Course Content
Lecture 1 (Basic Concepts Cyber and ICT Act- BANGLADESH PERSPECTIVE)
• What is The Internet? • Who Controls the Internet? • What is The World Wide Web? • What’s the Relationship Between WWW and the Internet? • Understanding TCP/IP • Understanding HTML • Understanding HTTP • Uniform Resource Locators (URLs) • Web Hosting • Types of Hosting • How the Internet Works? • Where to Begin? • Internet Addresses • Protocol Stacks and Packets • Domain Names and Address Resolution • Application Protocols: HTTP and the World Wide Web • Application Protocols: SMTP and Electronic Mail • Transmission Control Protocol • Historical Background Of Internet • Growth of The World Wide Web • Growth of The Internet • Scope of Cyber Law • Definition of Cyber Law • Advantages of Cyber Law • Cyber Property • Cyber Jurisprudence • Why Cyber Laws • Strengths of the Information and Communication Technology Act, 2006 • Criticism and Weakness of the ICT Act, 2006 • Essentials of Cyber Laws for IT or ICT Professionals • What are Some of The Key Cyber Law Issues That You Think Must Be Taught and Addressed In Communication/Journalism Schools? • Classification of Cyber Law • Need for Cyber Law in Bangladesh • Historical Background of the Information and Communication Technology Law or Cyber Law • Sides of Cyber Law or ICT Act of Bangladesh • Cyber Law in Bangladesh • Objectives of the ICT Act, 2006 • What Does the ICT Act or Cyber Law Enable? • Definition of Various Terminology under Section 2 of the ICT Act, 2006 (internet; electronic mail; data; website; chairman; civil procedure; penal code; prescribed; verification; originator; regulation; criminal procedure; adjudicating officer; medium; licence; certifying authority; certification practice and description of procedure; signatory; signature generating machine; cyber tribunal; tribunal; cyber appeal tribunal; Digital Signature; Digital Signature Certificate; Electronic; Electronic Data Interchange; Electronic Form; Electronic Gazette; Electronic Record; Internet; Computer; Computer Network; Computer System; Computer Resource; Controller; Certifying Authority; Subscriber; Verify; Key Pair; Private Key; Public Key; Encryption; Decryption; Originator; Addressee; Intermediary; Cyber Offense; Access; Secure System; Security Procedure; Affixing Digital Signature; authentication service provider etc.)
0/31
Lecture 3 (DIGITAL SIGNATURE & ELECTRONIC RECORDS)
Lecture 3 (DIGITAL SIGNATURE & ELECTRONIC RECORDS)
0/2
Lecture 4 (Attribution, Acknowledgement, Dispatch & Attribution of Electronic Records [Sec 13-15]))
Lecture 4 (Attribution, Acknowledgement and Dispatch of Electronic Records Attribution of Electronic Record) • Attribution, Acknowledgement and Dispatch of Electronic Records Attribution of Electronic Record • Attribution of Electronic Record • Acknowledgement of Receipt
0/2
Lecture 5 (SECURE ELECTRONIC RECORDS & DIGITAL SIGNATURES) [Sec16-17]
Lecture 5 (SECURE ELECTRONIC RECORDS & DIGITAL SIGNATURES) SECURE ELECTRONIC RECORDS & DIGITAL SIGNATURES (Sec16-17)
0/3
Lecture 6 (CONTROLLER & CERTIFYING AUTHORITIES) [Sec 18-40]
Lecture 6 (CONTROLLER & CERTIFYING AUHORITIES (Sec 18-40)) CONTROLLER & CERTIFYING AUTHORITIES (Sec 18-40)
0/2
Lecture 7 (Duties of the Subscriber) [Sec 41-44]
Lecture 7 (Duties of the Subscriber) [Sec 41-44] Chapter VI of the ICT Act, 2006 DUTIES OF SUBSCRIBERS 41. Application of security procedure 42. Acceptance of Digital Signature Certificate 43. Presumption of represented information of obtaining Digital Signature Certificate 44. Control of safety measure of subscriber
0/2
Lecture 8 (BREACHING RULES, PREVENTION, PENALTIES ETC.) [Sec 45-53]
Lecture 8 (BREACHING RULES, PREVENTION, PENALTIES ETC. (Sec 45-53) 45. Power of Controller to give directions 46. Power of Controller to give directions in emergency 47. Power to announce protected systems 48. Penalty for failure to furnish document, return and report 49. Penalty for failure to file return, information, book etc. 50. Penalty for failure to maintain books of accounts or record 51. Residuary penalty 52. Power of Controller to issue prohibition of possible breaching of rules 53. Penalties
0/2
Lecture 9 (Offences & Penalties under ICT Act, 2006) [Sec 54-67]
Lecture 9 (Offences & Penalties under ICT Act, 2006)
0/2
Lecture 10 (Establishment of Cyber Tribunal, Investigation of Offences, Adjudication, Appeal Etc.) [Sec 68-81]
Lecture 10 (Establishment of Cyber Tribunal, Investigation of Offences, Adjudication, Appeal Etc.)
0/2
Lecture 11 (Establishment of Cyber Appellate Tribunal, Etc.)[Sec 82-84]
Lecture 11 (Establishment of Cyber Appellate Tribunal, Etc.)
0/2
Lecture 12 (Cyber Law Bangladesh-Public servants/Protection of action in good faith/Augmented use of few definitions used in few acts) [Sec 85-90]
Lecture 12 (Cyber Law Bangladesh-Public servants/Protection of action in good faith/Augmented use of few definitions used in few acts)
0/3
Lecture 13 (Digital Security Act, 2018 Repealed)
Lecture 13 (Digital Security Act, 2018 Repealed) • Assurance by Certifying Authority • Revocation of Digital Signature Certificate • Suspension of Digital Signature Certificate • Duties of Subscribers
0/6
Lecture 14 (Cyber Security Act, 2023 [Repealed])
Lecture 14 (Cyber Security Act, 2023 [Repealed]) • Penalties and Adjudication • Penalty for Failure to Furnish Document, Return or Report • Penalty for Failure to Maintain Books of Accounts or Records • Fine for Infringement of Rules or Regulations of ICT Act, 2006 • Crime and Investigation and Punishment • Investigation and adjudication of cyber crimes • Digital evidence • Methodology of Cyber Crime Investigation • Basic Investigation Techniques • Investigating Emails
Lecture 15 (Cyber Suroksha/Protection Ordinance, 2024)
Lecture 15 (Cyber Suroksha/Protection Ordinance, 2024) • ICT Act of 2006 to Cyber Suroksha/Protection Ordinance, 2024: Bangladesh’s Zombie Cyber Security Law A. POLITICAL AND LEGAL CONTEXT: ICT ACT B. POLITICAL AND LEGAL CONTEXT: DSA C. POLITICAL AND LEGAL CONTEXT: CSA D. POLITICAL AND LEGAL CONTEXT: CPO, 2024 E. IMPACT OF THE CPO ON ONGOING ICT ACT CASE • Objectives of the CPO, 2024 • Meaning of Computer Contaminant Objectives of the Cyber Protection Ordinance, 20204; Definition of Cyber Protection, cyber space, Tribunal, Agency, Council, Computer Emergency Response Team, computer system, computer data, traffic data, critical information infrastructure, digital, digital device, digital forensic lab, police officer, programme, Criminal Procedure, person, illegal access, Director General, malware, service provider; Application of the Act; Extra territorial application of the Act; Cyber Protection Agency- Establishment of Agency, Office, etc; Appointment of the Director General and the Directors, tenure; Manpower of the Agency; Preventive Measures- Power to remove or block some data-information; Emergency Response Team; Digital forensic lab; Quality control of digital forensic lab; Cyber Protection Council- National Cyber Protection Council; Power, etc. of the Council; Meeting, etc. of the Council; Critical Information Infrastructure- What is Critical information infrastructure; Monitoring and inspection of the safety of a critical information infrastructure; Offence and Punishment- Punishment for illegal access to any critical information infrastructure, etc.; Illegal access to computer, digital device, computer system, etc. and punishment; Damage of computer, computer system, etc. and punishment; Offence and Punishment of forgery on cyber space; Offence and Punishment of fraud on cyber space; Offence and punishment for committing cyber terrorism; Offence and punishment for e-transaction without legal authority; Offence and punishment for blackmailing and publishing obscene content; Publication of information in cyber space that hurts the religious values or sentiment; Abetment of committing an offence and punishment thereof; Offences and punishment for filing false cases, complaints, etc.; Offence committed by a company; Power to issue order for compensation; The service provider not to be responsible; Investigation of Offence and Trial- Investigation & of a police officer or Investigation Officer; Time-limit for investigation; Power of Investigation Officer; Search and seizure by warrant; Search, seizure and arrest without warrant; Preservation of information; Not to hamper the general usage of computer; Assistance in investigation; Secrecy of the information obtained in course of investigation; Filing of case and Cognizance of offence; Trial of offence and appeal; Application of the Code of Criminal Procedure, Evidence Act and Information & communication Technology Act; Evidentiary value of Cyber space; Taking opinion of experts, training, etc.; Time-limit for disposal of case; Offences to be cognizable/non-cognizable, bailable/non-bailable and compoundable; Forfeiture; Regional and International Cooperation; Power to make rules; Amendment and savings of the Act No. XXXIX of 2006/ICT Act, 2006.
0/11
Lecture 16 (Cyber Law & Cyber Crime: Hacking – Bangladesh Perspective)
Lecture 16 (Cyber Law & Cyber Crime: Hacking - Bangladesh Perspective) • Hacking With Computer System; Hacking Concepts; What is Hacking? - Who is a Hacker? -Hacker Classes- Hacking Phases: o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks • Ethical Hacking Concepts • What is Ethical Hacking? • Why Ethical Hacking is Necessary • Scope and Limitations of Ethical Hacking • Skills of an Ethical Hacker • Legal and Regulatory Framework: Understanding relevant laws and regulations regarding cybersecurity and ethical hacking practices
Lecture 18 (Regulation of Artificial Intelligent)
Lecture 18 (Cyber Law: Crime and Punishment for Unauthorized Access) • Crime and Punishment for Unauthorized Access to Protected Systems • How Does ICT Act Deal With Hacking? • Distinction Hacking Vs. Unauthorized Access
0/7
Lecture 20 (Development & Regulation of Blochchain)
Lecture 20 (Cyber Law: ICT ACT/Digital Security/Cyber Security/Cyber Suroksha, Offenses and Penalties) • Civil Offences under the ICT Act 2006 • Criminal Offences Stipulated by ICT Act 2006 • Criminal Offences Stipulated by DS Act 2018 (Repealed) • Criminal Offences Stipulated by Cyber Suroksha Ordinance 2024 • Offences under ICT ACT, 2006/Digital Security/Cyber Security/Cyber Suroksha Ordinance, 2024- Penalty and adjudication - Punishments for contraventions under those Laws (Case Laws, Rules and recent judicial pronouncements to be discussed) - Limitations of Cyber Law
0/1
Lecture 21 (Bangladesh Telecommunication Act, 2001)
Lecture 21 (Bangladesh Telecommunication Act, 2001) • Establishment of Cyber Tribunal, Enquiry, Trial and Appeal of Crimes Etc. • Establishment of Cyber Tribunal • Procedure of Trial of the Cyber Tribunal • The Application of Criminal Procedure in the Procedure of the Tribunal • Bail Rules • The Time Limit to Give Judgement • The Time Limit of Disputing a Case by the Tribunal • Justice by Session Court • The Power of Investigation of Crime Etc. • Are Cyber Crimes Considered as Cognizable or Non Cognizable? • Confiscation
0/2
Lecture 22 (Other Telecommunication Laws, Rules, Regulation etc.)
Lecture 22 (Other Telecommunication Laws, Rules, Regulation etc.) LEGAL REQUIREMENTS The legal statutes governing the telecommunication industry in Bangladesh which will be applicable to the Licensee are given below: (a) The Bangladesh Telecommunication Regulation Act, 2001 (as amended). (b) The Wireless Telegraphy Act, 1933 and The Telegraph Act, 1885, for matters which are not covered by the Bangladesh Telecommunication Regulation Act, 2001 (as amended). (c) The Bangladesh Telecommunication Regulatory Commission (Licensing Procedure) Regulations, 2004 (as amended). (d) The Bangladesh Telecommunication Regulatory Commission (Interconnection) Regulations, 2004 (as amended). (e) The Information and Communication Technologies Act,2006 (0 Any other Act, Ordinance, Order, Rules, Regulation(s), by law(s) or any other law being in force in Bangladesh. (g) The Guidelines/Directives/Orders and Decisions issued under the Bangladesh Telecommunication Regulation Act, 200 1 . (h) The related Act, Ordinance, Order, Rules, Regulation(s), by law(s), Guidelines/Directives/Orders and Decisions issued in the countries where the services of the Licensee are feasible. Laws Bangladesh Telecommunication Act, 2001 (With Amendments) The Wireless Telegraphy Act, 1933 The Telegraph Act, 1885 নীতিমালা জাতীয় টেলিযোগাযোগ নীতিমালা ২০১৮ আইএলডিটিএস নীতিমালা ২০১০ টেলিকম পলিসি ১৯৯৮ আইসিটি পলিসি বাংলাদেশ টেলিযোগাযোগ নিয়ন্ত্রণ (লাইসেন্স) প্রবিধানমালা, ২০২২ গাইডলাইন ITC Amendment 1 (19-02-2025) ও IIG Amendment 3 (19-02-2025) International Terrestrial Cable (ITC) লাইসেন্সিং গাইডলাইন এর ক্লজ সংশোধন প্রসঙ্গে। .bd & .bangla ডোমেইন অপারেশন এবং অ্যাডমিনিস্ট্রেশন -..bd এবং .বাংলা-এর জন্য ডোমেন অ্যাডমিনিস্ট্রেশন গাইডলাইন স্যাটেলাইট অপারেটর - বাংলাদেশে স্যাটেলাইট অপারেটরের জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন Regulatory and Licensing Guidelines For Non-Geostationary Orbit (NGSO) Satellite Services Operator In Bangladesh ভিওআইপি পরিষেবা প্রদানকারী (VoIP)- VoIP পরিষেবা প্রদানকারীর জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন ইন্টারন্যাশনাল টেরেস্ট্রিয়াল ক্যাবল (ITC) সিস্টেম এবং পরিষেবা - ইন্টারন্যাশনাল টেরেস্ট্রিয়াল কেবল (ITC) সিস্টেম এবং পরিষেবার জন্য লাইসেন্সিং গাইডলাইন Cellular Mobile Services - Regulatory and Licensing Guidelines for Cellular Mobile Services in Bangladesh 4G – LTE- 4G - LTE রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন 3G - 3G সেলুলার মোবাইল ফোন পরিষেবাগুলির জন্য লাইসেন্সিং গাইডলাইন সেলুলার মোবাইল ফোন অপারেটর- সেলুলার মোবাইল ফোন অপারেটরের জন্য লাইসেন্সিং গাইডলাইন আইএসপি (ISP) -বাংলাদেশে ইন্টারনেট সার্ভিস প্রোভাইডার (ISP) এর জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন Declaration/ Undertaking (Appendix-4) পিএসটিএন (PSTN)- PSTN লাইসেন্স আবেদনের তথ্য এবং নির্ধারিত লাইসেন্সের আবেদনপত্রের জেনেরিক ফর্মের জন্য রেগুলেটরি ও লাইসেন্সিং গাইডলাইন সেন্ট্রাল জোন, বাংলাদেশের পিএসটিএন পরিষেবাগুলি প্রতিষ্ঠা, পরিচালনা এবং রক্ষণাবেক্ষণের জন্য বেসরকারী অপারেটরকে জোনাল লাইসেন্স প্রদানের জন্য প্রস্তাব/অফারের জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন জোনাল PSTN থেকে জাতীয় PSTN লাইসেন্সে রূপান্তর প্রক্রিয়া মোবাইল নম্বর পোর্টেবিলিটি সার্ভিস (MNPS) -মোবাইল নম্বর পোর্টেবিলিটি পরিষেবার জন্য রেগুলেটরি এবং লাইসেন্সিং গাইডলাইন বাংলাদেশে মোবাইল নম্বর পোর্টেবিলিটি পরিষেবা এবং মোবাইল নম্বর পোর্টেবিলিটি পরিষেবার অপারেটর লাইসেন্সের রেগুলেটরি ও লাইসেন্সিং এর সংশোধিত গাইডলাইনে সংশোধন বাংলাদেশে মোবাইল নম্বর পোর্টেবিলিটি পরিষেবার জন্য রেগুলেটরি ও লাইসেন্সিং গাইডলাইনে সংশোধন/পরিবর্তন Vehicle Tracking Services -Licensing guidelines for issuing license for establishing, operating and maintaining vehicle tracking services/ Vehicle Tracking Services (VTS) গাইডলাইেনর Clause No. 6.01(i) সংশোধন প্রসঙ্গে IP Telephony -Licensing Guidelines for Internet Protocol Telephony Service Provider License/ Amandment (28.03.2022) Performance Bank Guarantee (PBG) এর ফরম্যাট - Appendix-8: Affidavit -Form-1 NTTN- Licensing Guidelines for Nationwide Telecommunication Transmission Network Amendment/Change in the Regulatory and Licensing guidelines for Nationwide Telecommunication Transmission Network in Bangladesh. IIG- Regulatory and Licensing Guidelines for Invitation of Offers/Proposals for Issuing License for Establishing, Operating and Maintaining International Internet Gateway (IIG) Services in Bangladesh 2011/ Amendment1(08-04-2013) / Amendment1(29-03-2023) IGW- Regulatory and Licensing Guidelines for Invitation of Offers or Proposals for Issuing License for Establishing, Operating and Maintaining International Gateway (IGW) Services in Bangladesh with Amendments/ Amendment1( 21-10-2020) / Amendment2 (30-04-2022) / Amendment1(29-03-2023) ICX- Regulatory and Licensing Guidelines for Invitation of Offers or Proposals for Issuing License for Interconnection Exchange (ICX) Services Establishing, Operating and Maintaining in Bangladesh with Amendments Broadband Wireless Access- Guideline for issuing, operating and maintaining broadband wireless access Service/ Amendment1(03.10.2013) Radio Frequency- Guideline for application of new frequency assignment Wi Fi- Guidelines for use of Wireless Fidelity Technology বিপিও/কল সেন্টার- বিপিও/কল সেন্টার নির্দেশিকা VSAT- License Guidelines for domestic VSAT Hub Operator/ Regulatory and Licensing Guidelines for VSAT HUB Operator and VSAT User Infrastructure Sharing- Guideline for Infrastructure sharing Tower Sharing- Regulatory and Licensing Guidelines for Issuing License for Tower Sharing in Bangladesh Submarine Cable System- Licensing guideline to build, operate and maintain Submarine Cable System in Bangladesh/ Ammendment1 (15.04.2021)/ Ammendment2(10.01.2022)/ Ammendment3(14.02.2022) Amateur Radio Operator License- Amateur Radio operator Test Syllabus/ Amateur Radio Operator License Provisions and Conditions National Internet Exchange (NIX)- Licensing Guidelines for Issuing License to National Internet Exchange (NIX) টেলিকমিউনিকেশন ভ্যালু অ্যাডেড সার্ভিস (টিভিএএস)- বাংলাদেশে টেলিকমিউনিকেশন ভ্যালু অ্যাডেড সার্ভিস (টিভিএএস) প্রদানের লক্ষ্যে রেজিস্ট্রেশন সার্টিফিকেট জারির জন্য রেগুলেটরি গাইডলাইন Landing Rights for Broadcasting Satellite Service- Regulatory Guidelines on Landing Rights for Broadcasting Satellite Service In Bangladesh ডিরেক্টিভস্ বাংলাদেশের আন্তর্জাতিক সীমান্তবর্তী অঞ্চলসমূহে বিটিএস স্থাপন সংক্রান্ত নির্দেশিকা - ২০২৫ জারিকৃত 02-12-2024_ক্যাশ সার্ভার স্থাপন সংক্রান্ত নির্দেশনা জারিকৃত 17-11-2024_অব্যবহৃত সিমের পুনরায় বিক্রয়ের (Recycle) মেয়াদ সংক্রান্ত নির্দেশিকা জারিকৃত 06-02-2024_মোবাইল অপারেটরদের সহযোগিতায় বিনামূল্যে সরকারি তথ্য (Govt. Info) এসএমএস প্রেরণ সংক্রান্ত নির্দেশিকা-২০২৪ জারিকৃত 15-09-2024_বেতার যন্ত্রপাতি আমদানি, ব্যবহার, বাজারজাতকরণ এবং তালিকাভুক্তি সনদ গ্রহণের নির্দেশিকা-২০২৪ জারিকৃত 09-09-2024_স্থানীয়ভাবে মোবাইল হ্যান্ডসেট সংযোজন ও উৎপাদনের কারখানা স্থাপনের নির্দেশিকা-২০২৪ ৫৯২৫-৬৪২৫ মেগাহার্জ তরঙ্গ ব্যান্ড Shared ভিত্তিতে ব্যবহার সংক্রান্ত সার্কুলার প্রচার প্রসঙ্গে। এটুপি এসএমএস এগ্রিগেটর অভ্যন্তরীণ (Domestic) সেবা প্রদানকারী প্রতিষ্ঠানসমূহের (এসএমএস এগ্রিগেটর) তালিকাভুক্তি ও পরিষেবার নির্দেশিকা আইএসপি কর্তৃক বেতার তরঙ্গ ও বেতার যন্ত্রপাতি ব্যবহার সংক্রান্ত নির্দেশিকা টেলিকম ই-বর্জ্য ব্যবস্থাপনা ও রিসাইক্লিং সিস্টেম সংক্রান্ত নির্দেশিকা মোবাইল ফোন অপারেটরসমূহের ডাটা এবং ডাটা সংশ্লিষ্ট প্যাকেজ সম্পর্কিত নির্দেশিকা-২০২৩ আইএসপি অপারেটর কর্তৃক যথাযথভাবে IP Log সংরক্ষণ সংক্রান্ত নির্দেশনা সেলুলার মোবাইল ফোন অপারেটরসমূহের ডাটা এবং ডাটা সংশ্লিষ্ট বিভিন্ন প্যাকেজ সম্পর্কিত ডিরেক্টিভস মোবাইলফোন হ্যান্ডসেট ব্যতীত টেলিযোগাযোগ সেবা সংশ্লিষ্ট অন্যান্য যন্ত্রপাতি স্থানীয়ভাবে সংযোজন ও উৎপাদন কারখানা স্থাপনের নির্দেশিকা বাংলাদেশের আন্তর্জাতিক সীমান্তবর্তী অঞ্চলসমূহে বিটিএস স্থাপন সংক্রান্ত নির্দেশিকা-২০২১ কর্পোরেট সিম রেজিস্ট্রেশন অটোমেশন (CSRA) সিস্টেমের জন্য নির্দেশাবলী ISP-এর জন্য PoP (Point of Presence) ইনস্টলেশন সংক্রান্ত নির্দেশাবলী A2P এসএমএস সার্ভিস প্রোভাইডার (এসএমএস অ্যাগ্রিগেটর) তালিকাভুক্তির জন্য নির্দেশিকা IPTSP অপারেটরদের মোবাইল অ্যাপ্লিকেশন ভিত্তিক কলিং পরিষেবা (OTT) সংক্রান্ত নির্দেশাবলী কমিশন হতে অপারেশন কার্যক্রম পরিদর্শনকালে প্রাপ্ত বিভিন্ন ব্যত্যয়/অসামঞ্জস্যতা প্রসঙ্গে বাংলাদেশে এমাচার রেডিও ব্যবহার পদ্ধতির সংশোধিত নির্দেশাবলী বাংলাদেশে মোবাইল ফিনান্সিয়াল সার্ভিসের নির্দেশিকা ANS অপারেটরের Quality of Service প্রবিধান, ২০১৮ বাংলাদেশে IoT ডিভাইস আমদানির নির্দেশনা বিদ্যমান CDMA 800 MHz ব্যান্ড স্পেকট্রামকে Technology Neutral স্পেকট্রামে রূপান্তর করার নির্দেশিকা বাণিজ্যিক টোল ফ্রি পরিষেবার নির্দেশিকা ভার্চুয়াল প্রাইভেট নেটওয়ার্কে (VPN) সংশোধিত নির্দেশাবলী কর্পোরেট ভিডিও কনফারেন্সিংয়ের জন্য সংশোধিত নির্দেশিকা মোবাইল ফিনান্সিয়াল সার্ভিসেস (MFS) এর এয়ারটাইম ব্যবহারের জন্য নির্দেশাবলী এসএমএস ভিত্তিক প্রিমিয়াম রেট পরিষেবাগুলির নির্দেশাবলী বাংলাদেশে মোবাইল ফোন হ্যান্ডসেট অ্যাসেম্বলিং অ্যান্ড ম্যানুফ্যাকচারিং প্ল্যান্ট স্থাপনের নির্দেশনা (সংশোধনী-১) সেলুলার মোবাইল টেলিকম অপারেটরদের জন্য Quality of Service (QoS) পরিষেবার গুণমানের নির্দেশিকা ISP সংক্রান্ত নির্দেশনা (নং-৪০২, তারিখ: ১৩-০৩-২০১৬) IIG সংক্রান্ত নির্দেশনা (নং-৩৩৯, তারিখ: ১০-০৩-২০১৬) ISP সংক্রান্ত নির্দেশনা (নং-১৬৮৩, তারিখ: ১৮-১০-২০১৫) IIG সংক্রান্ত নির্দেশনা (নং-১৬৩৫, তারিখ: ০৩-১০-২০১৫) IIG সংক্রান্ত নির্দেশনা (নং-১৭৪৯, তারিখ: ২৩-১০-২০১৪) বিপিও/কল সেন্টার (আন্তর্জাতিক এবং দেশীয়) পরিচালনার জন্য তালিকাভুক্তি সার্টিফিকেট প্রদানের নির্দেশাবলী বাংলাদেশে 2.4 এবং 5.7 GHz ব্যান্ডের মাধ্যমে সেবা প্রদানের নির্দেশনা বাংলাদেশে স্যাটেলাইট ফোন ব্যবহারের জন্য নির্দেশাবলী RUIM-SIM-এর Post Activation এবং টেলিফোন-মোবাইলের গ্রাহক নিবন্ধনের নির্দেশাবলী বেআইনি কল টার্মিনেশন, RUIM-SIM রেজিস্ট্রেশন এবং বায়োমেট্রিক ভেরিফিকেশন সংক্রান্ত নির্দেশাবলী Emergency Balance সংক্রান্ত নির্দেশাবলী বায়োমেট্রিক Verification সিস্টেমের নির্দেশাবলী বায়োমেট্রিক Verification বাস্তবায়ন পরিকল্পনার নির্দেশাবলী
0/1
Lecture 23 (Cyber Law: Immunity to Internet Service Providers (ISPs)
Lecture 23 (Cyber Law: Immunity to Internet Service Providers (ISPs) • Immunity to Internet Service Providers (ISPs) • Network Service Provider/ Internet Service Providers (ISPs) • Draconian Powers to Police Officers • Arrest without Warrant or Not • Establishment of Cyber Appeal Tribunal • Procedure and Powers of Cyber Appellate Tribunal
Lecture 24 (Cyber Law: Contract Act, 1872)
Lecture 24 (Cyber Law: Contract Act, 1872) • Cyber Legislation and Legal Issues - The Contract Act, 1872 • Use of Cyber Cafés by Minors • Cyber Legislation and Legal Issues- Tort Liability and Remedies in Cyberspace • Cyber Legislation and Legal Issues - Trespass to Chattels • Cyber Torts: Cyber Defamation; Cyber Negligence; Cyber Nuisance; Cyber Trespass; Cyber Liability • Different types of civil wrongs under the ICT Act, 2006 and the Digital Security Act, 2018 (Repealed)/ the Cyber Security Act, 2023(Repealed)/ the Cyber Suroksha Ordinance, 2024.
Lecture 25 (Cyber Law: The Sale of Goods Act 1930)
Lecture 25 (Cyber Law: The Sale of Goods Act 1930) • Cyber Legislation and Legal Issues- The Sale of Goods Act 1930
Lecture 26 (Cyber Law: Penal Legislation -Bangladesh Perspective)
Lecture 26 (Cyber Law: Penal Legislation -Bangladesh Perspective) • Cyber Legislation and Legal Issues - The Penal Code, 1860 • Cyber Legislation and Legal Issues - The Police Act, 1861
Lecture 27 (Cyber Law: Evidence Act, 1872)
Lecture 27 (Cyber Law: Evidence Act, 1872) • Cyber Legislation and Legal Issues The Evidence Act, 1872 • Cyber Legislation and Legal Issues The Bankers' Books Evidence Act, 1891 • Cyber Legislation and Legal Issues The Bangladesh Bank Order, 1972
Lecture 28 (Cyber Law: Copyright Act, 2000)
Lecture 28 (Cyber Law: Copyright Act, 2000) • Cyber Legislation and Legal Issues The Copyright Act, 2000 • Cyber Legislation and Legal Issues The Telegraph Act, 1885
Lecture 29 (Cyber Law and Internet Taxation)
Lecture 29 (Cyber Law and Internet Taxation) • Cyber Legislation and Legal Issues- The Bangladesh Tax Ordinance, 1984 • Internet Taxation and Cyber Law • VAT vs. Internet • Sales Tax vs. Internet
Lecture 30 (Cyber Law: Consumer Protection Act, 2009)
Lecture 30 (Cyber Law: Consumer Protection Act, 2009) • Cyber Legislation and Legal Issues The Consumer Protection Act, 2009 • Consumer Protection Laws and Cyber Law
Lecture 31 (Cyber Law: Other Laws)
Lecture 31 (Cyber Law: Other Laws) Cyber Legislation and Legal Issues - Other Laws
Lecture 32 (Cyber Law: Constitutional & Human Rights Issues in Cyberspace)
Lecture 32 (Cyber Law: Constitutional & Human Rights Issues in Cyberspace) • Constitutional & Human Rights Issues in Cyberspace: Freedom of speech and expression in cyberspace • Right to access cyberspace Access to Internet • Right to privacy • Right to data protection
Lecture 33 (Cyber Law: Cyber Jurisdiction)
Lecture 33 (Cyber Law: Cyber Jurisdiction) Cyber Law and Jurisdiction: concept of jurisdiction in cyber law; Issues of the jurisdiction in cyberspace; Multi Jurisdictional or Cross Border Problem; Prerequisites of Jurisdiction in Cyberspace; Theories of Cyberspace Jurisdiction; Types of Cyber Jurisdiction: Cyber jurisdiction in National Cases: Cyber Jurisdiction in Civil Cases- Cyber Jurisdiction in Criminal Cases; Cyber jurisdiction in International Cases; The Test evolved of Jurisdictional Aspects in Cyber Law: Minimum Contacts Theory- Sliding Scale Theory; Effects Test and International Targeting: Extra Regional Effect of Cyber Law & Jurisdiction under ICT Act, 2006
Lecture 34 (Cyber Law: Regional and Global Perspective)
Lecture 34 (Cyber Law: Regional and Global Perspective) • Status of Cyber Laws: Regional and Global Perspective • International Laws & Conventions on Cyber Law • Cyber Related Laws in Other Developed Countries • Cyber Law: Regulation of cyberspace and need for cyber law • Cyber jurisprudence at international and domestic level • International perspectives - UN and International Telecommunication Union (ITU) • Initiatives: Council of Europe-Budapest Convention on Cybercrime-Asia Pacific Economic Cooperation (APEC)-Organization for Economic Co operation and Development (OECD)-World Bank-Commonwealth of Nations.
Lecture 35 (Cyber Law – USA)
Lecture 35 (Cyber Law - USA) • Development of Cyber Laws in USA • Cyber Privacy Laws in USA • Anti Spam Legislation in USA • Copyright Law in USA
Lecture 36 (Cyber Law – Australia)
Lecture 36 (Cyber Law - Australia) Cyber Related Laws in Australia EU Data Protection Laws
Lecture 37 (Cyber Law – Other States)
Lecture 37 (Cyber Law – Other States) • Cyber Related Laws in Japan • Cyber Related Laws in Singapore • Cyber Related Laws in Malaysia
Lecture 39 (Cyber Law: UNCITRAL Model Laws)
Lecture 39 (Cyber Law: UNCITRAL Model Laws) • United Nations Resolutions • UNCITRAL Model Laws • United Nations Commission on International Trade Law (UNCITRAL) • UNCITRAL Model Law on Electronic Commerce with Guide to Enactment 1996 With additional article 5 bis as adopted in 1998 • UNCITRAL Model Law on Electronic Signatures with Guide to Enactment 2001 • United Nations Convention on the Use of Electronic Communications in International Contracts • OECD Guidelines • ICAAN • WIPO, ITU, & WTO
Lecture 40 (Cyber Law: Intellectual Property Issues in Cyber Space)
Lecture 40 (Cyber Law: Intellectual Property Issues in Cyber Space) • The Nature of Cyberspace • Intellectual Property Issues in Cyber Space: Interface with copyright law Interface with patent law • Understanding The System of Domain Names • Trademarks and domain names related issues • Legality of P2P file sharing.
Lecture 41 (Cyber Law: Copyright Protection in Cyberspace)
Lecture 41 (Cyber Law: Copyright Protection in Cyberspace) • Copyright Protection in Cyberspace • Why Is Copyright Ill Equipped to Deal with The Internet? • How Do Copyright Issues and Challenges for Newspapers And Broadcast Media Change In Cyberspace?
Lecture 42 (Cyber Law: Copyright in the Digital Media)
Lecture 42 (Cyber Law: Copyright in the Digital Media) • Copyright in the Digital Media • Copyright & Cyberspace • Nature of Copyright in Cyberspace • Fair use and Infringement • Copyright issues in Digital Media • Hyper linking • Caching • Framing etc. • International Copyright Laws
Lecture 43 (Cyber Law: Patents in the Cyber World)
Lecture 43 (Cyber Law: Patents in the Cyber World) • Patents in the Cyber World • Nature of Patent Rights • Patents in the Digital Environment • Procedure of Obtaining Patents • Difference between Copyright and Patents • Patenting of Business Methods
Lecture 44 (Cyber Law – Trademark in Cyberspace)
Lecture 44 (Cyber Law - Trademark in Cyberspace) • Trademark in Cyberspace • Trademark law & Cyberspace • Trademarks Protection in Cyberspace • aw relating to Semiconductor Layout & Design
Lecture 45 (Cyber Law: Domain Names)
Lecture 45 (Cyber Law: Domain Names) • Domain Names and Related issues • Understanding the system of domain names • Different Perspectives • What Is Cybersquatting? • Cyber Squatting and Trademark Infringement • URDP and Cyber Squatting
Lecture 46 (Cyber Law – Privacy and Freedom)
Lecture 46 (Cyber Law - Privacy and Freedom) • Privacy and Freedom- Issues in the Cyber World • Nature of Privacy Rights • Cyber Stalking • Use of Cookies • Privacy Invasion by Government • Privacy Invasion by Employer • Freedom of Speech Vs Privacy Rights, Spam etc • E Government and E governance • Legal Issues in E Governance
Lecture 17 (Cyber Law: Cyber Pornography and Privacy)
Lecture 17 (Cyber Law: Cyber Pornography and Privacy) • Cyber Pornography and Privacy • Child Pornography • Online Pornography • Online Pornography in Bangladesh • Online Obscenity- Is It More Permissive Than USA?
Lecture 47 (Cyber Law – Electronic Commerce)
Lecture 47 (Cyber Law - Electronic Commerce) • Electronic Commerce: Concept • e-Commerce in Bangladesh • Overview of e Commerce • E commerce Salient Features • The Promising Significance of e Commerce • Dimensions of E Commerce • Online approaches like B2B, B2C & C2C • The Growth and Potential of E Commerce in Bangladesh • The Bottlenecks of e Commerce • The Regulatory and Legal Environment of E Commerce • Communication of offer and acceptance in cyberspace • UNCITRAL Model Law on Electronic Commerce
Lecture 48 (Cyber Law: e Banking)
Lecture 48 (Cyber Law: e Banking) • e Banking: e Banking in Bangladesh • Growth and Uses of e Banking in Bangladesh • Tele-Banking Service in Bangladesh • Challenges of Development of e Banking in Bangladesh • Internet Banking in Bangladesh
Lecture 49 (Cyber Law: Electronic Contracts/ Online contracts)
Lecture 49 (Cyber Law: Electronic Contracts/ Online contracts) • Electronic Contracts/ Online contracts • The Essence of Digital Contracts/ Online contracts • Defining a Digital Contract/ Online contracts • Formation of Digital Contracts/ Online contracts • Classification of Electronic Contracts/ Online contracts Click wrap contracts • United Nations Convention on the Use of Electronic Communications in International Contracts • Applicability of the Contract Act, 1872. • Special issues relating to Cyber contracts • What is Meant by Online Contracts • Evidentiary Value of Online Contracts
Lecture 50 (Cyber Law: Digital Signatures)
Lecture 50 (Cyber Law: Digital Signatures) • The System of Digital Signatures • Technology of Digital Signatures, Hash, Asymmetric Cryptography • Digital Signatures legal issues • Digital Signatures technical issues
Lecture 51 (Cyber Law – Forensic Tools and Electronic Evidence)
Lecture 51 (Cyber Law - Forensic Tools and Electronic Evidence) Forensic Tools and Processing of Electronic Evidence: Modern forensic tools, usages, and risks; Usage of Slack space; Tools for Disk Imaging and Data Recovery; Vulnerability Assessment and associated tools; Encase and FTK tools; Anti Forensics and probable counters; Vulnerability Assessment and associated tools; Encase and FTK tools; Anti Forensics and probable counters. Information retrieving and processing: Retrieving information and processing; Process of computer forensics and digital investigations; Processing of digital evidence, multimedia evidence, and digital images; Damaged SIM and data recovery; Retrieving and Processing of deleted data (desktops, laptops, mobiles, etc.); Retrieving data from slack space, renamed file, ghosting, compressed files. Cybercrime and network tracing: Technical aspects of Cyber Crime; Network Trace Route; Address Identification; Network tracing e mail headers; Digital Evidence Search and Seizure/Acquisition; Server software, RAID, Log Analysis, and major browser artefacts; Peer to Peer networks; BitTorrent Protocol; Bit-Torrent Forensic Artefacts. Targeted audiences and Forensic reports: Understanding your target audience; Creating a forensic report; Proper report writing. Legal Aspects: Legal Aspects of Cyber Crime; IT Act 2000/2008 and Privacy Issues; Involving Law enforcement.
Lecture 52 (Cyber Crime and computer crime)
Lecture 52 (Cyber Crime and computer crime) • Cyber Crime and computer crime: Definition and Origin of the Word, Cyber Crime and Information Security, who are Cyber Criminals, Classification of Cyber Crime; Cybercrimes and white collar crimes Cyber Crimes against individuals, Institution and State; Classification of Cybercrimes: E-mail Spoofing, Spamming, Cyber Defamation, Internet Time Theft, Salami Attack, Salami technique Data Diddling, Forgery, Web Jacking, Newsgroup Spam, Industrial Spying, Hacking, Online Frauds, Pornographic Offenders, Software Piracy, Computer Sabotage, Email Bombing, Computer Network Intrusion, Password Sniffing, Credit Card Frauds, Identity Theft, Hacking, System and data interference, Digital forgery, Cyber stalking/harassment, Cyber pornography, Identity theft and fraud, Cyber terrorism, Criminal Mind-Mens Rea, Different offences under the ICT Act, 2006; the Digital Security Act, 2018 and other statutes. Legal Provisions regarding Cyber Crimes
Lecture 53 (Cyber Law: Cyber Crime- Phishing and Identity Theft)
Lecture 53 (Cyber Law: Cyber Crime- Phishing and Identity Theft) Phishing: Methods of Phishing, Phishing Techniques, Types of Phishing Scams, Phishing countermeasures, Identity theft, Types and Techniques of identity thefts and its counter measures
Lecture 54 (Cyber Law – Dispute Resolution in Cyberspace)
Lecture 54 (Cyber Law - Dispute Resolution in Cyberspace) • Dispute Resolution in Cyberspace: Concept of Jurisdiction • Context of Jurisdiction and ICT Act, 2006 • International Law and Jurisdictional Issues in Cyberspace • Dispute Resolutions
0/1
Lecture 55 (Cyber Law: Cyber Security)
Lecture 55 (Cyber Law: Cyber Security) • Cyber Security: Meaning of cyber security • Various aspects of cyber security • Critical infrastructure • Network security • Application security • Internet of things (IoT) security • Endpoint security • Data/Information security • Identity management • Database and infrastructure security • Cloud security • Mobile security • Disaster recovery/ continuity planning • End user education • Appropriate and robust laws.
0/1
Cyber Law
About Lesson

WHAT DOES THE ICT ACT OR CYBER LAW ENABLE?

The ICT Act 2006 enables the following matters:

lLegal recognition of Electronic Transaction / Record

lLegal recognition of digital signature is at par with the handwritten signature

lElectronic Communication by means of reliable electronic record

lAcceptance of contract expressed by electronic means

le-Commerce and Electronic Data interchange

le-Governance

lElectronic filing of documents

lRetention of documents in electronic form

lUniformity of rules, regulations and standards regarding the authentication and integrity of electronic records or documents

lPublication of official gazette in the electronic form

lInterception of any message transmitted in the electronic or encrypted form

lPrevention of Computer Crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-Commerce and electronic transaction