Cyber Law in Bangladesh Assignment
Cyber Law in Bangladesh Assignment
“The Controllers exclusive power could cause problems with the enforcement
of ICT Act 2006”
Prepared For :
Dr. Md. Arifuzzaman
Senior Lecturer, Department of law
Green University of Bangladesh
Prepared By :
Nahida Afroj
Id:203011004, Department of law
Green University of Bangladesh
(2) In particular, and without prejudice to the generality of the foregoing power, such regulations
may provide for all or any of the following matters, namely:-
(a) the particulars relating to maintenance of data-base containing the disclosure record of every
Certifying Authority under clause (m) of section 18
(b) the conditions and restrictions subject to which the Controller may recognize any foreign
Certifying Authority under sub-section (1) of section 19.
(c) the terms and conditions subject to which a license may be granted under clause of sub-
section (3) of section 21.
(d) other standards to be observed by a Certifying Authority under clause (d) of section 30.
(e) the manner in which the Certifying shall disclose the matters specified in sub-section (1) of
section 34.
(f) the particulars of statement which shall accompany an application under sub-section (3) of
section 36.
3. Functions of the Controllers :
We know, The Controller may perform all or any of the following functions :- a. Exercising
supervision over tge activities of the Certifying Authorities.
b. Laying down the standards to be maintained by the Certifying Authorities.
c. specifying the qualifications and experience which employees of the
Certifying Authorities should possess;
(d)specifying the conditions subject to which the Certifying Authorities .
e. specifying the contents of written, printed or visual materials and
advertisements that may be used in respect of a Digital Signature Certifying:
f . specifying the form and content of a Digital Signature Certificate;
g . specifying the form and manner in which accounts shall be maintained
by the Certifying Authorities;
(h) specifying the terms and conditions subject to which auditors may be
appointed and the remuneration to be paid to them for auditing the Certifying
Authorities;
i)facilitatining the establishment of any electronic system by a Certifying
Authority either solely or jointly with other Certifying Authorities and regulation of such
systems;
(j) specifying the manner in which the Certifying Authorities shall
conduct their dealings with the subscribers;
k) resolving any conflict of interests between the Certifying Authorities
and the subscribers;
l) laying down the duties and responsibilities of the Certifying Authorities
(m) maintaining computer based databases, which
(i) contain the discloser record of every Certifying Authority containing such particulars as may
be specified by regulations and
ii) shall be accessible to the member of the public
10.Power to delegate :
The Controller may in writing, authorize the Deputy Controller Assistant Controller or any other
Officer to exercise any of the power of the Controller under ICT Act -2006.
14. Conclusion :
The ICT Act regulates the use of digital security certificates, the provision of data services and
defines a series of offences related to malicious activity online. It provides remedies for offences
such as unauthorized damage to computer systems, tampering with computer source code,
hacking, publishing fake, obscene or defamatory information in electronic form, and publishing
false digital signature certificates.
The ICT Controller is an officer appointed under the ICT Act and regulates its implementation.
Under section 29 of the ICT Act, the Controller, or any officer authorized by him should
investigate any contravention of the ICT Act, or the rules or regulations made under it. In order
to do so, the Controller or authorized officer has the same powers as those vested in a civil court
under Bangladesh’s Code of Civil Procedure, which include powers of discovery and inspection
and compelling the production of any document.
Under section 30, the ICT Controller may access any computer system, any apparatus, data or
any other material connected with a computer system, for the purpose of searching or causing a
search to be made for obtaining any information or data contained in or available to the computer
system. The ICT Controller may, by order, direct any person in charge of, or otherwise
concerned with the operation of, the computer system, data apparatus or material, to provide him
with such reasonable technical and other assistance as he may consider necessary.
15. Bibliography:
1.Text book on Cyber law in Bangladesh written by Dr.Zulfiquare Ahmed
2.BJS written master, written by Emran Hossain
3.Internet :-
(a).BD Laws.com
(b).Lectures document on ICT Act -2006
Dr.Md.Arifuzzaman,Senior lecturer, Department of law
Green University of Bangladesh.