SlideShare une entreprise Scribd logo
1  sur  8
Cyber Cafe in Bangladesh
Introduction of cyber cafe
Cyber Cafe is a place where one can use a computer with internet access, most for a
fee, usually per hour or minute. In Bangladeshi Commission decided to issue the
following Categories of ISP including cyber Cafe Service License with an open
licensing procedure
Category A :
Category B :
Category C :

For each Police Station (P/S) of Dhaka Metropolitan Area.
For each Police Station (P/S) of Chittagong, Rajshahi, Khulan,
Sylhet and Barisal Metropolitan Area.
For each Police Station (P/S) of other than Metropolitan Area.

Status of issued license of ISP for Cyber Cafe (2008-2009)
SI No

Category

Number of
licenses

1

Category A

99

2

Category B

16

3

Category C

4
Condition of BTRC
1. Cyber Cafe must have an office with valid address and there must be at least
two contact phone numbers and one e-mail address.
2. Cyber Cafe has to keep the record of the browser’s name and address of
National ID Card No. in a register.
3. To provide privacy, only for monitor, a partition may be used but the
maximum height is to be four feet from the floor level. Any kind of door or
restriction is not allowed in the entrance of booth (work station/terminal).
4. On school time uniformed students are not allowed to browse. If they have any
recommendation from the school authority of guardian only then they will be
allowed to browse for educational needs.
5. A complaint box should be provided in an open place of the cyber cafe.
Types of Crime
1. Unauthorized Threaten e-mail for a nation’s security and others.
2. Un-Social activities.
3. Abuses of porn and adult site by under aged.
4. Online gambling.
5. Cyber defamation.
6. Unauthorized access to computer system or networks.
7. Illegally Data transfer.
8. Sale of illegal articles.
Instruction Given by CCOAB.
1. To Maintain of Users name and Particular in a resister.
2. Privacy partition must be four feet high from floor.
3. Can’t be kept CD Rom and hard disk in user’s computer.
4. To Ensure a fixed time for school students.
5. Must be ensuring a good environment for users.
6. CCOAB and Others law and Enforcement agencies must be visit the Cafe at any time.
For Users Safety
1.

Please write your name and address in a cyber cafe’s resister.

2.

Please don’t misuse e-mail’s .It’s a punishable offence.

3.

Below 18 year’s old students will not allowed except education matter.
Cyber cafe

Contenu connexe

Tendances

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Decentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionDecentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionPriyab Satoshi
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Decentralized exchanges
Decentralized exchangesDecentralized exchanges
Decentralized exchangesCryptoMonday
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internetLeomar Bondoc
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamPMILebanonChapter
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Cryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesCryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesMBA Student
 
Brokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshotsBrokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshotsHarsha Varghese
 
cryptocurrency
cryptocurrencycryptocurrency
cryptocurrencyShanRomio
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONMrQaz996
 

Tendances (20)

Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Cryptocurrency
Cryptocurrency Cryptocurrency
Cryptocurrency
 
Blockchain
BlockchainBlockchain
Blockchain
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Decentralised Exchanges - An Introduction
Decentralised Exchanges - An IntroductionDecentralised Exchanges - An Introduction
Decentralised Exchanges - An Introduction
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Decentralized exchanges
Decentralized exchangesDecentralized exchanges
Decentralized exchanges
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
BLOCK CHAIN
BLOCK CHAINBLOCK CHAIN
BLOCK CHAIN
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Blackberry Technology ppt
Blackberry Technology pptBlackberry Technology ppt
Blackberry Technology ppt
 
Cryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantagesCryptocurrency: It's Timeline, advantages and disadvantages
Cryptocurrency: It's Timeline, advantages and disadvantages
 
Brokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshotsBrokerage Model- different types of auctions- examples with screenshots
Brokerage Model- different types of auctions- examples with screenshots
 
cryptocurrency
cryptocurrencycryptocurrency
cryptocurrency
 
Touch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATIONTouch Screen Technology PRESENTATION
Touch Screen Technology PRESENTATION
 

En vedette

Plan your own cybercafé
Plan your own cybercaféPlan your own cybercafé
Plan your own cybercaféJoão Nourdin
 
Cyber cafe
Cyber cafeCyber cafe
Cyber cafeazabear
 
Travesías entre refugios
Travesías entre refugiosTravesías entre refugios
Travesías entre refugiosguiandosentidos
 
Un largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelUn largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelDaniel Dagna
 
Minimum Vital - Alberto Masferrer
Minimum Vital - Alberto MasferrerMinimum Vital - Alberto Masferrer
Minimum Vital - Alberto MasferrerJeoEstudioso
 
Internet in rural india
Internet in rural indiaInternet in rural india
Internet in rural indiaOindrila Roy
 
Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57Jhon Arriaga Cordova
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Paulo Bischof
 
Del mito al logo
Del mito al logoDel mito al logo
Del mito al logonaxo luz
 
Lesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentLesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentRafael Alejandro
 
Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013John Stone III
 
WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016EworksWSI Cyprus
 
Comercializadora salem s
Comercializadora salem sComercializadora salem s
Comercializadora salem sjlmalvall
 

En vedette (20)

Plan your own cybercafé
Plan your own cybercaféPlan your own cybercafé
Plan your own cybercafé
 
Carta de recomendacion
Carta de recomendacionCarta de recomendacion
Carta de recomendacion
 
Cyber cafe
Cyber cafeCyber cafe
Cyber cafe
 
Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2Informe final metodología de la Investigación 2
Informe final metodología de la Investigación 2
 
Travesías entre refugios
Travesías entre refugiosTravesías entre refugios
Travesías entre refugios
 
2015-Polyform Catalog
2015-Polyform Catalog2015-Polyform Catalog
2015-Polyform Catalog
 
Un largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papelUn largo bertedero con barquitos de papel
Un largo bertedero con barquitos de papel
 
Minimum Vital - Alberto Masferrer
Minimum Vital - Alberto MasferrerMinimum Vital - Alberto Masferrer
Minimum Vital - Alberto Masferrer
 
Internet in rural india
Internet in rural indiaInternet in rural india
Internet in rural india
 
Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57Pediatric SPR Edition – Issue 57
Pediatric SPR Edition – Issue 57
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)
 
Diaposotivas proyecto futuro I Oscar David G.M
Diaposotivas proyecto futuro I Oscar David G.MDiaposotivas proyecto futuro I Oscar David G.M
Diaposotivas proyecto futuro I Oscar David G.M
 
IPAC Brochure
IPAC BrochureIPAC Brochure
IPAC Brochure
 
Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?Jakou učebnici fyziky pro 21. století?
Jakou učebnici fyziky pro 21. století?
 
Del mito al logo
Del mito al logoDel mito al logo
Del mito al logo
 
Lesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the presentLesson plan 8 octavo basico question words in the present
Lesson plan 8 octavo basico question words in the present
 
Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013Revenue architects blueleaf webinar 2013
Revenue architects blueleaf webinar 2013
 
Manualcamtasia
ManualcamtasiaManualcamtasia
Manualcamtasia
 
WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016WSI Video Marketing Packages 2016
WSI Video Marketing Packages 2016
 
Comercializadora salem s
Comercializadora salem sComercializadora salem s
Comercializadora salem s
 

Similaire à Cyber cafe

PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesGener Luis Morada
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxBryanBangiban1
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Ischool Presentation
Ischool PresentationIschool Presentation
Ischool Presentationguestaab445
 
I School Presentation
I School PresentationI School Presentation
I School Presentationguestaab445
 
Kirabo cyber cafe business plan
Kirabo cyber cafe business planKirabo cyber cafe business plan
Kirabo cyber cafe business planKisakye Stephen
 
Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Shamsee Mustafa
 
Information technology act
Information technology actInformation technology act
Information technology actDeepthiPrabhu9
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 

Similaire à Cyber cafe (20)

Ordinances And Permits
Ordinances And PermitsOrdinances And Permits
Ordinances And Permits
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Introduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business PhilippinesIntroduction To The Internet Cafe Business Philippines
Introduction To The Internet Cafe Business Philippines
 
Business Module
Business ModuleBusiness Module
Business Module
 
E-learning
E-learning E-learning
E-learning
 
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptxTLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
TLE 6_LESSON 2_SAFE AND RESPONSIBLE USE OF ICT.pptx
 
Word computer shop
Word computer shopWord computer shop
Word computer shop
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Mojgan aslian
Mojgan aslianMojgan aslian
Mojgan aslian
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ischool Presentation
Ischool PresentationIschool Presentation
Ischool Presentation
 
Sustainable Itc Integration
Sustainable Itc IntegrationSustainable Itc Integration
Sustainable Itc Integration
 
I School Presentation
I School PresentationI School Presentation
I School Presentation
 
Kirabo cyber cafe business plan
Kirabo cyber cafe business planKirabo cyber cafe business plan
Kirabo cyber cafe business plan
 
ICT 2.pptx
ICT 2.pptxICT 2.pptx
ICT 2.pptx
 
Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"Cyber Cafe Business "Media Mapping"
Cyber Cafe Business "Media Mapping"
 
Information technology act
Information technology actInformation technology act
Information technology act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 

Plus de azad12915

Cos conf 11.03.14 final
Cos conf 11.03.14 finalCos conf 11.03.14 final
Cos conf 11.03.14 finalazad12915
 
Dmp organogram (2013) final/azad
Dmp organogram (2013)  final/azadDmp organogram (2013)  final/azad
Dmp organogram (2013) final/azadazad12915
 
Telephone DMP ALL
Telephone  DMP ALLTelephone  DMP ALL
Telephone DMP ALLazad12915
 
Thana computer operator mobile number
Thana computer operator mobile numberThana computer operator mobile number
Thana computer operator mobile numberazad12915
 
All division thana name
All division thana nameAll division thana name
All division thana nameazad12915
 
Web based pims user identification form
Web based pims  user identification formWeb based pims  user identification form
Web based pims user identification formazad12915
 
Asi miraj cl application
Asi miraj cl applicationAsi miraj cl application
Asi miraj cl applicationazad12915
 
Pl application
Pl applicationPl application
Pl applicationazad12915
 
Live protibedon
Live protibedonLive protibedon
Live protibedonazad12915
 

Plus de azad12915 (20)

Cos conf 11.03.14 final
Cos conf 11.03.14 finalCos conf 11.03.14 final
Cos conf 11.03.14 final
 
Dmp organogram (2013) final/azad
Dmp organogram (2013)  final/azadDmp organogram (2013)  final/azad
Dmp organogram (2013) final/azad
 
Telephone DMP ALL
Telephone  DMP ALLTelephone  DMP ALL
Telephone DMP ALL
 
Thana computer operator mobile number
Thana computer operator mobile numberThana computer operator mobile number
Thana computer operator mobile number
 
Mis it
Mis itMis it
Mis it
 
Gd 1
Gd 1Gd 1
Gd 1
 
Gd
GdGd
Gd
 
Call sign
Call signCall sign
Call sign
 
All division thana name
All division thana nameAll division thana name
All division thana name
 
Vpn user
Vpn  userVpn  user
Vpn user
 
Web based pims user identification form
Web based pims  user identification formWeb based pims  user identification form
Web based pims user identification form
 
Asi miraj cl application
Asi miraj cl applicationAsi miraj cl application
Asi miraj cl application
 
Pl application
Pl applicationPl application
Pl application
 
Live
LiveLive
Live
 
Live protibedon
Live protibedonLive protibedon
Live protibedon
 
Leave
LeaveLeave
Leave
 
Leave cl
Leave clLeave cl
Leave cl
 
L.a.p
L.a.pL.a.p
L.a.p
 
Cl
ClCl
Cl
 
Leave pl
Leave plLeave pl
Leave pl
 

Dernier

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 

Dernier (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Cyber cafe

  • 1.
  • 2. Cyber Cafe in Bangladesh
  • 3. Introduction of cyber cafe Cyber Cafe is a place where one can use a computer with internet access, most for a fee, usually per hour or minute. In Bangladeshi Commission decided to issue the following Categories of ISP including cyber Cafe Service License with an open licensing procedure Category A : Category B : Category C : For each Police Station (P/S) of Dhaka Metropolitan Area. For each Police Station (P/S) of Chittagong, Rajshahi, Khulan, Sylhet and Barisal Metropolitan Area. For each Police Station (P/S) of other than Metropolitan Area. Status of issued license of ISP for Cyber Cafe (2008-2009) SI No Category Number of licenses 1 Category A 99 2 Category B 16 3 Category C 4
  • 4. Condition of BTRC 1. Cyber Cafe must have an office with valid address and there must be at least two contact phone numbers and one e-mail address. 2. Cyber Cafe has to keep the record of the browser’s name and address of National ID Card No. in a register. 3. To provide privacy, only for monitor, a partition may be used but the maximum height is to be four feet from the floor level. Any kind of door or restriction is not allowed in the entrance of booth (work station/terminal). 4. On school time uniformed students are not allowed to browse. If they have any recommendation from the school authority of guardian only then they will be allowed to browse for educational needs. 5. A complaint box should be provided in an open place of the cyber cafe.
  • 5. Types of Crime 1. Unauthorized Threaten e-mail for a nation’s security and others. 2. Un-Social activities. 3. Abuses of porn and adult site by under aged. 4. Online gambling. 5. Cyber defamation. 6. Unauthorized access to computer system or networks. 7. Illegally Data transfer. 8. Sale of illegal articles.
  • 6. Instruction Given by CCOAB. 1. To Maintain of Users name and Particular in a resister. 2. Privacy partition must be four feet high from floor. 3. Can’t be kept CD Rom and hard disk in user’s computer. 4. To Ensure a fixed time for school students. 5. Must be ensuring a good environment for users. 6. CCOAB and Others law and Enforcement agencies must be visit the Cafe at any time.
  • 7. For Users Safety 1. Please write your name and address in a cyber cafe’s resister. 2. Please don’t misuse e-mail’s .It’s a punishable offence. 3. Below 18 year’s old students will not allowed except education matter.