Cyber Law in Bangladesh Perspective (Cyber law notes chapter-2)


 HISTORICAL DEVELOPMENT OF CYBER LAW IN BANGLADESH:

The rapid expansion of the computer networks and the increasing abilities to access systems through regular telephone lines increases the vulnerability of these systems and the opportunity for their misuse for criminal activity. The user of cyberspace grows increasingly diverse and the range of online interaction expands. So dispute of every type may be expected to occur, which breach in online contracts, perpetration of online torts and crimes etc. The consequences of computer crime are enormous in terms of both the economic cost as well as human security.

Information Technology has spread throughout the world. It has opened up many opportunities for each sector. Even network information systems are being adopted by the governments world Wide, that's why the governments across the world are recognizing the need to secure and regulating 1 e cyber world. Cybercrime is a new class of crime in Bangladesh. It is rapidly expanding due to the extensive use of the Internet.

Cyber law, it is a term that summarizes the legal issues related to use of communicative, transactional, technologies, and distributive aspects of networked information devices and technologies. It is less a distinct field of law than property or contract law, as it is a domain covering many areas of law and regulation. IT law is a set of recent legal enactments, currently in existence in several countries. Which governs the process and dissemination of information digitally. These legal enactments cover a broad gamut o different aspects relating to computer software, protection of computer software, across and control of digital information, privacy, security, internet access and usage, and electronic commerce. These laws have been described as "paper laws" for "Paperless Environments".

In Bangladesh, a number of cyber-related laws are existing, The main among these are:

  • ·        Information & Communication Technology Act-2006
  • ·        Right to Information Act-2009
  • ·        Information & Communication Technology (Amendment) Act-20 13
  • ·        Digital Security Act-2018

 

CRYPTOGRAPHY & TYPES OF CRYPTOGRAPHY:

Cryptography is a technique of securing information and communications through use of Codes so that only those persons for whom the information is intended can understand and process it. thus preventing unauthorized access to information. The prefix ‘crypt’ means "hidden” and the suffix “graphy" means “writing". In Cryptography the techniques which are use to protect information are obtained from mathematical concepts and a Set of rules based on calculations known as algorithms to convert messages in ways that make it hard to decode them. These algorithms are used for cryptographic key generation, digital Signing, and Verification to protect data privacy, web browsing on the internet, and to protect confidential transactions such as credit card and debit card transactions.

Techniques used For Cryptography:

In today's age of computers, cryptography is often associated with the process where an ordinary plain text is converted to cipher text which is the text made such that the intended receiver of the text can only decode it and hence this process is known as encryption. The process of conversion of cipher text to plain text this is known as decryption.

Features of Cryptography are as follows:

  • 1. Confidentiality: Information can only be accessed by the person for whom it is intended and no other person except him can access it.
  • 2. Integrity: Information cannot be modified in storage or transition between sender and intended receiver without any addition to information being detected.
  • 3. Non-repudiation: The creator/sender of information cannot deny his or her intention to send information at later stage.
  • 4. Authentication: The identities of sender and receiver are confirmed. As well as destination/origin of information is confirmed.

Types of Cryptography:

  • A) Secret key (symmetric) cryptography. SKC uses a single key for both encryption and decryption.
  • B) Public key (asymmetric) cryptography. PKC uses two keys, one for encryption and the other for decryption.
  • C) Hash function (one-way cryptography). Hash functions have no key since the plaintext is not recoverable from the ciphertext.

In general there are three types of cryptography:

  • 1. Symmetric Key Cryptography: It is an encryption system where the sender and receiver of message use a single common key to encrypt and decrypt messages. Symmetric Key Systems are faster and simpler but the problem is that sender and receiver have to somehow exchange keys in a secure manner. The most popular symmetric-key cryptography system is Data Encryption System (DES)
  • 2. Hash Functions: There is no usage of any key in this algorithm. A hash value with a fixed length is calculated as per the plain text which makes it impossible for the contents of plain text to be recovered. Many operating systems use hash functions to encrypt passwords.
  • 3. Asymmetric Key Cryptography: Under this system a pair of keys is used to encrypt and decrypt information. A public key is used for encryption and a private key is used for decryption. Public Key and Private Key are different. Even if the public key is known by everyone the Intended receiver can only decode it because he alone knows the private key.

ELECTRONIC RECORD:

What are electronic records?

An electronic record is information recorded by a computer that is produced: or received the initiation, conduct, or completion of an agency or individual activity. Examples of electronic records include e-mail messages, word-processed documents, electronic Spreadsheets, digital images and databases. Many electronic records are maintained as part of an electronic recordkeeping system, such as geographic information systems (GIS), digital image storage systems, computer-aided design (CAD) systems, etc.

Legal Recognition of Electronic Records

In countries like USA, European Union, electronic records have legal significance. "ICT ACT-2006* has given recognition to electronic Records and Digital Signatures. Using them in by the government and its agencies. Electronic Information, paper & Ink based information has given equal legal force to treat electronic signatures at par with paper and ink-based signatures. The business doing on the web, in order to bring non-repudiation, and authenticity in transactions on the Internet, the IT Act provides for the deployment of digital signatures. These allow and encourage individuals and organizations in doing business with greater commerce potential through the web.

Section 6 of the ICT Act-2006 gives legal recognition to electronic records in Bangladesh. The law provides that information or any other matter shall be in writing or in the typewritten or printed form, the requirement of law shall be deemed to have been satisfied if such information or matter is made available in an electronic form. But the information or matter is accessible and usable for subsequent reference.

CERTIFYING AUTHORITY (CA):

A certificate authority (CA), also sometimes referred to as a certification authority, 1S a company or organization that acts to validate the identities of entities (such as websites, email addresses, companies, or individual persons) and bind them to cryptographic keys through the issuance of electronic documents known as digital certificates. A digital certificate provides:

  • # Authentication: by serving as a credential to validate the identity of the entity that it is issued to.
  • # Encryption, for secure communication over insecure networks such as the Internet.
  • # Integrity of documents signed with the certificate So that they cannot be altered by a third party in transit.

Purpose of Certifying Authority:

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates. A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as a trusted third party-trusted both by the subject (owner) of the certificate and by the party relying upon the certificate. The format of these certificates is specified by the X.509 standard.

CYBER CRIME & OFFENCES:

Chapter VII on Penalties and Adjudication and Chapter [X on Offences includes some cybercrime provisions that prohibits attacks or unauthorized access to computers & computer system.

Chapter [X: Section 66. Punishment for tampering with computer source documents

Whoever intentionally or knowingly conceals, destroys or alters, or intentionally or knowingly causes any other person to conceal, destroy or alter any computer source code used for a computer, computer programs, computer system, or computer network, when the computer source code is required to be kept or maintained by any law for the time being in force, shall be punishable with imprisonment of either description for a term which may extend to three years, or with fine which may extend to Taka two lakhs, or with both. Explanation. For the purpose of this section, “computer source code'' means the listing of programs, computer commands, design and layout, and program analysis of computer resources in any form.

Section 67. Hacking with computer system

Whoever, with the intent to cause or knowing that he is likely to cause wrongful loss or damages to the public or any other person, does any act and thereby destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits the offense of "hacking".

Section 68. Punishment for hacking

Whoever commits hacking shall be punished with imprisonment of either description for a term which may extend to three years, or with a fine which may extend to Taka two lakhs, or with both.

NETWORK SERVICES PROVIDER'S LIABILITIES:

This section discusses potential sources of liability for Internet service providers. Internet service providers (or "ISPS") provide Internet access service to customers in exchange for a fee. ISPS also store data for their customers' use, such as on a Usenet newsgroup server or a world wide web server. In general, as the following discussion reveals, ISP liability can be summed up in three words: "ignorance is bliss." ISP liability for the activities of its customers is generally based on a knowledge of the customer's activity. If the ISP is unaware of the behavior of its customer, most courts seem reluctant to hold the ISP liable for that behavior. However, once the ISP becomes aware of the customer's activity, or should have become aware of the activity with reasonable diligence, courts are much more likely to hold the ISP liable for its customer's actions. In addition to ISP liability, most of the following discussion is equally applicable to service providers who do not connect directly to the Internet, such as bulletin board operators and proprietary information providers.

Discussion of Internet service provider liability is continued subparts:

  1. ·        Copyright liability--cases
  2. ·        Trademark liability
  3. ·        Contract law and fraud
  4. ·        Defamation

CYBER APPELLATE TRIBUNAL (CAT):

The ICT Act 2006 provides provision for establishing the cyber Appellate Tribunal tor Bangladesh. Section 82 started that:

  • #The Government shall, by notification in the official gazette, establish one or more appellate tribunals to be known as the Cyber Appellate Tribunal.
  • # The CAT will be comprised of a chairman and two members appointed by the government.
  • # The chairman will be such a person, who was a justice of the supreme court or is Continuing his post or capable to be appointed as such and one of the members will be judicial executive as a district judge or he may be retired and Other members will be a person having the knowledge and experience in ICT that is prescribed.
  • # The Chairman & members will be in their post minimum of 3 years and maximum of 5 years and the conditions of their service will be decided by the government.
Procedure & Power of CAT:

The ICT Act 2006 provides provisions Tribunal. Section 83 stated that: regarding procedure & power of Cyber Appellate

  • # The CAT shall have the power to here and settle the appeal made against the judgment of the cyber tribunal & session Court.
  • # In Case of hearing the settling any appeal the cyber appeal tribunal will follow the rules made there under and if the procedure is not fixed by making rules, those with proper adoption will be followed which the high court division follow in case of criminal justice by the appeal tribunal.
  • # The appeal tribunal will have the authority of supporting, Cancelling, changing or editing the judgment of the cyber tribunal.

Discussion on Power & Function of CAT:

It is essential for the tribunal to understand the technical aspects pertaining to digital signatures, Cryptography, etc. the latest development in the field of information technology. I the legal aspects of the presiding officer, as adequate safeguards are Contained in the enactment to ensure the requisite legal qualifications.

It is still doubtful whether such a presiding officer would possess the technological expertise and knowledge which is to be harmonized with the legal knowledge for resolving ICT related disputes. It would have been ideal for the CAT to comprise of at least one judicial member and one technical member (ICT professionals/experts) to effectively hear and resolve disputes before it.

The omission of a technical member is all the more glaring since several tribunal/ quasi-Judicial bodies like the Income Tax Appellate Tribunal, Sales Tax Tribunal, Central Administrative Tribunal, and Company Law board. Board for Industrial and Financial Reconstruction etc. have a departmental member who assists the Presiding Officer or the Judicial member is resolving the disputes. In this respect, the case laws with respect to information and Communication Technology are not available in Bangladesh. The decisions of the cyber Appellate Tribunal are going to be trend setting. The Government to consider amending the ICT Act and providing that the CAT may comprise of one technical member. This would be a long way in ensuring that the correct concepts of Information Technology are applied while resolving ICT disputes in the legal field.

Post a Comment

0 Comments