officer or Investigation Officer; Time-limit for investigation; Power of Investigation Officer; Search and seizure by warrant; Search, seizure and arrest without warrant; Preservation of information; Not to hamper the general usage of computer; Assistance in investigation; Secrecy of the information obtained in course of investigation; Filing of case and Cognizance of offence; Trial of offence and appeal; Application of the Code of Criminal Procedure, Evidence Act and Information & communication Technology Act; Evidentiary value of Cyber space; Taking opinion of experts, training, etc.; Time-limit for disposal of case; Offences to be cognizable/non-cognizable, bailable/non-bailable and compoundable; Forfeiture; Regional and International Cooperation; Power to make rules; Amendment and savings of the Act No. XXXIX of 2006/ICT Act, 2006.
0/11
Lecture 16 (Cyber Law & Cyber Crime: Hacking – Bangladesh Perspective)
Lecture 16 (Cyber Law & Cyber Crime: Hacking - Bangladesh Perspective) • Hacking With Computer System; Hacking Concepts; What is Hacking? - Who is a Hacker? -Hacker Classes- Hacking Phases: o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks • Ethical Hacking Concepts • What is Ethical Hacking? • Why Ethical Hacking is Necessary • Scope and Limitations of Ethical Hacking • Skills of an Ethical Hacker • Legal and Regulatory Framework: Understanding relevant laws and regulations regarding cybersecurity and ethical hacking practices
Lecture 18 (Regulation of Artificial Intelligent)
Lecture 18 (Cyber Law: Crime and Punishment for Unauthorized Access) • Crime and Punishment for Unauthorized Access to Protected Systems • How Does ICT Act Deal With Hacking? • Distinction Hacking Vs. Unauthorized Access
0/7
Lecture 20 (Development & Regulation of Blochchain)
Lecture 20 (Cyber Law: ICT ACT/Digital Security/Cyber Security/Cyber Suroksha, Offenses and Penalties) • Civil Offences under the ICT Act 2006 • Criminal Offences Stipulated by ICT Act 2006 • Criminal Offences Stipulated by DS Act 2018 (Repealed) • Criminal Offences Stipulated by Cyber Suroksha Ordinance 2024 • Offences under ICT ACT, 2006/Digital Security/Cyber Security/Cyber Suroksha Ordinance, 2024- Penalty and adjudication - Punishments for contraventions under those Laws (Case Laws, Rules and recent judicial pronouncements to be discussed) - Limitations of Cyber Law
0/1
Lecture 21 (Bangladesh Telecommunication Act, 2001)
Lecture 21 (Bangladesh Telecommunication Act, 2001) • Establishment of Cyber Tribunal, Enquiry, Trial and Appeal of Crimes Etc. • Establishment of Cyber Tribunal • Procedure of Trial of the Cyber Tribunal • The Application of Criminal Procedure in the Procedure of the Tribunal • Bail Rules • The Time Limit to Give Judgement • The Time Limit of Disputing a Case by the Tribunal • Justice by Session Court • The Power of Investigation of Crime Etc. • Are Cyber Crimes Considered as Cognizable or Non Cognizable? • Confiscation
0/2
Lecture 22 (Other Telecommunication Laws, Rules, Regulation etc.)
Lecture 22 (Other Telecommunication Laws, Rules, Regulation etc.) LEGAL REQUIREMENTS The legal statutes governing the telecommunication industry in Bangladesh which will be applicable to the Licensee are given below: (a) The Bangladesh Telecommunication Regulation Act, 2001 (as amended). (b) The Wireless Telegraphy Act, 1933 and The Telegraph Act, 1885, for matters which are not covered by the Bangladesh Telecommunication Regulation Act, 2001 (as amended). (c) The Bangladesh Telecommunication Regulatory Commission (Licensing Procedure) Regulations, 2004 (as amended). (d) The Bangladesh Telecommunication Regulatory Commission (Interconnection) Regulations, 2004 (as amended). (e) The Information and Communication Technologies Act,2006 (0 Any other Act, Ordinance, Order, Rules, Regulation(s), by law(s) or any other law being in force in Bangladesh. (g) The Guidelines/Directives/Orders and Decisions issued under the Bangladesh Telecommunication Regulation Act, 200 1 . (h) The related Act, Ordinance, Order, Rules, Regulation(s), by law(s), Guidelines/Directives/Orders and Decisions issued in the countries where the services of the Licensee are feasible. Laws Bangladesh Telecommunication Act, 2001 (With Amendments) The Wireless Telegraphy Act, 1933 The Telegraph Act, 1885 নীতিমালা জাতীয় টেলিযোগাযোগ নীতিমালা ২০১৮ আইএলডিটিএস নীতিমালা ২০১০ টেলিকম পলিসি ১৯৯৮ আইসিটি পলিসি বাংলাদেশ টেলিযোগাযোগ নিয়ন্ত্রণ (লাইসেন্স) প্রবিধানমালা, ২০২২ গাইডলাইন ITC Amendment 1 (19-02-2025) ও IIG Amendment 3 (19-02-2025) International Terrestrial Cable (ITC) লাইসেন্সিং গাইডলাইন এর ক্লজ সংশোধন প্রসঙ্গে। .bd & .bangla ডোমেইন অপারেশন এবং অ্যাডমিনিস্ট্রেশন -..bd এবং .বাংলা-এর জন্য ডোমেন অ্যাডমিনিস্ট্রেশন গাইডলাইন স্যাটেলাইট অপারেটর - বাংলাদেশে স্যাটেলাইট অপারেটরের জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন Regulatory and Licensing Guidelines For Non-Geostationary Orbit (NGSO) Satellite Services Operator In Bangladesh ভিওআইপি পরিষেবা প্রদানকারী (VoIP)- VoIP পরিষেবা প্রদানকারীর জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন ইন্টারন্যাশনাল টেরেস্ট্রিয়াল ক্যাবল (ITC) সিস্টেম এবং পরিষেবা - ইন্টারন্যাশনাল টেরেস্ট্রিয়াল কেবল (ITC) সিস্টেম এবং পরিষেবার জন্য লাইসেন্সিং গাইডলাইন Cellular Mobile Services - Regulatory and Licensing Guidelines for Cellular Mobile Services in Bangladesh 4G – LTE- 4G - LTE রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন 3G - 3G সেলুলার মোবাইল ফোন পরিষেবাগুলির জন্য লাইসেন্সিং গাইডলাইন সেলুলার মোবাইল ফোন অপারেটর- সেলুলার মোবাইল ফোন অপারেটরের জন্য লাইসেন্সিং গাইডলাইন আইএসপি (ISP) -বাংলাদেশে ইন্টারনেট সার্ভিস প্রোভাইডার (ISP) এর জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন Declaration/ Undertaking (Appendix-4) পিএসটিএন (PSTN)- PSTN লাইসেন্স আবেদনের তথ্য এবং নির্ধারিত লাইসেন্সের আবেদনপত্রের জেনেরিক ফর্মের জন্য রেগুলেটরি ও লাইসেন্সিং গাইডলাইন সেন্ট্রাল জোন, বাংলাদেশের পিএসটিএন পরিষেবাগুলি প্রতিষ্ঠা, পরিচালনা এবং রক্ষণাবেক্ষণের জন্য বেসরকারী অপারেটরকে জোনাল লাইসেন্স প্রদানের জন্য প্রস্তাব/অফারের জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন জোনাল PSTN থেকে জাতীয় PSTN লাইসেন্সে রূপান্তর প্রক্রিয়া মোবাইল নম্বর পোর্টেবিলিটি সার্ভিস (MNPS) -মোবাইল নম্বর পোর্টেবিলিটি পরিষেবার জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন বাংলাদেশে মোবাইল নম্বর পোর্টেবিলিটি পরিষেবা এবং মোবাইল নম্বর পোর্টেবিলিটি পরিষেবার অপারেটর লাইসেন্সের রেগুলেটরি ও লাইসেন্সিং এর সংশোধিত গাইডলাইনে সংশোধন বাংলাদেশে মোবাইল নম্বর পোর্টেবিলিটি পরিষেবার জন্য রেগুলেটরি ও লাইসেন্সিং গাইডলাইনে সংশোধন/পরিবর্তন Vehicle Tracking Services -Licensing guidelines for issuing license for establishing, operating and maintaining vehicle tracking services/ Vehicle Tracking Services (VTS) গাইডলাইেনর Clause No. 6.01(i) সংশোধন প্রসঙ্গে IP Telephony -Licensing Guidelines for Internet Protocol Telephony Service Provider License/ Amandment (28.03.2022) Performance Bank Guarantee (PBG) এর ফরম্যাট - Appendix-8: Affidavit -Form-1 NTTN- Licensing Guidelines for Nationwide Telecommunication Transmission Network Amendment/Change in the Regulatory and Licensing guidelines for Nationwide Telecommunication Transmission Network in Bangladesh. IIG- Regulatory and Licensing Guidelines for Invitation of Offers/Proposals for Issuing License for Establishing, Operating and Maintaining International Internet Gateway (IIG) Services in Bangladesh 2011/ Amendment1(08-04-2013) / Amendment1(29-03-2023) IGW- Regulatory and Licensing Guidelines for Invitation of Offers or Proposals for Issuing License for Establishing, Operating and Maintaining International Gateway (IGW) Services in Bangladesh with Amendments/ Amendment1( 21-10-2020) / Amendment2 (30-04-2022) / Amendment1(29-03-2023) ICX- Regulatory and Licensing Guidelines for Invitation of Offers or Proposals for Issuing License for Interconnection Exchange (ICX) Services Establishing, Operating and Maintaining in Bangladesh with Amendments Broadband Wireless Access- Guideline for issuing, operating and maintaining broadband wireless access Service/ Amendment1(03.10.2013) Radio Frequency- Guideline for application of new frequency assignment Wi Fi- Guidelines for use of Wireless Fidelity Technology বিপিও/কল সেন্টার- বিপিও/কল সেন্টার নির্দেশিকা VSAT- License Guidelines for domestic VSAT Hub Operator/ Regulatory and Licensing Guidelines for VSAT HUB Operator and VSAT User Infrastructure Sharing- Guideline for Infrastructure sharing Tower Sharing- Regulatory and Licensing Guidelines for Issuing License for Tower Sharing in Bangladesh Submarine Cable System- Licensing guideline to build, operate and maintain Submarine Cable System in Bangladesh/ Ammendment1 (15.04.2021)/ Ammendment2(10.01.2022)/ Ammendment3(14.02.2022) Amateur Radio Operator License- Amateur Radio operator Test Syllabus/ Amateur Radio Operator License Provisions and Conditions National Internet Exchange (NIX)- Licensing Guidelines for Issuing License to National Internet Exchange (NIX) টেলিকমিউনিকেশন ভ্যালু অ্যাডেড সার্ভিস (টিভিএএস)- বাংলাদেশে টেলিকমিউনিকেশন ভ্যালু অ্যাডেড সার্ভিস (টিভিএএস) প্রদানের লক্ষ্যে রেজিস্ট্রেশন সার্টিফিকেট জারির জন্য রেগুলেটরি গাইডলাইন Landing Rights for Broadcasting Satellite Service- Regulatory Guidelines on Landing Rights for Broadcasting Satellite Service In Bangladesh ডিরেক্টিভস্ বাংলাদেশের আন্তর্জাতিক সীমান্তবর্তী অঞ্চলসমূহে বিটিএস স্থাপন সংক্রান্ত নির্দেশিকা - ২০২৫ জারিকৃত 02-12-2024_ক্যাশ সার্ভার স্থাপন সংক্রান্ত নির্দেশনা জারিকৃত 17-11-2024_অব্যবহৃত সিমের পুনরায় বিক্রয়ের (Recycle) মেয়াদ সংক্রান্ত নির্দেশিকা জারিকৃত 06-02-2024_মোবাইল অপারেটরদের সহযোগিতায় বিনামূল্যে সরকারি তথ্য (Govt. Info) এসএমএস প্রেরণ সংক্রান্ত নির্দেশিকা-২০২৪ জারিকৃত 15-09-2024_বেতার যন্ত্রপাতি আমদানি, ব্যবহার, বাজারজাতকরণ এবং তালিকাভুক্তি সনদ গ্রহণের নির্দেশিকা-২০২৪ জারিকৃত 09-09-2024_স্থানীয়ভাবে মোবাইল হ্যান্ডসেট সংযোজন ও উৎপাদনের কারখানা স্থাপনের নির্দেশিকা-২০২৪ ৫৯২৫-৬৪২৫ মেগাহার্জ তরঙ্গ ব্যান্ড Shared ভিত্তিতে ব্যবহার সংক্রান্ত সার্কুলার প্রচার প্রসঙ্গে। এটুপি এসএমএস এগ্রিগেটর অভ্যন্তরীণ (Domestic) সেবা প্রদানকারী প্রতিষ্ঠানসমূহের (এসএমএস এগ্রিগেটর) তালিকাভুক্তি ও পরিষেবার নির্দেশিকা আইএসপি কর্তৃক বেতার তরঙ্গ ও বেতার যন্ত্রপাতি ব্যবহার সংক্রান্ত নির্দেশিকা টেলিকম ই-বর্জ্য ব্যবস্থাপনা ও রিসাইক্লিং সিস্টেম সংক্রান্ত নির্দেশিকা মোবাইল ফোন অপারেটরসমূহের ডাটা এবং ডাটা সংশ্লিষ্ট প্যাকেজ সম্পর্কিত নির্দেশিকা-২০২৩ আইএসপি অপারেটর কর্তৃক যথাযথভাবে IP Log সংরক্ষণ সংক্রান্ত নির্দেশনা সেলুলার মোবাইল ফোন অপারেটরসমূহের ডাটা এবং ডাটা সংশ্লিষ্ট বিভিন্ন প্যাকেজ সম্পর্কিত ডিরেক্টিভস মোবাইলফোন হ্যান্ডসেট ব্যতীত টেলিযোগাযোগ সেবা সংশ্লিষ্ট অন্যান্য যন্ত্রপাতি স্থানীয়ভাবে সংযোজন ও উৎপাদন কারখানা স্থাপনের নির্দেশিকা বাংলাদেশের আন্তর্জাতিক সীমান্তবর্তী অঞ্চলসমূহে বিটিএস স্থাপন সংক্রান্ত নির্দেশিকা-২০২১ কর্পোরেট সিম রেজিস্ট্রেশন অটোমেশন (CSRA) সিস্টেমের জন্য নির্দেশাবলী ISP-এর জন্য PoP (Point of Presence) ইনস্টলেশন সংক্রান্ত নির্দেশাবলী A2P এসএমএস সার্ভিস প্রোভাইডার (এসএমএস অ্যাগ্রিগেটর) তালিকাভুক্তির জন্য নির্দেশিকা IPTSP অপারেটরদের মোবাইল অ্যাপ্লিকেশন ভিত্তিক কলিং পরিষেবা (OTT) সংক্রান্ত নির্দেশাবলী কমিশন হতে অপারেশন কার্যক্রম পরিদর্শনকালে প্রাপ্ত বিভিন্ন ব্যত্যয়/অসামঞ্জস্যতা প্রসঙ্গে বাংলাদেশে এমাচার রেডিও ব্যবহার পদ্ধতির সংশোধিত নির্দেশাবলী বাংলাদেশে মোবাইল ফিনান্সিয়াল সার্ভিসের নির্দেশিকা ANS অপারেটরের Quality of Service প্রবিধান, ২০১৮ বাংলাদেশে IoT ডিভাইস আমদানির নির্দেশনা বিদ্যমান CDMA 800 MHz ব্যান্ড স্পেকট্রামকে Technology Neutral স্পেকট্রামে রূপান্তর করার নির্দেশিকা বাণিজ্যিক টোল ফ্রি পরিষেবার নির্দেশিকা ভার্চুয়াল প্রাইভেট নেটওয়ার্কে (VPN) সংশোধিত নির্দেশাবলী কর্পোরেট ভিডিও কনফারেন্সিংয়ের জন্য সংশোধিত নির্দেশিকা মোবাইল ফিনান্সিয়াল সার্ভিসেস (MFS) এর এয়ারটাইম ব্যবহারের জন্য নির্দেশাবলী এসএমএস ভিত্তিক প্রিমিয়াম রেট পরিষেবাগুলির নির্দেশাবলী বাংলাদেশে মোবাইল ফোন হ্যান্ডসেট অ্যাসেম্বলিং অ্যান্ড ম্যানুফ্যাকচারিং প্ল্যান্ট স্থাপনের নির্দেশনা (সংশোধনী-১) সেলুলার মোবাইল টেলিকম অপারেটরদের জন্য Quality of Service (QoS) পরিষেবার গুণমানের নির্দেশিকা ISP সংক্রান্ত নির্দেশনা (নং-৪০২, তারিখ: ১৩-০৩-২০১৬) IIG সংক্রান্ত নির্দেশনা (নং-৩৩৯, তারিখ: ১০-০৩-২০১৬) ISP সংক্রান্ত নির্দেশনা (নং-১৬৮৩, তারিখ: ১৮-১০-২০১৫) IIG সংক্রান্ত নির্দেশনা (নং-১৬৩৫, তারিখ: ০৩-১০-২০১৫) IIG সংক্রান্ত নির্দেশনা (নং-১৭৪৯, তারিখ: ২৩-১০-২০১৪) বিপিও/কল সেন্টার (আন্তর্জাতিক এবং দেশীয়) পরিচালনার জন্য তালিকাভুক্তি সার্টিফিকেট প্রদানের নির্দেশাবলী বাংলাদেশে 2.4 এবং 5.7 GHz ব্যান্ডের মাধ্যমে সেবা প্রদানের নির্দেশনা বাংলাদেশে স্যাটেলাইট ফোন ব্যবহারের জন্য নির্দেশাবলী RUIM-SIM-এর Post Activation এবং টেলিফোন-মোবাইলের গ্রাহক নিবন্ধনের নির্দেশাবলী বেআইনি কল টার্মিনেশন, RUIM-SIM রেজিস্ট্রেশন এবং বায়োমেট্রিক ভেরিফিকেশন সংক্রান্ত নির্দেশাবলী Emergency Balance সংক্রান্ত নির্দেশাবলী বায়োমেট্রিক Verification সিস্টেমের নির্দেশাবলী বায়োমেট্রিক Verification বাস্তবায়ন পরিকল্পনার নির্দেশাবলী
0/1
Lecture 23 (Cyber Law: Immunity to Internet Service Providers (ISPs)
Lecture 23 (Cyber Law: Immunity to Internet Service Providers (ISPs) • Immunity to Internet Service Providers (ISPs) • Network Service Provider/ Internet Service Providers (ISPs) • Draconian Powers to Police Officers • Arrest without Warrant or Not • Establishment of Cyber Appeal Tribunal • Procedure and Powers of Cyber Appellate Tribunal
Lecture 24 (Cyber Law: Contract Act, 1872)
Lecture 24 (Cyber Law: Contract Act, 1872) • Cyber Legislation and Legal Issues - The Contract Act, 1872 • Use of Cyber Cafés by Minors • Cyber Legislation and Legal Issues- Tort Liability and Remedies in Cyberspace • Cyber Legislation and Legal Issues - Trespass to Chattels • Cyber Torts: Cyber Defamation; Cyber Negligence; Cyber Nuisance; Cyber Trespass; Cyber Liability • Different types of civil wrongs under the ICT Act, 2006 and the Digital Security Act, 2018 (Repealed)/ the Cyber Security Act, 2023(Repealed)/ the Cyber Suroksha Ordinance, 2024.
Lecture 25 (Cyber Law: The Sale of Goods Act 1930)
Lecture 25 (Cyber Law: The Sale of Goods Act 1930) • Cyber Legislation and Legal Issues- The Sale of Goods Act 1930
Lecture 26 (Cyber Law: Penal Legislation -Bangladesh Perspective)
Lecture 26 (Cyber Law: Penal Legislation -Bangladesh Perspective) • Cyber Legislation and Legal Issues - The Penal Code, 1860 • Cyber Legislation and Legal Issues - The Police Act, 1861
Lecture 27 (Cyber Law: Evidence Act, 1872)
Lecture 27 (Cyber Law: Evidence Act, 1872) • Cyber Legislation and Legal Issues The Evidence Act, 1872 • Cyber Legislation and Legal Issues The Bankers' Books Evidence Act, 1891 • Cyber Legislation and Legal Issues The Bangladesh Bank Order, 1972
Lecture 28 (Cyber Law: Copyright Act, 2000)
Lecture 28 (Cyber Law: Copyright Act, 2000) • Cyber Legislation and Legal Issues The Copyright Act, 2000 • Cyber Legislation and Legal Issues The Telegraph Act, 1885
Lecture 29 (Cyber Law and Internet Taxation)
Lecture 29 (Cyber Law and Internet Taxation) • Cyber Legislation and Legal Issues- The Bangladesh Tax Ordinance, 1984 • Internet Taxation and Cyber Law • VAT vs. Internet • Sales Tax vs. Internet
Lecture 30 (Cyber Law: Consumer Protection Act, 2009)
Lecture 30 (Cyber Law: Consumer Protection Act, 2009) • Cyber Legislation and Legal Issues The Consumer Protection Act, 2009 • Consumer Protection Laws and Cyber Law
Lecture 31 (Cyber Law: Other Laws)
Lecture 31 (Cyber Law: Other Laws) Cyber Legislation and Legal Issues - Other Laws
Lecture 32 (Cyber Law: Constitutional & Human Rights Issues in Cyberspace)
Lecture 32 (Cyber Law: Constitutional & Human Rights Issues in Cyberspace) • Constitutional & Human Rights Issues in Cyberspace: Freedom of speech and expression in cyberspace • Right to access cyberspace Access to Internet • Right to privacy • Right to data protection
Lecture 33 (Cyber Law: Cyber Jurisdiction)
Lecture 33 (Cyber Law: Cyber Jurisdiction) Cyber Law and Jurisdiction: concept of jurisdiction in cyber law; Issues of the jurisdiction in cyberspace; Multi Jurisdictional or Cross Border Problem; Prerequisites of Jurisdiction in Cyberspace; Theories of Cyberspace Jurisdiction; Types of Cyber Jurisdiction: Cyber jurisdiction in National Cases: Cyber Jurisdiction in Civil Cases- Cyber Jurisdiction in Criminal Cases; Cyber jurisdiction in International Cases; The Test evolved of Jurisdictional Aspects in Cyber Law: Minimum Contacts Theory- Sliding Scale Theory; Effects Test and International Targeting: Extra Regional Effect of Cyber Law & Jurisdiction under ICT Act, 2006
Lecture 34 (Cyber Law: Regional and Global Perspective)
Lecture 34 (Cyber Law: Regional and Global Perspective) • Status of Cyber Laws: Regional and Global Perspective • International Laws & Conventions on Cyber Law • Cyber Related Laws in Other Developed Countries • Cyber Law: Regulation of cyberspace and need for cyber law • Cyber jurisprudence at international and domestic level • International perspectives - UN and International Telecommunication Union (ITU) • Initiatives: Council of Europe-Budapest Convention on Cybercrime-Asia Pacific Economic Cooperation (APEC)-Organization for Economic Co operation and Development (OECD)-World Bank-Commonwealth of Nations.
Lecture 35 (Cyber Law – USA)
Lecture 35 (Cyber Law - USA) • Development of Cyber Laws in USA • Cyber Privacy Laws in USA • Anti Spam Legislation in USA • Copyright Law in USA
Lecture 36 (Cyber Law – Australia)
Lecture 36 (Cyber Law - Australia) Cyber Related Laws in Australia EU Data Protection Laws
Lecture 37 (Cyber Law – Other States)
Lecture 37 (Cyber Law – Other States) • Cyber Related Laws in Japan • Cyber Related Laws in Singapore • Cyber Related Laws in Malaysia
Lecture 39 (Cyber Law: UNCITRAL Model Laws)
Lecture 39 (Cyber Law: UNCITRAL Model Laws) • United Nations Resolutions • UNCITRAL Model Laws • United Nations Commission on International Trade Law (UNCITRAL) • UNCITRAL Model Law on Electronic Commerce with Guide to Enactment 1996 With additional article 5 bis as adopted in 1998 • UNCITRAL Model Law on Electronic Signatures with Guide to Enactment 2001 • United Nations Convention on the Use of Electronic Communications in International Contracts • OECD Guidelines • ICAAN • WIPO, ITU, & WTO
Lecture 40 (Cyber Law: Intellectual Property Issues in Cyber Space)
Lecture 40 (Cyber Law: Intellectual Property Issues in Cyber Space) • The Nature of Cyberspace • Intellectual Property Issues in Cyber Space: Interface with copyright law Interface with patent law • Understanding The System of Domain Names • Trademarks and domain names related issues • Legality of P2P file sharing.
Lecture 41 (Cyber Law: Copyright Protection in Cyberspace)
Lecture 41 (Cyber Law: Copyright Protection in Cyberspace) • Copyright Protection in Cyberspace • Why Is Copyright Ill Equipped to Deal with The Internet? • How Do Copyright Issues and Challenges for Newspapers And Broadcast Media Change In Cyberspace?
Lecture 42 (Cyber Law: Copyright in the Digital Media)
Lecture 42 (Cyber Law: Copyright in the Digital Media) • Copyright in the Digital Media • Copyright & Cyberspace • Nature of Copyright in Cyberspace • Fair use and Infringement • Copyright issues in Digital Media • Hyper linking • Caching • Framing etc. • International Copyright Laws
Lecture 43 (Cyber Law: Patents in the Cyber World)
Lecture 43 (Cyber Law: Patents in the Cyber World) • Patents in the Cyber World • Nature of Patent Rights • Patents in the Digital Environment • Procedure of Obtaining Patents • Difference between Copyright and Patents • Patenting of Business Methods
Lecture 44 (Cyber Law – Trademark in Cyberspace)
Lecture 44 (Cyber Law - Trademark in Cyberspace) • Trademark in Cyberspace • Trademark law & Cyberspace • Trademarks Protection in Cyberspace • aw relating to Semiconductor Layout & Design
Lecture 45 (Cyber Law: Domain Names)
Lecture 45 (Cyber Law: Domain Names) • Domain Names and Related issues • Understanding the system of domain names • Different Perspectives • What Is Cybersquatting? • Cyber Squatting and Trademark Infringement • URDP and Cyber Squatting
Lecture 46 (Cyber Law – Privacy and Freedom)
Lecture 46 (Cyber Law - Privacy and Freedom) • Privacy and Freedom- Issues in the Cyber World • Nature of Privacy Rights • Cyber Stalking • Use of Cookies • Privacy Invasion by Government • Privacy Invasion by Employer • Freedom of Speech Vs Privacy Rights, Spam etc • E Government and E governance • Legal Issues in E Governance
Lecture 17 (Cyber Law: Cyber Pornography and Privacy)
Lecture 17 (Cyber Law: Cyber Pornography and Privacy) • Cyber Pornography and Privacy • Child Pornography • Online Pornography • Online Pornography in Bangladesh • Online Obscenity- Is It More Permissive Than USA?
Lecture 47 (Cyber Law – Electronic Commerce)
Lecture 47 (Cyber Law - Electronic Commerce) • Electronic Commerce: Concept • e-Commerce in Bangladesh • Overview of e Commerce • E commerce Salient Features • The Promising Significance of e Commerce • Dimensions of E Commerce • Online approaches like B2B, B2C & C2C • The Growth and Potential of E Commerce in Bangladesh • The Bottlenecks of e Commerce • The Regulatory and Legal Environment of E Commerce • Communication of offer and acceptance in cyberspace • UNCITRAL Model Law on Electronic Commerce
Lecture 48 (Cyber Law: e Banking)
Lecture 48 (Cyber Law: e Banking) • e Banking: e Banking in Bangladesh • Growth and Uses of e Banking in Bangladesh • Tele-Banking Service in Bangladesh • Challenges of Development of e Banking in Bangladesh • Internet Banking in Bangladesh
Lecture 49 (Cyber Law: Electronic Contracts/ Online contracts)
Lecture 49 (Cyber Law: Electronic Contracts/ Online contracts) • Electronic Contracts/ Online contracts • The Essence of Digital Contracts/ Online contracts • Defining a Digital Contract/ Online contracts • Formation of Digital Contracts/ Online contracts • Classification of Electronic Contracts/ Online contracts Click wrap contracts • United Nations Convention on the Use of Electronic Communications in International Contracts • Applicability of the Contract Act, 1872. • Special issues relating to Cyber contracts • What is Meant by Online Contracts • Evidentiary Value of Online Contracts
Lecture 50 (Cyber Law: Digital Signatures)
Lecture 50 (Cyber Law: Digital Signatures) • The System of Digital Signatures • Technology of Digital Signatures, Hash, Asymmetric Cryptography • Digital Signatures legal issues • Digital Signatures technical issues
Lecture 51 (Cyber Law – Forensic Tools and Electronic Evidence)
Lecture 51 (Cyber Law - Forensic Tools and Electronic Evidence) Forensic Tools and Processing of Electronic Evidence: Modern forensic tools, usages, and risks; Usage of Slack space; Tools for Disk Imaging and Data Recovery; Vulnerability Assessment and associated tools; Encase and FTK tools; Anti Forensics and probable counters; Vulnerability Assessment and associated tools; Encase and FTK tools; Anti Forensics and probable counters. Information retrieving and processing: Retrieving information and processing; Process of computer forensics and digital investigations; Processing of digital evidence, multimedia evidence, and digital images; Damaged SIM and data recovery; Retrieving and Processing of deleted data (desktops, laptops, mobiles, etc.); Retrieving data from slack space, renamed file, ghosting, compressed files. Cybercrime and network tracing: Technical aspects of Cyber Crime; Network Trace Route; Address Identification; Network tracing e mail headers; Digital Evidence Search and Seizure/Acquisition; Server software, RAID, Log Analysis, and major browser artefacts; Peer to Peer networks; BitTorrent Protocol; Bit-Torrent Forensic Artefacts. Targeted audiences and Forensic reports: Understanding your target audience; Creating a forensic report; Proper report writing. Legal Aspects: Legal Aspects of Cyber Crime; IT Act 2000/2008 and Privacy Issues; Involving Law enforcement.
Lecture 52 (Cyber Crime and computer crime)
Lecture 52 (Cyber Crime and computer crime) • Cyber Crime and computer crime: Definition and Origin of the Word, Cyber Crime and Information Security, who are Cyber Criminals, Classification of Cyber Crime; Cybercrimes and white collar crimes Cyber Crimes against individuals, Institution and State; Classification of Cybercrimes: E-mail Spoofing, Spamming, Cyber Defamation, Internet Time Theft, Salami Attack, Salami technique Data Diddling, Forgery, Web Jacking, Newsgroup Spam, Industrial Spying, Hacking, Online Frauds, Pornographic Offenders, Software Piracy, Computer Sabotage, Email Bombing, Computer Network Intrusion, Password Sniffing, Credit Card Frauds, Identity Theft, Hacking, System and data interference, Digital forgery, Cyber stalking/harassment, Cyber pornography, Identity theft and fraud, Cyber terrorism, Criminal Mind-Mens Rea, Different offences under the ICT Act, 2006; the Digital Security Act, 2018 and other statutes. Legal Provisions regarding Cyber Crimes
Lecture 53 (Cyber Law: Cyber Crime- Phishing and Identity Theft)
Lecture 53 (Cyber Law: Cyber Crime- Phishing and Identity Theft) Phishing: Methods of Phishing, Phishing Techniques, Types of Phishing Scams, Phishing countermeasures, Identity theft, Types and Techniques of identity thefts and its counter measures
Lecture 54 (Cyber Law – Dispute Resolution in Cyberspace)
Lecture 54 (Cyber Law - Dispute Resolution in Cyberspace) • Dispute Resolution in Cyberspace: Concept of Jurisdiction • Context of Jurisdiction and ICT Act, 2006 • International Law and Jurisdictional Issues in Cyberspace • Dispute Resolutions
0/1
Lecture 55 (Cyber Law: Cyber Security)
Lecture 55 (Cyber Law: Cyber Security) • Cyber Security: Meaning of cyber security • Various aspects of cyber security • Critical infrastructure • Network security • Application security • Internet of things (IoT) security • Endpoint security • Data/Information security • Identity management • Database and infrastructure security • Cloud security • Mobile security • Disaster recovery/ continuity planning • End user education • Appropriate and robust laws.
0/1
Cyber Law
About Lesson

Definitions – “Digital signature”

  1. Definitions:- In this Act, unless the context otherwise requires-

(1)  “Digital signature” means any data in electronic form that

(a) Is attached with some other electronic data reasonably; and

(b) Any justification of any digital signature will be done subject to the following conditions-

Ø That is attached with the signer similarly.

Ø That is able to recognize the signer.

Ø That is created through such a secure method that can confirm the signer’s control.

Ø That is attached to the data in such a way that it can recognize any change in the very data.

The digital signature is an encrypted digest of the file (message, document, driver, program) being signed.

And a “Digital signature” is impossible to forge. Instead, the digital signature comes from a digest of the text encrypted and sent with the text message.

The recipient decrypts the signature and retrieves the digest from the received text.

A match authenticates the message. Digital signatures are required for open systems and need higher security levels. An electronic signature that authenticates the identity of the sender, ensures the original content of the message is unchanged, is easily transportable, cannot be easily repudiated, cannot be imitated, and can be automatically time-stamped.

 Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. An electronic signature is “a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual’s handwritten signature.”

They are the electronic equivalent to handwritten signatures on paper and may be based on biometric identification methods or facial and voice recognition. A simple combination of a user ID and password also is sufficient. Within a company, the user ID must be unique to a specific person.

Password – The use of a user name and password provide the most common form of authentication. You enter your name and password when prompted by the computer. It checks the pair against a secure file to confirm. If either the name or password do not match, then you are not allowed further access.

Checksum – Probably one of the oldest methods of ensuring that data is correct, checksums also provide a form of authentication since an invalid checksum suggests that the data has been compromised in some fashion. A checksum is determined in one of two ways. Let’s say the checksum of a packet is 1 byte long, which means it can have a maximum value of 255. If the sum of the other bytes in the packet is 255 or less, then the checksum contains that exact value. However, if the sum of the other bytes is more than 255, then the checksum is the remainder of the total value after it has been divided by 256. Look at this example:

Private key encryption

Private key means that each computer has a secret key (code) that it can use to encrypt a packet of information before it is sent over the network to the other computer. Private key requires that you know which computers will talk to each other and install the key on each one. Private key encryption is essentially the same as a secret code that the two computers must each know in order to decode the information. The code would provide the key to decoding the message. Think of it like this. You create a coded message to send to a friend where each letter is substituted by the letter that is second from it. So “A” becomes “C” and “B” becomes “D”. You have already told a trusted friend that the code is “Shift by 2″. Your friend gets the message and decodes it. Anyone else who sees the message will only see nonsense.

Public key encryption

Public key encryption uses a combination of a private key and a public key. The private key is known only to your computer while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key provided by the originating computer and it’s own private key. The key is based on a hash value. This is a value that is computed from a base input number using a hashing algorithm. The important thing about a hash value is that it is nearly impossible to derive the original input number without knowing the data used to create the hash value.

Major types of digital forensics are as follows

:

  1. Database Forensics – which helps in checking databases for information
  2. Network Forensics – used for the understanding of data flow in networks to prevent issues and find out what happened
  3. Mobile Forensics- this will help to get information from phones or tablets to solve cases
  4. Malware Forensics – which is used for harmful computer viruses to know who made them and what it will cause
  5. Email Forensics – using emails to check out its source from whom it is sent and confirming the date and contents of the mail
  6. Memory Forensics – used for checking hidden memories or information from the computers