Professional Documents
Culture Documents
LAW402 - Existing Legal Frameworks and The Reality of Cyber Security in Bangladesh - BRAC University - Research Paper Final
LAW402 - Existing Legal Frameworks and The Reality of Cyber Security in Bangladesh - BRAC University - Research Paper Final
Submitted By:
When it comes to cyber security and surveillance, Bangladesh is an easy target for hackers
who use phishing, hacking and data theft to get access to people's personal information. The
majority of cybercrime is a property crime. Data, information, and computer organisations
are examples of less evident and impalpable forms of property that aren't directly connected
to the persons in issue. Personal and organizational information, as well as government and
non-governmental digital services, are attractive to criminals. Providing services through
digital platforms, it is not unusual for security measures to be insufficient. Cyberspace
security may not be adequately protected under the Information and Communications
Technology Act of 2006 (the "Act"). Bangladesh's chaotic cyber security and
countermeasures in a globalized world are the key focus of this study.
Legal Frameworks for Cyber Security in Bangladesh
This law, known as the Bangladesh Telecommunication Regulation Act, 2001, was largely
passed in Bangladesh with the goal of regulating any kind of unintended cyber violence
committed via the use of telecommunication instruments. Furthermore, the Information and
Communication Technology Act, 2006, the Pornography Control Act, 2012, the Digital
Security Act, 2018 and other rules were created by the Bangladeshi government to deal with
the issue of cybercrime. There are a number of federal regulatory agencies that operate in
conjunction with the national cyber security system in addition to these legislations.
Under Section 8 of the Pornography Control Act, cyber pornography, such as the
dissemination of sexual film, sexual harassment, and blackmail by photograph, is a felony
that may be punished. This section of the Penal Code imposes prison sentences of up to seven
years, with the possibility of an additional ten years in cases involving child pornography.
According to Section 5, the investigative procedure would be conducted in accordance with
the Criminal Procedure Code (CrPC). In addition, Section 7 of the Pornography Control Act
covers investigations and evidence submissions by organizations with technical competence.
The arrest of journalist Probir Sikdar, who was working for the New York Times, sparked a
passionate discussion over whether Section 57 should be abolished. Since July 2017, at least
21 lawsuits have been brought against journalists under Section 57 of the Information and
Communication Technology Act, a clause that has been roundly denounced for the possibility
that it would be abused by individuals in the media sector (The Daily Star, 7 July, 2017). On
May 2, in response to significant criticism of the Information and Communications
Technology Act (ICT Act), Bangladesh Law Minister Anisul Huq said that section 57 of the
ICT Act will be abolished and that a new "Information Technology Act in the pipeline"
would be adopted. It was on September 19, 2018, that the Bangladeshi Parliament enacted the
2018 Digital Security Act, which contains a significant provision enabling police agents to
search or arrest someone without a warrant.
Concerned that the proposed bill will be in violation of constitutional principles and so
violate the spirit of the constitution, human rights organizations and journalists have stated
their objection to the plan. If a police officer believes that an action has been or is being
committed in a specific area where evidence may be lost, the officer may perform a search of
the site or anybody present, according to the new legislation, Section 43. Sections 8, 21, 25,
28, 29, 31, 32, and 43 of the Anti-Terrorism Act were enacted by Bangladesh's Sampadak
Parishad, a daily editorial forum, on September 16, last year, and are effective immediately.
In the statement, the words "surprise, disappointment, and regret" were used to describe the
situation. In accordance with Section 3 of the Digital Protection Act, which incorporates
language from the Access to Information Act 2009, which will deal with data issues,
information security will be addressed in detail. Section 32 of the Official Secrets Act, 1923,
provides that a person who commits or assists in the commission of a crime under the Act, or
who permits others to do so, may be sentenced to a maximum of 14 years in prison, a fine of
Tk 25 lakh, or both if he or she violates the Act. Glory to the wonderful ideas of nationalism,
socialism; democracy; and secularism that motivated our heroic people to dedicate their lives
to, and our brave heroes to lose their lives in defense of Part IX, Section 21 of the Act, gives
a more in-depth explanation of these requirements. People who break the law by using a
website or electronic means may be sentenced to up to three years in jail or a fine of Tk 5
lakh, or both, under Section 499 of the Penal Code, depending on the gravity of the
infringement. Act The Criminal Code states that anyone who intentionally posts or broadcasts
something on a website or in an electronic form that fosters hatred or enmity between
different groups of people and causes law and order to deteriorate faces seven years
imprisonment or a fine of Taka 5 lakh (approximately US$10000) (Taka 5,000,000). In
comparison of other countries, Bangladesh has been ranked first in South Asia for having the
most effective cyber security segment. So it can be said that Bangladesh has been improving
continuously in this sector. Even our neighbour country India has been facing more cyber
crimes daily than Bangladesh and has been struggling keep up an ethical environment.
For the most part, Eneken Tikk's suggestions are in the listener's favour. In order to protect
cyber security, he referred to the "territorial rule," which states that "Information
infrastructure located inside a state's territory is subject to the territorial sovereignty of that
state". According to 'the law of duty,' governments should behave responsibly to preserve
their own territorial integrity and sovereignty, as described by Tikk. Under the "early warning
legislation," he says, there is also a "responsibility to alert probable victims of known,
impending cyber-attacks."
Yes, Interpol and other foreign law enforcement organizations have engaged with the
Bangladesh government and police in this manner, but the country requires much more
cooperation, particularly from technological behemoths such as Microsoft and Google, in
order to effectively combat crime and corruption. For the purpose of concision, I'll just
mention Tikk's other two guiding principles: self-defense and access to knowledge. Everyone
has the right to self-defense, and the general public has the right to be informed of dangers to
their life, security, and general well-being, according to him. According to him, it is being
urgued that Bangladesh's government to take preventive and precautionary measures to
ensure the country's cybersecurity.
c. Individual awareness
It is impossible to escape the consequences of globalization. There must be an increase in
public awareness about personal data protection and safety in addition to government-led
measures.
In order for professionals to be able to deal with cyber technologies, regardless of their
position in the hierarchy or the numerous organizational structures they operate in, they must
obtain a minimal level of ability in dealing with cyber technologies. The only way to save
Bangladesh from falling into a pit of cyber security dangers is to provide it with enough
education and awareness. To ensure your safety when using the internet, you should take a
few simple steps. Here are a few examples of possible preventive measures:
Ensure the safety of your internet connection (iv), practice safe web browsing (v), and only
conduct online transactions with reputable merchants (vi), and use extreme caution when
posting information to public forums (ix) Antivirus software has to be kept up to date. For
cybercrime victims, people should report it to our local police station, which may contact the
FBI and the Federal Trade Commission for additional investigation. Even though small
crimes may seem inconsequential, they must be reported as soon as they happen. The citizens
can assist prevent similar crimes from happening in the future if the government act quickly.
The financial institutions and companies where the crime occurred should be contacted if any
identity theft is suspected.
Conclusion
As a worldwide phenomenon, cybercrime presents serious challenges to national security in
any country, including Bangladesh. As a consequence of globalization, cybercrime has
become an even more serious problem for the United States. Weak cyber security measures,
people's unfamiliarity with modern technology, and widespread ignorance of potential threats
to online safety might have serious ramifications for the country. In addition, the country's
regulations seem to be inadequate to safeguard the country's internet. International
cooperation, the development of technological know-how, the acquisition of knowledge, and
the promotion of public awareness of cyber security concerns are some of the corrective
measures that the country may explore in order to confront the ever-present cyber security
challenges. It is imperative that a national infrastructure be built in order to empower citizens
and enhance democratic values and standards for sustainable economic growth by using
infrastructure to improve human capital; democratic accountability; e-commerce; finance;
public utilities; ICT-enabled services and all kinds of digital ICT-enabled services. The quick
development in cyber-crime in Bangladesh and around the globe reinforces the argument that
the problem of cyber-crime is unavoidable, despite the fact that others say that cyber risks are
not a realistic possibility for Bangladesh in the near future. Last but not least, it can be
claimed that the time has come for Bangladesh to adopt preventative and counteracting
actions in order to tackle the risks presented by cybercriminals. As a result, the Bangladesh
government as well as the general public should carefully consider the ideas included in this
paper.