মঙ্গলবার, ১৩ ডিসেম্বর, ২০১১

Question: Who can issue a digital signature certificate to a subscriber?

Ans: A Certifying Authority can issue a digital signature certificate to a subscriber. The ICT Act, 2006 and the Certifying Authority can make the rules framed under the Act stipulates the methods for issuance of a digital signature certificate.
See More
Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 106-107.
And read more, the following suggested readings are enlisted here:
Digital Signature Guidelines – Tutorial
Who can issue a digital signature certificate to a subscriber?
Digital Signature / Certificate | Onine Tax Filing | E-Loans | India
DIGITAL SIGNATURE CERTIFICATE, India, Digital Signature MTNL
ELECTRONIC TRANSACTIONS ORDINANCE – SECT 2 Interpretation
Controller of Certifying Authorities | faqs
Type of Applicant/Subscriber
Security software – disk encryption, file encryption, user
Digital Signature – Email Digital Signatures – Digital Certificates
How can I apply for a Digital Certificate – (n)Code Solutions

Question: When can a digital signature certificate be revoked?

Question: What other provisions/Acts are not covered under the ICT Act?

Ans: Sec 87 of the ICT Act, 2006.
See more: Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 154 & p. 69.
And read more, the following suggested readings are enlisted here:

Question: What other provisions/Acts are not covered under the ICT Act?

Ans: Sec 87 of the ICT Act, 2006.
See more: Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 154 & p. 69.
And read more, the following suggested readings are enlisted here:

Question: What are the functions of Controller?

Ans:
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 101-102.
And read more, the following suggested readings are enlisted here:

Question: What are the criminal offences stipulated by ICT Act 2006?

Ans:
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 139.
And read more, the following suggested readings are enlisted here:

Question: What are the civil offences stipulated by ICT Act 2006?

Ans:
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 138.
And read more, the following suggested readings are enlisted here:

What are Symmetric and Asymmetric Keys?

Ans:
Symmetric-key algorithms are a set of algorithms for cryptography that make use of immaterially correlated, often identical, cryptographic keys for both decryption and encryption. The encryption key is slightly related to the decryption key, in that they may be identical or there is a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link.
Other terms for symmetric-key encryption are secret-key, single-key, shared-key, one-key, and private-key encryption. Use of the last and first terms can create ambiguity with similar terminology used in public-key cryptography.
In a symmetric cipher, both parties must use the same key for encryption and decryption. This means that the encryption key must be shared between the two parties before any messages can be decrypted. Symmetric systems are also known as shared secret systems or private key systems. Symmetric ciphers are significantly faster than asymmetric ciphers, but the requirements for key exchange make them difficult to use.
In an asymmetric key, the encryption key and the decryption keys are separate. In an asymmetric system, each person has two keys. One key, the public key, is shared publicly. The second key, the private key, should never be shared with anyone. When you send a message using asymmetric cryptography, you encrypt the message using the recipients public key. The recipient then decrypts the message using his private key. That is why the system is called asymmetric. Because asymmetric ciphers tend to be significantly more computationally intensive, they are usually used in combination with symmetric ciphers to implement effect public key cryptography. The asymmetric cipher is used to encrypt a session key and the encrypted session key is then used to encrypt the actual message. This gives the key-exchange benefits of asymmetric ciphers with the speed of symmetric ciphers.
Difference between symmetric and asymmetric key cryptography?
Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised.
The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric.
See more
Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009).
And read more, the following suggested readings are enlisted here:
  1. Description of Symmetric and Asymmetric Encryption
  2. Symmetric vs. asymmetric algorithms
  3. Symmetric-key algorithm – Wikipedia, the free encyclopedia
  4. Public-key cryptography – Wikipedia, the free encyclopedia
  5. WikiAnswers – Difference between symmetric and asymmetric key
  6. Symmetric and Asymmetric ciphers
  7. SQL Server Encryption Symmetric vs. Asymmetric Keys
  8. Combining Symmetric and Asymmetric Encryption – CodeProject
  9. Microchip Technology Announces dsPIC30F Symmetric and Asymmetric
  10. SA Laboratories – A Cost-Based Security Analysis of Symmetric and

Question: Can a digital signature certificate issued by foreign Certifying Authority be valid in Bangladesh?

Ans:
Yes. Controller of CA may give recognition to foreign certifying authorities and the digital signature certificate issued by them will be valid. Section 20 of the ICT Act 2006 has made provisions for this.
See More:  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 105-106.
And read more the following suggested readings are enlisted here:

Question: Can a CA suspend the digital signature certificate issued by it?

Question: Are there any restrictions on the number of players applying for a license to become a CA?

Ans:
No, there is no restriction on the number of players applying for a license to become a CA.
See More: Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 106-107.
And read more, the following suggested readings are enlisted here:

Archive for ‘Question: Are there any restrictions on the number of players applying for a license to become a CA?’

Ans:
No, there is no restriction on the number of players applying for a license to become a CA.
See More: Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 106-107.
And read more, the following suggested readings are enlisted here:

Question: Are network service providers liable for offences committed by third party?


Ans:
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 148.
And read more, the following suggested readings are enlisted here:

Question 9. Can use of electronic records or digital signature be valid in Government and its agencies?

Ans: Government has enacted the ICT Act 2006 on 8 October 2006 with an aim to provide a legal and regulatory framework for promotion of e-Commerce and e-Governance. Use of electronic records or digital signature would be valid in Government and its agencies as per the provision of the Act.  The Act contains the provisions with regard to Legal recognition of digital signatures, security procedure for electronic records and digital signature, appointment of Certifying Authorities and Controller of Certifying Authorities, Issue of license to Certifying Authorities to issue digital signature certificates, etc. among other legislative provisions.
See for more information:
Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 74-77.
The following suggested readings are enlisted here:
  1. Electronic Records – National Archives Administration, Republic
  2. SBOA: Electronic and Digital Signatures
  3. Electronic Procurement in Government Contracting
  4. Now Path
  5. I.T. Act Its Strength & Short Comings – Overview & Suggestion For
  6. TITLE 14: COMMERCE SUBTITLE A: REGULATION OF BUSINESS CHAPTER I
  7. Digitally Signed Contract Note
  8. Montana HB 188
  9. IR – Standards Review and Recommendation Publication – SRRPUB13

Question 8. What is authentication and how does ICT Act 2006 authenticate the electronic records?

Ans: See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 77.
The following suggested readings are enlisted here:
Information Technology Act, 2000
http://www.dateyvs.com/gener07.htm
Chapter 06 Information Technology Act 2000
http://www.slideshare.net/…/chapter-06-information-technology-act-2000-presentation
Records Management Guidance For PKI Digital Signature
http://www.archives.gov/records-mgmt/…/pki.html
Cyber Law
http://www.scribd.com/doc/16050394/Cyber-Law
The Information Technology Act, 2000: A Legal Framework for E
http://www.sudhirlaw.com/cyberlaw-itact.htm
The Uniform Electronic Commerce Act
http://unpan1.un.org/intradoc/groups/public/documents/…/UNPAN003546.pdf
LEGAL ISSUES
http://www.tfreview.com/xq/asp/txtSearch…/exactphrase…/display.htm
[PPT] Legal and Privacy Issues for Authentication
http://net.educause.edu/ir/library/powerpoint/NMD0405.pps
Cyber Law Ppt Presentation
http://www.authorstream.com/…/varun23oct-128029-cyber-law-cyberlaw-education-ppt-powerpoint
INFORMARTION TECHNOLOGY ACT
http://144.16.72.182/vigyan/itact.html
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 77.

Question 7. What do you mean by Cyber Prestige?

Question 6. What is the SPITCEROW (winner) of the case ACLU vs. RENO (1997)?

The foremost process of examination, SPITCEROW, is the short form of a sequence of key words in questions that one must inquire in order to realize a conflict and know what resolution methods to apply to the conflict.  It is a superior method of analysis if one enjoys a bit more time than urgent necessity because it forces us to acquire the context of the conflict acutely.  SPITCEROW will remind us to ask the following questions in analyzing a conflict so that we can commence to implement steps that will stop it from getting violent or becoming more violent:
1.      What are the SOURCES (or origins) of this conflict?
2.      Who are the PARTIES to this conflict?
3.      What are the ISSUES of this conflict?
4.      What are the TACTICS being used by the various parties?
5.      What, if anything, has CHANGED as the conflict developed over time?
6.      How did the conflict ENLARGE?
7.      What ROLES did other parties play and how did this affect the continuation of the conflict?
8.      What has been the OUTCOME of the conflict up to now?
9.     Who can be said to have been the WINNERS of the conflict up to now?
This is about as far as most academic courses will take one – the analysis of a conflict.  In the field we are not interested in the analysis as an end in itself but as a means to stopping violence from killing people around us so we will expand the SPITCEROW abbreviation with the following questions which will lead from the analysis to action in the field that will help to stop coming violence.
Facts of the Case:
Several litigants challenged the constitutionality of two provisions in the 1996 Communications Decency Act. Intended to protect minors from unsuitable internet material, the Act criminalized the intentional transmission of “obscene or indecent” messages as well as the transmission of information which depicts or describes “sexual or excretory activities or organs” in a manner deemed “offensive” by community standards. After being enjoined by a District Court from enforcing the above provisions, except for the one concerning obscenity and its inherent protection against child pornography, Attorney General Janet Reno appealed directly to the Supreme Court as provided for by the Act’s special review provisions. Question raised that “Did certain provisions of the 1996 Communications Decency Act violate the First and Fifth Amendments by being overly broad and vague in their definitions of the types of internet communications which they criminalized?”
On June 26, 1997, in the first Internet-related U.S. Supreme Court case ever to be decided, seven justices found the disputed provisions of the Communications Decency Act (CDA) unconstitutional under the First Amendment. Justice John Paul Stevens delivered the opinion of the Court, and was joined by Justices Breyer, Ginsburg, Kennedy, Scalia, Souter, and Thomas. Justice O’Connor filed a separate opinion, joined by Chief Justice Rehnquist, concurring in the decision but dissenting in part.
Striking a tremendous victory for the future of the First Amendment on the Internet, the Supreme Court ruled in Reno v. ACLU that the federal Communications Decency Act (CDA) is an unconstitutional restriction on free speech, affirming a lower court decision. The CDA, Congresses first attempt to regulate the freedom of speech online, was passed in February 1996. In imposing content regulations throughout the Internet, much like broadcast television and radio, the CDA intended to threaten the very existence of the Internet as a means of free expression. In defeating this oppressive law, the ACLU has helped maintain the Internet as a free forum for ideas and commerce. The Following SPITCEROW (winner) of the case ACLU vs. RENO (1997):
  • The opinion was a ringing endorsement of the Internet as a “dramatic” and “unique” “marketplace of ideas.”
  • The Court determined that the World Wide Web is analogous to a library or a shopping mall, rejecting the government’s argument that it could be viewed as more akin to a broadcast medium.
  • The justices found that although sexually explicit material was “widely available” online, “users seldom encounter such content accidentally.”
  • In its First Amendment analysis, the Court explained that “the many ambiguities concerning the scope of [the CDA's] coverage render it problematic for purposes of the First Amendment,” and declared that the Act “unquestionably silences some speakers whose messages would be entitled to constitutional protection.”
  • The Court found that the lower court in this case “was correct to conclude that the CDA effectively resembles the ban on ‘dial-a-porn’” invalidated in an earlier decision — Sable Communications of Cal., Inc. v. FCC, 492 U.S. 115 (1989).
  • Examining the issue of whether the rights of adults should be compromised in order to protect children, the justices declared that “in order to deny minors access to potentially harmful speech, the CDA effectively suppresses a large amount of speech that adults have a constitutional right to receive and to address to one another…[w]hile we have repeatedly recognized the governmental interest in protecting children from harmful materials,…that interest does not justify an unnecessarily broad suppression of speech addressed to adults.”
It would be concluded, yes. the Court held that the Act violated the First Amendment because its regulations amounted to a content-based blanket restriction of free speech. The Act failed to clearly define “indecent” communications, limit its restrictions to particular times or individuals (by showing that it would not impact on adults), provide supportive statements from an authority on the unique nature of internet communications, or conclusively demonstrate that the transmission of “offensive” material is devoid of any social value. The Court added that since the First Amendment distinguishes between “indecent” and “obscene” sexual expressions, protecting only the former, the Act could be saved from facial overbreadth challenges if it dropped the words “or indecent” from its text. The Court refused to address any Fifth Amendment issues.
For More information the following readings are suggested to the Student of the Course Code- 205 , LL.B (Hons) Part-II, Department of Law & Justice, Rajshahi University.
Reno v. ACLU (1997)
Reno v. American Civil Liberties Union
Reno v. ACLU, U.S. Supreme Court Case Summary & Oral Argument
Feature on Reno v. ACLU I
Reno v. ACLU
Reno v. ACLU
Communications Decency Act Struck Down!!
Reno v. ACLU – FindLaw
Reno v. ACLU
ACLU v. Reno case materials by Cyber-Rights & Cyber-Liberties (UK)
Analyzing Conflicts – PSYCHOSOCIAL MANUAL
CONF 801  SPITCEROW
A Disastrous Balancing Act: The Beginning of Cambodia’s Misery
[PDF] Latin American Development and Conflict Transformation1 [PDF] THE JOURNAL OF ALTERNATIVE PERSPECTIVES IN THE SOCIAL SCIENCES
[PDF] Conflict Resolution Techniques & Practice CONF 300, Spring 2006  ফাইলের ধরণ: PDF/Adobe Acrobat
Maria Dolores Rodriguez’s Page – Peace and Collaborative
[PDF] UNIVERSITY FOR PEACE – AFRICA PROGRAMME
[DOC] George Mason University

See also  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009).

Question 5. Explain the pessimistic issues which are happened passing of the Cyber Law?

Ans:
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 61-65.
And read more for proper answering:
Book of Dr. Zulfiquar Ahmed, pp 61 to 65.

Question 4. How does the Domain Name Server (DNS) redirect the requesting computer to another DNS?

Ans: See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 17-19.
And read more for proper answering:
Every service provider has at least one DNS server, and usually provides many more. Medium sized businesses and organisations maintain their own email systems and other major services etc. will also typically have at least one DNS server for their network. DNS servers accept requests from programs and other domain name servers to provide mapping between domain names and IP addresses. When a request from a computer is made to resolve a URL to an IP address (And vice versa) a DNS server can do one of the following:
  • It can answer the request with an IP address because it already knows the IP address for the requested domain. It gets this information from a resolution table that it constantly updates containing mappings of host domain names to IP addresses.
  • If it doesn’t have the mapping, it can contact another DNS server and try to find the IP address for the name requested. Depending on the DNS configuration, it may have to do this multiple times in a hierarchal fashion eventually accessing the main DNS servers on the internet at the top of the ‘tree’.
  • It may reply with the IP address of a more ‘distant’ DNS server that contains more table information relating to the requested URL and domain name, the requesting computer then using the more distant DNS server to query the address.
  • It can return an error message because the requested domain name is invalid or does not exist, this typically being carried out as the DNS requests for information are reaching higher up the ‘tree’.
When a DNS server resolves a request, it caches the IP address it receives into a resolution table. For example, when a DNS server has made a request to a root DNS server for any .biz domain, it knows the IP address for a DNS server handling the .biz domain, so it doesn’t have to enquire to the root DNS servers again for that information and this then reduces traffic and request load.
More Read……………….
Domain Name System
Best Practices for Speeding Up Your Web Site
DNS security and performance considerations, and ISP alternatives
How Does DNS (Domain Name System) work?
DNS Server Overview
See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), pp. 17-19.

Question 3. ‘No one can control the Internet’. Explain it with special reference to ICCAN.

Ans:  See  Dr. Zulfiquar Ahmed, A Text Book on Cyber Law in Bangladesh, (Dhaka: National Law Book, 2009), p. 3.
And read more for proper answering: The official answer is no one, but it is a half-truth that few swallow. If all nations are equal online, the US is more equal than others. The governance of the Internet, its regulation and in particular the management of its core resources, is one of the most controversial issues in the ongoing discussion on the future development of the global information society within the context of the Geneva World Summit (WSIS I). While everybody agrees that there is a need for something like a global regulatory framework to guarantee the stability, flexibility und further development of the Internet, there is a broad range of different ideas, which kind of regulation should be developed and applied. Concepts of private sector led self-regulation stands versus governmental regulation with a broad variety of co-regulatory ideas in between.
Not that it is an easy issue to define. The internet is, essentially, a group of protocols by which computers communicate, and innumerable servers and cables, most of which are in private hands. However, in terms of influence, the overwhelming balance of power lies with the Internet Corporation for Assigned Names and Numbers, based in Marina Del Rey, California.
Two of the biggest countries pushing for this are China and Iran (Venezuela another lovely country signed up on this bandwagon). According to them, they are doing this so the internet can have more transparency and not be influenced by one country. Except, you would be hard press to find an example of such American abuse. In fact, its almost funny considering the ways some of these countries promote transparency within their own country.
ICANN is a not-for-profit organisation that regulates online addresses, known as domain names, and their suffixes, such as “.com” and “.org”. Since ICANN reports to the US government’s Department of Commerce, the domain name process is effectively overseen by the US government. China, Russia and Europe have all expressed concern at this situation because it means the US has leverage over the global coordination of the internet. “It has a role that is different from the role of all other governments,” says Massimiliano Minisci, a regional manager at ICANN. “That’s a concern around the world.”
It is not hard to see why. Take, for instance, a scenario in which a country wants to change certain aspects of its domain names. Any changes carried out at the “top” level – adding new country-level suffixes, for example – have to be checked by the US Department of Commerce, which verifies that proper procedure has been followed. Once that check has been done, the actual implementation of the change is carried out by Verisign, a US-based private company that manages the root name database, which contains the full official list of recognised suffixes. “The US government could block a modification to this database,” Minisci says. “So the US can, theoretically, decide who is on the internet and who isn’t.”
This unsatisfactory situation will be up for discussion by the parties involved in September 2009. So what can be done?
One drastic option would be to break the internet into chunks. A more realistic idea is for more governments to get involved with ICANN, while the most straightforward option would be for the US government to release its grip on ICANN. Milton Mueller, an internet governance expert at Syracuse University in New York, considers this outcome unlikely. “No one wants to let go. The thinking is that, at the crudest level, it’s something under our control, so why mess with it?”
The US Department of Commerce is expected to sign an “affirmation of commitments” with Internet governing body ICANN today, relaxing US control over the way the Internet is managed over the coming years. The move will see the Internet Corporation for Assigned Names and Numbers (ICANN) assume greater autonomy over critical policy decisions which will shape the future of the Internet for its billions of worldwide users. Earlier this year, the EU called for the US to cede control to an international body, saying:
The US government is the only body to have had formal oversight of ICANN’s policies and          activities since its inception in 1998 … The Commission believes that ICANN should become universally accountable, not just to one government but to the global internet community … This is particularly relevant given that the next billion of internet users will mainly come from the developing world.
An international “G12 for internet governance” is expected to be created, with representation from Europe and the developing world, which would review issues such as security and make policy recommendations to ICANN. ICANN was set up by the US Government as a non-profit organization responsible for administering the TLD (Top Level Domain) system for Internet addresses. Many changes to the TLD system are expected in the coming years, after ICann voted to relax some of the rules around how TLDs were administered. Changes expected include the ability to use, for example, Asian or Arabic characters in Internet addresses and for brands or individuals to define their own domains.
More Read……………….
Internet Co-Governance: Towards a Multilayer System of Regulation
www.un-ngls.org/orf/kleinwachter.doc
Unknown internet 1: Who controls the internet?
www.newscientist.com/…/mg20227062.000-unknown-internet-1-who-controls-the-internet.html
Should US relinquish control of ICANN?
digg.com/…/Should_US_relinquish_control_of_ICANN

Syllabus On Cyber law

Syllabus
On
Cyber law : LLB (Hons) -321
Third Year
Second Semester
Department of Law
Prime University
Definition, nature, scope, utility; Origin and development of Cyber Law and Internet. Growth of Com, Computer Network System in Bangladesh; Net work of Policy in Bangladesh, IT Policy in Bangladesh, Internet Service Providers (ISP) in Bangladesh: Present Legal Basis of ISP: E-readiness in Bangladesh; E-Commerce in Bangladesh, E-Governance in Bangladesh; E-learning/Education in Bangladesh; E-Journal in Bangladesh; E-Evidence in Bangladesh; Digital Signature, Cyber Crime: Cyber vandalism, Hacking, Malicious Spreading in Viruses, Password fraud, Cheating, Cyber Pornography, Child Pornography, Protection of Copyrights and Intellectual Property Rights. Invasion of Privacy, Constitutional Basis of Privacy, Security, Search and Seizure, E-mail: Unsolicited E-mail, Defamation, Harassment and E-mail abuse, Present Legal Protection, Human Rights Violation and Internet, The Information Technology Act -2006: Concept of Cyber Crime and ICT Act -2006; Jurisdiction and Cyber Crime, Criminal Justice in Bangladesh and Implications on Cyber Crime, Arrest but no punishment! The Evidence Act of 1872 Vs. ICT Act -2006, UNCITRAL Model Law on Electronic Commerce.
Syllabus
on
Course 205: Cyber & Telecommunication Law
LL.B (Honours) Part- II
Department of Law & Justice
University of Rajshahi
Basic Concepts of Cyber Law and Technology Law
Understanding the Technology of Internet: Origin of Internet; How the Internet functions; Understanding TCP/IP, HTTP, Web hosting etc; Scope of Cyber Law: Nature of Cyber Space; Cyber Property; Cyber Personality; Cyber Transactions; Cyber Jurisprudence: Concepts of Historical, Analytical and Ethical Jurisprudence; Relationship between Meta Society Laws and Cyber Law; How Cyber Law need to be developed
Cyber Law – Bangladesh Perspective
Historical Development of Cyber Law in Bangladesh; Overview of the Information Communication and Technology Act 2005; Amendments and Limitations of IT Act; Digital Signatures; Cryptography; Cryptographic algorithm; Public cryptography; Private cryptography; Electronic Governance; Legal Recognition of Electronic Records; Legal recognition of digital signature; Certifying Authorities; Cyber Crime and Offences; Network Service Providers Liability; Cyber Regulations Appellate Tribunal; Penalties and Adjudication
Cyber Law – International Perspective
International Conventions on Cyber Law; Development of Cyber Laws in USA; Development of Cyber Laws in Europe; Development of Cyber Laws in Asia;  Data Protection Laws in EU and USA; OECD Principles of Data Protection; EU Data Protection Laws;
Intellectual Property Issues in Cyber Space
Domain Names and Related issues: Understanding the system of domain names, Different Perspectives, Cyber Squatting, UDRP; Copyright in the Digital Media: Copyright & Cyberspace; Nature of Copyright in Cyberspace;, Fair use and Infringement, Copyright issues in Digital Media, Hyper linking, Caching, and Framing etc.; Patents in the Cyber World: Nature of Patent Rights; Patents in the Digital Environment; Procedure of Obtaining Patents, Difference between Copyright and Patents, Patenting of Business Methods; Trademark in Cyberspace: Trademark law & Cyberspace; Law relating to Semiconductor Layout & Design
Cyber Crime and Digital Evidence
Cyber Crimes and Cyber Laws; Types of Cyber Crimes; Legal Provisions regarding Cyber Crimes; Investigation and adjudication of cyber crimes; Digital evidence; Methodology of Cyber Crime Investigation; Basic Investigation Techniques; Investigating Emails
Rights of Netizens and E-Governance
Privacy and Freedom  Issues in the Cyber World; Nature of Privacy Rights; Cyber Stalking; Use of Cookies; Privacy Invasion by Government; Privacy Invasion by Employer; Freedom of Speech Vs Privacy Rights, Spam etc; E-Government and E-governance; Legal Issues in E-Governance
E-commerce- Legal issues
Electronic Commerce: e-Commerce in Bangladesh; Overview of e-Commerce; The Promising Significance of e-Commerce; Dimensions of E-Commerce: The Growth and Potential of E-Commerce in Bangladesh; The Bottlenecks of e-Commerce;  The Regulatory and Legal Environment of E-Commerce; e-Banking: e-Banking in Bangladesh; Growth and Uses of e-Banking in Bangladesh;  Tele- Banking Service in Bangladesh; Challenges of Development of e-Banking in Bangladesh; Internet Banking in Bangladesh; Electronic Contracts: The Essence of Digital Contracts; Defining a Digital Contract; Formation of Digital Contracts; Special issues relating to Cyber contracts; The System of Digital Signatures; Technology of Digital Signatures, Hash, Asymmetric Cryptography; Digital Signatures – legal issues; Digital Signatures – technical issues
Syllabus
On
CSE 208R: Cyber & Intellectual Property Law
Department of Computer & Engineering
Rajshahi University
Cyber Law: Definition, nature, scope, utility; Origin and development of Cyber Law and Internet. ICT Policy in Bangladesh, Internet Service Providers (ISP) in Bangladesh: Domain Name, Present Legal Basis of ISP: E-readiness in Bangladesh; E-Commerce in Bangladesh, E-Governance in Bangladesh; E-learning/Education in Bangladesh; E-Journal in Bangladesh; Digital Signature, The Evidence Act of 1872 Vs. ICT Act -2006, Electronic Evidence in Bangladesh; Legal Effects of Electronic Evidence. UNCITRAL Model Law on Electronic Evidence.
Cyber Crime: Jurisdiction and Cyber Crime, Criminal Justice In Bangladesh and Implication on Cyber Crime: Cyber vandalism, Hacking, Malicious Spreading in Viruses, Password fraud, Cheating, Cyber Pornography, Child Pornography, Protection of Copyrights and Intellectual Property Rights. Privacy: Invasion of Privacy, Constitutional Basis of Privacy, Security, Search and Seizure. E-mail: Unsolicited E-mail, Defamation, Harassment and E-mail abuse, Present Legal Protection; Human Rights Violation and Internet; The Information & Communication Technology Act, 2006: Objectives, Strengths & Weaknesses of the ICT Law, Regulation of Cryptography; International Cyber Law- India, Sri Lanka, Japan, Malaysia, Australia and the USA. International Conventions on Cyber Laws & Crime.


Syllabus
On
Cyber law : LLM-734
Master of Laws
Department of Law
Prime University
Definition, nature, scope, utility; Origin and development of Cyber Law and Internet. Growth of Com, Computer Network System in Bangladesh; Net work of Policy in Bangladesh, IT Policy in Bangladesh, Internet Service Providers (ISP) in Bangladesh: Present Legal Basis of ISP: E-readiness in Bangladesh; E-Commerce in Bangladesh, E-Governance in Bangladesh; E-learning/Education in Bangladesh; E-Journal in Bangladesh; E-Evidence in Bangladesh; Digital Signature, Cyber Crime: Cyber vandalism, Hacking, Malicious Spreading in Viruses, Password fraud, Cheating, Cyber Pornography, Child Pornography, Protection of Copyrights and Intellectual Property Rights. Invasion of Privacy, Constitutional Basis of Privacy, Security, Search and Seizure, E-mail: Unsolicited E-mail, Defamation, Harassment and E-mail abuse, Present Legal Protection, Human Rights Violation and Internet, The Information & Communication Technology Act -2006: Concept of Cyber Crime and ICT Act -2006; Jurisdiction and Cyber Crime, Criminal Justice in Bangladesh and Implications on Cyber Crime, Arrest but no punishment! The Evidence Act of 1872 Vs. ICT Act -2006, UNCITRAL Model Law on Electronic Commerce.
BRAC University
LL.B. (Hons)
LAW 425: Cyber Law

The course would be divided into several modules covering Introductory Concepts, Computer Concepts, Electronic Signatures, Intellectual Property Issues, Cyber Crimes, Jurisdictional issues, Data Protection and privacy. The syllabus of the course would be divided into sessions, which would be clubbed together to facilitate the student’s ease of studying and understanding.3 credits