SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
https://dailyasianage.com/news/123154/digital-security-law-security-of-individual-or-government
EDEN BUILDING TO STOCK EXCHANGE
Published: 27 May 2018
Digital security law: Security of individual or government
M S Siddiqui
Bangladesh government delegate has presented a paper at International Telecommunications Union
(ITU) - World Summit on the Information Society (WSIS) Thematic Meeting on Cyber Security ITU
Headquarters, Geneva, Switzerland on June 28 - July 1, 2005 emphasising of right of the users of
ICT as saying " In today's world information system and network security has become a rights issue
for the reason that rights to information has become more and more important to everyone as
information protects and develops human life every day."
"The National Cyber security Strategy of Bangladesh" published by gazette notification in 2014 for
the long-term measures for protecting our cyber world against security threats, risks and challenges
to national security. Bangladesh has cyber security policy in line with the Global Cyber security
Agenda (GCA) of ITU. It is internationally harmonized legislation strengthens cyber security, as it
helps our country build capacity for preventing, deterring and prosecuting cybercrime.
The purpose of the document is to create a coherent vision for 2021 keeping Bangladesh secure
and prosperous by coordinating government, private sector, citizens and international cyberspace
defence efforts. This strategy also refer to a public-private partnership to fix the potential vulnerability
of private sector-owned critical infrastructures in banking, utilities and telecommunications sectors
against cyber-attacks etc.
The Bangladesh National Security Framework outlines minimum-security measures that
stakeholders must abide by to claim compliance with national cyber security requirements. It has
proposed to have three national priorities: (a) legal measures; (b) technical and procedural
measures; and (c) organizational structures.
There are many cyber security issues. It may be discloser of personal information and probable
threats of misuse of information. Categories of cyber threats for citizens are (1) Cyber-attacks may
use hacking techniques to modify, destroy or otherwise compromise the integrity of data, (2) Denial
of service attacks by botnets, for example, may be used to prevent users from accessing data that
would otherwise be available to them, (3) Cyber-attacks may target various types of confidential
information, often for criminal gain.
The national concerns of cyber-crime are (i) Cyber Warfare: Most of the Armies world over now has
dedicated cyber warfare teams for defensive as well as offensive operations. (ii) Cyber Terrorism:
Cyber terrorism means unlawful attacks and threats of attack against the computer, network and the
information stored therein.
Bangladesh has some laws and policies related to internet and communication technology. But the
section 57 of existing ICT act already has created concern that it is against freedom of expression.
A rough translation of section 57 (1) says: "If any person deliberately publishes or transmits or
causes to be published or transmitted in the website or in any other electronic form any material
which is false and obscene and if anyone sees, hears or reads it having regard to all relevant
circumstances, its effect is such as to influence the reader to become dishonest or corrupt, or
causes to deteriorate or creates possibility to deteriorate law and order, prejudice the image of the
state or person or causes to hurt or may hurt religious belief or instigate against any person or
organization, then this activity will be regarded as an offence." This section has gone against the
fundamental right of citizens enshrined in the constitution.
In similar situation, the Indian Supreme Court in March 2015 struck down almost a similar section,
under section 66A of the Information Technology Act hit at the root of liberty and freedom of
expression, two cardinal pillars of democracy and terming it unconstitutional.
In the complex blend of national security, personal security and freedom of expression, Bangladesh
government has approved the draft of Digital Security Act 2018 with a provision of repealing the
sections 54, 55, 56, 57 and 66 of the Information and Communication Technology (ICT) Act.
The proposed cyber security law have some sections raised concerned of violation of human rights
and curtail freedom of expression. The proposed law stipulates in section number 36 that some
crimes under sections including 17, 28, 31, 32 and 34 as non-bailable.
The Section 5 says about constitution of a Digital Security Agency, who shall monitor and supervise
the digital contents, communications mediums including mobile phones to prevent cyber-crime. This
section also introduces Digital Forensic Lab and Bangladesh Cyber Emergency Incident Response
Team.
Section-13 has given wide authority to Director General of Digital Security Agency. If the DG is
hereby pleased that it is expedient and necessary to give directions for the interests of protecting the
sovereignty, integrity, security of Bangladesh and friendly relationship of Bangladesh with other
countries, public discipline and security, DG can give directions to law enforcing agencies of the
government by order mentioning written reason for obstructing the broadcast of information through
any computer resource.
Section 15(5) of the draft Act says, any derogatory comments, remarks, campaign or propaganda in
electronic media made by a person, institution or foreign citizen, against the war of liberation, or
father of the Nation Bangabandhu or any issue that has been settled by the Court shall amount to an
offense under this Act.
Section 21 encompasses the similar offense of any person who aids or abets the commission of any
offense under the Act, and shall be entitled to punishment.
Section 25 of the proposed law says, a person may face punishment, if he or she is found to have
deliberately published or broadcast in the website or electronic form something which is attacking or
intimidating or which can make someone dishonest or disgruntled; knowingly publish or broadcast
false and distorted (full or partial) information to annoy or humiliate someone; knowingly publish or
broadcast false and distorted (full or partial) information to tarnish the image of the state or to spread
rumour.
Section 27 authorized Police Inspector to enter into any place along with a magistrate for search,
seizure and arrest of accusedwithout arrest warrant if he believes that the evidences of crime may
be destroyed.
As per section 43 of the draft law, a police official can search or arrest anyone without any warrant
issued by a court.If a police officer believes that an offence under the act has been committed in a
certain place or is being committed, or there is a possibility of crimes, or there is a possibility of
destroying evidence, he or she can search the place or any person present there.The officer can
arrest any person if he or she suspects that the person has committed or is committing crimes. In
such a case, the officer has to submit a report to the court after carrying out the search.
One of the much debated cyber security law of the world is in China. The cyber security law of China
has imposed three broad categories of businesses in order to ensure cyber security of their country
and focused on personal data security of Chinese users.
Their law has given priority on the collection, storage and usages of those data. The law has three
broad base restriction and obligations as follows: (a) Technology Equipment restrictions, (b)
Obligation imposed on network operators and (c) Obligation imposed on critical Information
infrastructure operators. On the other hand our law has given emphasis on activities of citizen which
will create a situation of self -censorship on media, research and publication.
European Parliament resolution of 26 November 2015 on freedom of expression in Bangladesh
called on the Bangladesh authorities to ensure the independence and impartiality of the court system
and to amend the Information and Communication Technology Act and the Cyber-Security Act in
order to bring it into line with international free speech standards, dropping the criminalization of
'anti-state' publications.
Cyber security is still a subject to understand. The civil society and public interest groups have
already engaged in debate in respect of whether cyber security is something for systems, rather than
people. But cyber security is intrinsically about people.
There are discussions of online security parallel debates that have taken place in a number of other
security domains about the tension between national security and what has been dubbed "human
security." This balance-between the security of State and that of the human beings is neatly
encapsulated within the key tension at the heart of cyber security.
On the other hand, there is a policy area concerned with the regulation of online behavior, and
having profound implications for essential human rights such as privacy and freedom of expression.
The subject again seems complicated further complicate as cyber security is often conflated with
cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare
and cyber-defense. However, it is taken to mean the protection of digital information systems against
attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It
has mixed up the security of individual and nation.
The civil society has already voice concerned of the draft law and demanding amendment of some
of those sections to ensure freedom of expression and freedom research and investigative reporting
by press. Bangladesh law should focus on data security of citizen as well as national security.
The writer is a legal economist.
mssiddiqui2035@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Terrance Tong
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
Changing Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised WorldChanging Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised WorldSwasti Chaturvedi
 
Contract for the web
Contract for the webContract for the web
Contract for the webMassa Critica
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeLoeb Smith Attorneys
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Internet Shutdown in Indonesia: Report 2020
Internet Shutdown in Indonesia: Report 2020Internet Shutdown in Indonesia: Report 2020
Internet Shutdown in Indonesia: Report 2020Damar Juniarto
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentationbsookman
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsCharles Mok
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torressegughana
 

Was ist angesagt? (20)

On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Changing Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised WorldChanging Trends in Criminal Justice and Human Rights in Globalised World
Changing Trends in Criminal Justice and Human Rights in Globalised World
 
Contract for the web
Contract for the webContract for the web
Contract for the web
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Imran batada
Imran batadaImran batada
Imran batada
 
Internet Shutdown in Indonesia: Report 2020
Internet Shutdown in Indonesia: Report 2020Internet Shutdown in Indonesia: Report 2020
Internet Shutdown in Indonesia: Report 2020
 
Sookman primetime presentation
Sookman primetime presentationSookman primetime presentation
Sookman primetime presentation
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe TorresCTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
 

Ähnlich wie Digital security law security of individual or government

HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxBini R A
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...linda gichohi
 

Ähnlich wie Digital security law security of individual or government (20)

Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdfPRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdf
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Internet governance
Internet governanceInternet governance
Internet governance
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 

Mehr von M S Siddiqui

Tax justice from 100 years old income tax law.pdf
Tax justice from 100 years old income tax law.pdfTax justice from 100 years old income tax law.pdf
Tax justice from 100 years old income tax law.pdfM S Siddiqui
 
How insiders are manipulating Dollar rates.pdf
How insiders are manipulating Dollar rates.pdfHow insiders are manipulating Dollar rates.pdf
How insiders are manipulating Dollar rates.pdfM S Siddiqui
 
Bangladesh’s cross border transaction in Chinese RMB.pdf
Bangladesh’s cross border transaction in Chinese RMB.pdfBangladesh’s cross border transaction in Chinese RMB.pdf
Bangladesh’s cross border transaction in Chinese RMB.pdfM S Siddiqui
 
Ongoing war on semiconductors.pdf
Ongoing war on semiconductors.pdfOngoing war on semiconductors.pdf
Ongoing war on semiconductors.pdfM S Siddiqui
 
Evaluation of Bangladesh’s Data Protection Bill.pdf
Evaluation of Bangladesh’s Data Protection Bill.pdfEvaluation of Bangladesh’s Data Protection Bill.pdf
Evaluation of Bangladesh’s Data Protection Bill.pdfM S Siddiqui
 
Rights of the nominee vis-à-vis legal heirs.docx
Rights of the nominee vis-à-vis legal heirs.docxRights of the nominee vis-à-vis legal heirs.docx
Rights of the nominee vis-à-vis legal heirs.docxM S Siddiqui
 
Bangladesh bank’s rules of export documents require an amendment
Bangladesh bank’s rules of export documents require an amendmentBangladesh bank’s rules of export documents require an amendment
Bangladesh bank’s rules of export documents require an amendmentM S Siddiqui
 
Access to finance for the informal sector
Access to finance for the informal sectorAccess to finance for the informal sector
Access to finance for the informal sectorM S Siddiqui
 
Ad free channel ends unfair privileges to overseas manufacturers
Ad free channel ends unfair privileges to overseas manufacturersAd free channel ends unfair privileges to overseas manufacturers
Ad free channel ends unfair privileges to overseas manufacturersM S Siddiqui
 
Pandemic recession and employment crisis
Pandemic recession and employment crisisPandemic recession and employment crisis
Pandemic recession and employment crisisM S Siddiqui
 
How to upgrade bangladesh’s banking almanac
How to upgrade bangladesh’s banking almanacHow to upgrade bangladesh’s banking almanac
How to upgrade bangladesh’s banking almanacM S Siddiqui
 
Bangladesh needs rules on odourised lpg
Bangladesh needs rules on odourised lpgBangladesh needs rules on odourised lpg
Bangladesh needs rules on odourised lpgM S Siddiqui
 
Post clearance customs audit
Post clearance customs auditPost clearance customs audit
Post clearance customs auditM S Siddiqui
 
Abrupt indian ban on onion seeds not legal
Abrupt indian ban on onion seeds not legalAbrupt indian ban on onion seeds not legal
Abrupt indian ban on onion seeds not legalM S Siddiqui
 
Miniket, a variety of rice or a brand
Miniket, a variety of rice or a brandMiniket, a variety of rice or a brand
Miniket, a variety of rice or a brandM S Siddiqui
 
Psi of govt purchase contrary to import policy
Psi of govt purchase contrary to import policyPsi of govt purchase contrary to import policy
Psi of govt purchase contrary to import policyM S Siddiqui
 
Disappearance of border pillars and death from lightning strike
Disappearance of border pillars and death from lightning strikeDisappearance of border pillars and death from lightning strike
Disappearance of border pillars and death from lightning strikeM S Siddiqui
 
Cib not for control of credit
Cib not for control of creditCib not for control of credit
Cib not for control of creditM S Siddiqui
 
Hashem foods fire determining the liability of regulators
Hashem foods fire determining the liability of regulatorsHashem foods fire determining the liability of regulators
Hashem foods fire determining the liability of regulatorsM S Siddiqui
 
Share facts on drugs, save lives
Share facts on drugs, save livesShare facts on drugs, save lives
Share facts on drugs, save livesM S Siddiqui
 

Mehr von M S Siddiqui (20)

Tax justice from 100 years old income tax law.pdf
Tax justice from 100 years old income tax law.pdfTax justice from 100 years old income tax law.pdf
Tax justice from 100 years old income tax law.pdf
 
How insiders are manipulating Dollar rates.pdf
How insiders are manipulating Dollar rates.pdfHow insiders are manipulating Dollar rates.pdf
How insiders are manipulating Dollar rates.pdf
 
Bangladesh’s cross border transaction in Chinese RMB.pdf
Bangladesh’s cross border transaction in Chinese RMB.pdfBangladesh’s cross border transaction in Chinese RMB.pdf
Bangladesh’s cross border transaction in Chinese RMB.pdf
 
Ongoing war on semiconductors.pdf
Ongoing war on semiconductors.pdfOngoing war on semiconductors.pdf
Ongoing war on semiconductors.pdf
 
Evaluation of Bangladesh’s Data Protection Bill.pdf
Evaluation of Bangladesh’s Data Protection Bill.pdfEvaluation of Bangladesh’s Data Protection Bill.pdf
Evaluation of Bangladesh’s Data Protection Bill.pdf
 
Rights of the nominee vis-à-vis legal heirs.docx
Rights of the nominee vis-à-vis legal heirs.docxRights of the nominee vis-à-vis legal heirs.docx
Rights of the nominee vis-à-vis legal heirs.docx
 
Bangladesh bank’s rules of export documents require an amendment
Bangladesh bank’s rules of export documents require an amendmentBangladesh bank’s rules of export documents require an amendment
Bangladesh bank’s rules of export documents require an amendment
 
Access to finance for the informal sector
Access to finance for the informal sectorAccess to finance for the informal sector
Access to finance for the informal sector
 
Ad free channel ends unfair privileges to overseas manufacturers
Ad free channel ends unfair privileges to overseas manufacturersAd free channel ends unfair privileges to overseas manufacturers
Ad free channel ends unfair privileges to overseas manufacturers
 
Pandemic recession and employment crisis
Pandemic recession and employment crisisPandemic recession and employment crisis
Pandemic recession and employment crisis
 
How to upgrade bangladesh’s banking almanac
How to upgrade bangladesh’s banking almanacHow to upgrade bangladesh’s banking almanac
How to upgrade bangladesh’s banking almanac
 
Bangladesh needs rules on odourised lpg
Bangladesh needs rules on odourised lpgBangladesh needs rules on odourised lpg
Bangladesh needs rules on odourised lpg
 
Post clearance customs audit
Post clearance customs auditPost clearance customs audit
Post clearance customs audit
 
Abrupt indian ban on onion seeds not legal
Abrupt indian ban on onion seeds not legalAbrupt indian ban on onion seeds not legal
Abrupt indian ban on onion seeds not legal
 
Miniket, a variety of rice or a brand
Miniket, a variety of rice or a brandMiniket, a variety of rice or a brand
Miniket, a variety of rice or a brand
 
Psi of govt purchase contrary to import policy
Psi of govt purchase contrary to import policyPsi of govt purchase contrary to import policy
Psi of govt purchase contrary to import policy
 
Disappearance of border pillars and death from lightning strike
Disappearance of border pillars and death from lightning strikeDisappearance of border pillars and death from lightning strike
Disappearance of border pillars and death from lightning strike
 
Cib not for control of credit
Cib not for control of creditCib not for control of credit
Cib not for control of credit
 
Hashem foods fire determining the liability of regulators
Hashem foods fire determining the liability of regulatorsHashem foods fire determining the liability of regulators
Hashem foods fire determining the liability of regulators
 
Share facts on drugs, save lives
Share facts on drugs, save livesShare facts on drugs, save lives
Share facts on drugs, save lives
 

Kürzlich hochgeladen

一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 

Kürzlich hochgeladen (20)

一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 

Digital security law security of individual or government

  • 1. https://dailyasianage.com/news/123154/digital-security-law-security-of-individual-or-government EDEN BUILDING TO STOCK EXCHANGE Published: 27 May 2018 Digital security law: Security of individual or government M S Siddiqui Bangladesh government delegate has presented a paper at International Telecommunications Union (ITU) - World Summit on the Information Society (WSIS) Thematic Meeting on Cyber Security ITU Headquarters, Geneva, Switzerland on June 28 - July 1, 2005 emphasising of right of the users of ICT as saying " In today's world information system and network security has become a rights issue for the reason that rights to information has become more and more important to everyone as information protects and develops human life every day." "The National Cyber security Strategy of Bangladesh" published by gazette notification in 2014 for the long-term measures for protecting our cyber world against security threats, risks and challenges to national security. Bangladesh has cyber security policy in line with the Global Cyber security Agenda (GCA) of ITU. It is internationally harmonized legislation strengthens cyber security, as it helps our country build capacity for preventing, deterring and prosecuting cybercrime. The purpose of the document is to create a coherent vision for 2021 keeping Bangladesh secure and prosperous by coordinating government, private sector, citizens and international cyberspace defence efforts. This strategy also refer to a public-private partnership to fix the potential vulnerability of private sector-owned critical infrastructures in banking, utilities and telecommunications sectors against cyber-attacks etc. The Bangladesh National Security Framework outlines minimum-security measures that stakeholders must abide by to claim compliance with national cyber security requirements. It has proposed to have three national priorities: (a) legal measures; (b) technical and procedural measures; and (c) organizational structures. There are many cyber security issues. It may be discloser of personal information and probable threats of misuse of information. Categories of cyber threats for citizens are (1) Cyber-attacks may use hacking techniques to modify, destroy or otherwise compromise the integrity of data, (2) Denial of service attacks by botnets, for example, may be used to prevent users from accessing data that would otherwise be available to them, (3) Cyber-attacks may target various types of confidential information, often for criminal gain. The national concerns of cyber-crime are (i) Cyber Warfare: Most of the Armies world over now has dedicated cyber warfare teams for defensive as well as offensive operations. (ii) Cyber Terrorism: Cyber terrorism means unlawful attacks and threats of attack against the computer, network and the information stored therein. Bangladesh has some laws and policies related to internet and communication technology. But the section 57 of existing ICT act already has created concern that it is against freedom of expression.
  • 2. A rough translation of section 57 (1) says: "If any person deliberately publishes or transmits or causes to be published or transmitted in the website or in any other electronic form any material which is false and obscene and if anyone sees, hears or reads it having regard to all relevant circumstances, its effect is such as to influence the reader to become dishonest or corrupt, or causes to deteriorate or creates possibility to deteriorate law and order, prejudice the image of the state or person or causes to hurt or may hurt religious belief or instigate against any person or organization, then this activity will be regarded as an offence." This section has gone against the fundamental right of citizens enshrined in the constitution. In similar situation, the Indian Supreme Court in March 2015 struck down almost a similar section, under section 66A of the Information Technology Act hit at the root of liberty and freedom of expression, two cardinal pillars of democracy and terming it unconstitutional. In the complex blend of national security, personal security and freedom of expression, Bangladesh government has approved the draft of Digital Security Act 2018 with a provision of repealing the sections 54, 55, 56, 57 and 66 of the Information and Communication Technology (ICT) Act. The proposed cyber security law have some sections raised concerned of violation of human rights and curtail freedom of expression. The proposed law stipulates in section number 36 that some crimes under sections including 17, 28, 31, 32 and 34 as non-bailable. The Section 5 says about constitution of a Digital Security Agency, who shall monitor and supervise the digital contents, communications mediums including mobile phones to prevent cyber-crime. This section also introduces Digital Forensic Lab and Bangladesh Cyber Emergency Incident Response Team. Section-13 has given wide authority to Director General of Digital Security Agency. If the DG is hereby pleased that it is expedient and necessary to give directions for the interests of protecting the sovereignty, integrity, security of Bangladesh and friendly relationship of Bangladesh with other countries, public discipline and security, DG can give directions to law enforcing agencies of the government by order mentioning written reason for obstructing the broadcast of information through any computer resource. Section 15(5) of the draft Act says, any derogatory comments, remarks, campaign or propaganda in electronic media made by a person, institution or foreign citizen, against the war of liberation, or father of the Nation Bangabandhu or any issue that has been settled by the Court shall amount to an offense under this Act. Section 21 encompasses the similar offense of any person who aids or abets the commission of any offense under the Act, and shall be entitled to punishment. Section 25 of the proposed law says, a person may face punishment, if he or she is found to have deliberately published or broadcast in the website or electronic form something which is attacking or intimidating or which can make someone dishonest or disgruntled; knowingly publish or broadcast false and distorted (full or partial) information to annoy or humiliate someone; knowingly publish or broadcast false and distorted (full or partial) information to tarnish the image of the state or to spread rumour. Section 27 authorized Police Inspector to enter into any place along with a magistrate for search, seizure and arrest of accusedwithout arrest warrant if he believes that the evidences of crime may be destroyed.
  • 3. As per section 43 of the draft law, a police official can search or arrest anyone without any warrant issued by a court.If a police officer believes that an offence under the act has been committed in a certain place or is being committed, or there is a possibility of crimes, or there is a possibility of destroying evidence, he or she can search the place or any person present there.The officer can arrest any person if he or she suspects that the person has committed or is committing crimes. In such a case, the officer has to submit a report to the court after carrying out the search. One of the much debated cyber security law of the world is in China. The cyber security law of China has imposed three broad categories of businesses in order to ensure cyber security of their country and focused on personal data security of Chinese users. Their law has given priority on the collection, storage and usages of those data. The law has three broad base restriction and obligations as follows: (a) Technology Equipment restrictions, (b) Obligation imposed on network operators and (c) Obligation imposed on critical Information infrastructure operators. On the other hand our law has given emphasis on activities of citizen which will create a situation of self -censorship on media, research and publication. European Parliament resolution of 26 November 2015 on freedom of expression in Bangladesh called on the Bangladesh authorities to ensure the independence and impartiality of the court system and to amend the Information and Communication Technology Act and the Cyber-Security Act in order to bring it into line with international free speech standards, dropping the criminalization of 'anti-state' publications. Cyber security is still a subject to understand. The civil society and public interest groups have already engaged in debate in respect of whether cyber security is something for systems, rather than people. But cyber security is intrinsically about people. There are discussions of online security parallel debates that have taken place in a number of other security domains about the tension between national security and what has been dubbed "human security." This balance-between the security of State and that of the human beings is neatly encapsulated within the key tension at the heart of cyber security. On the other hand, there is a policy area concerned with the regulation of online behavior, and having profound implications for essential human rights such as privacy and freedom of expression. The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers. The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation. The civil society has already voice concerned of the draft law and demanding amendment of some of those sections to ensure freedom of expression and freedom research and investigative reporting by press. Bangladesh law should focus on data security of citizen as well as national security. The writer is a legal economist. mssiddiqui2035@gmail.com