SlideShare une entreprise Scribd logo
1  sur  17
z
Constitutionality and
Viability of the Digital
SecurityAct 2018
Nilima Tariq
ID:16323501
z
Purpose of theResearch
 Understand the controversies
 Examine constitutional rights affected by the Act &
justification of the controversies
 Evaluate constitutionality of the Act
 Evaluate viability of the Act based on:
- international guidelines on cybersecurity
- universally acknowledged principles for governance
z
Chapters in the Monograph
 Chapter-1: An overview of
Cybersecurity & the Digital
Security Act 2018
 Chapter-2: Controversies &
consequences of the
Digital Security Act 2018
 Chapter-3: Constitutionality
of the Digital Security Act
 Chapter-4: Analysis of
viability of the Digital
Security Act 2018
z
Cybersecurity & its importance in
Bangladesh
• Government’s priority of digitization – Digital
Bangladesh manifesto – leading to rapid
growth in use of internet and IT in all sectors
• Potential cyberthreats within and beyond
national borders:
- Bangladesh Bank cyber heist
in February 2016
- growing incidents of cyberbullying, fake
news, hacking of important websites,
content piracy, etc.
• Increased complexity of cybercrimes and
cyber breaches including extortion, privacy
violations and so on.
z
Emergence of the Digital Security Act 2018
ICT Act 2006
National Cybersecurity
Strategy 2014
Controversies BGD e-GOV CIRT
(Computer Incident Response Team)
BB heist incident
Necessity of a legal framework to keep pace with global development and need for IT governance
z
Main Contentions of the Controversies
• Broadly defined offences exposed to abuses by authorities with wide
discretionary powers
• Harsh sentencing disproportionate to the crimes/offences
• Intimidates public and press from free speech, obstructing constructive
criticism
• Provision for arrest without warrant, posing threats of undue harassment
• Contravenes multiple civil rights guaranteed by Constitution and
universally recognized principles of democracy
z
Practical Applications of the Act
Positive Outcomes
 Arrests for sale of fake question
papers to medical college admission
seekers using fake IDs of Facebook
 Potential positive outcomes:
remedies for illegal access to
private & unauthorized
information/data, digital
forgery/fraud, malware, service
disruption, illegal transactions,
hacking.
Negative/Questionable
Outcomes
 Barrister Mainul Hossain – defamation
charges under DSA added to list of
previous accusations
 Arrests of journalists, FORUM-ASIA
member, reporter for publishing a report
on the looting of relief materials, and for
mocking political figures
 Potential negative outcomes: severe
aggravation of justice in many ways
including imposition of penalty for
raising voice against corruption.
z
Constitutionality of the Act:Sections
• Sections 21 - propaganda or campaign against liberation war, Cognition of liberation war,
Father of the nation, National Anthem or National Flag
- Definitions for these crimes not specific, hence possibility of distortion to fit agenda
and result in harassment even if there is no final conviction.
- Up to life imprisonment and/or 3 crore taka fine, if convicted
• Section 25 - Publishing, sending of offensive, false or fear inducing data-information, etc. &
• Section 28 - Publication, Broadcast, etc. of such information in any website or in any
electronic format that hampers the religious sentiment or values
- Definitions for these crimes not specific, hence obstructing freedom of expression of
thoughts and conscience and press.
• Section 29 - To publish, broadcast, etc., defamation information
- Incrimination may be justified but may be subject to violation if applied with malicious
intent, and punishment for offense is more than twice the prescribed term in Penal Code.
z
Constitutionality of the Act:Sections
• Section 31 - Deterioration of Act-order, etc. and Punishment
- Extremely generalized definition of offence:
“intentionally publish or broadcast any kind of file in any website or digital format
which will create hostility, hatred or adversity among people or destroy any communal
harmony or create unrest or disorder or deteriorates or threatens to deteriorate the
law and order”
- Sentencing of up to 5/7 years, intimidating the public and press from openly holding an
opinion
• Section 32 - Breaching Government Secret Offence and Punishment
- creates hostile environment for any journalists attempting to investigate any
crimes, corruption or corporate misappropriation, threatening their life, liberty
and career.
z
Constitutionality of the Act:Sections apart from Chapter
Six
• Sections 43 - Police can search, seize and arrest anyone out of mere assumption of
committing any offence under the Act while taking any arbitrary actions if interrupted
with no accountability whatsoever.
• Section 53 - Unlimited time to continue trial while the detainee is confined in jail.
When taken in conjunction with Section 43, it can cause gross infringement of basic
human rights and unpredictable consequences resulting in loss of confidence in the
justice system. A detainee, arrested out of mere suspicion or accusations of
committing an offence under this Act may be kept in indefinite confinement.
• Section 8 - Government agencies and even law enforcement agencies given power
to compel BTRC to remove data from the face of the internet, grossly hampering
access to information.
z
Constitutionality of the Act:Articles Violated
• 32. Protection of right to life and personal liberty
• 33. Safeguards as to arrest and detention
• 35. Protection in respect of trial and punishment
• 36. Freedom of movement
• 37. Freedom of assembly
• 38. Freedom of association
• 39. Freedom of thought and conscience, and of speech
• 43. Protection of home and correspondence
• 44. Enforcement of fundamental rights
z
Viability of the Act
• International Chamber of Commerce Business Action to Support the
Information Society (ICC BASIS) –
“Cybersecurity standards must be globally accepted, industry-led and
recognised by the broadest community possible”
• Article 9 of The International Covenant on Civil and Political Rights
(ICCPR) –
4. Anyone who is deprived of his liberty by arrest or detention shall be
entitled to take proceedings before a court, in order that that court
may decide without delay on the lawfulness of his detention and order
his release if the detention is not lawful.
5. Anyone who has been the victim of unlawful arrest or detention
shall have an enforceable right to compensation.
z
Viability of the Act
• The Commonwealth Latimer House
principles highlight the importance of the
separation of powers between the
Legislature, the Executive and the Judiciary
to ensure effective governance and
democracy. For cyber governance also, it is
imperative to ensure the separation of
powers to prevent arbitrary exercise of
powers and safeguard freedom for all.
• The Rule of Law pyramid:
z
Conclusion
• Government has shown commendable initiative to sustain the dream of
Digital Bangladesh that inspired its election amidst the chaos of the post
caretaker government era. However, many areas remain subject to
justified criticism in the field of digital transformation and cyber
governance.
• The new statute is just the beginning of a long journey that will only
have greater challenges moving forward with ever-growing& rapid
technological advancement. Thus it is indispensable to make sure the
fundamentals of the legal frameworks create a solid base to address
and boldly face the future issues.
z
Recommendations: Short Term
• Add explanations and exceptions to Sections 21 and 28, and reduce sentencing for
Section 21;
• Repeal or amend Sections 25 and 31;
• Add a subsection to Section 29 or an additional section 29A to impose punishment
for false claims of defamation when corruption or illegal activity is exposed;
• Repeal Section 32 to prevent attacks on whistle blowers, RTI, activists, writers and
the press;
• Rephrase Section 8 to specify and clearly define what kinds of information may be
blocked;
• Add provisions to the Act for compensating people who are wrongly accused with
the offences under the Act maliciously and without reasonable ground;
• Ensure policymakers’ participation in international conferences on cybersecurity to
catch up on latest developments and trends in the area;
z
Recommendations: Short Term
• People are not always aware of the necessity for maintaining certain
restrictions in digital interactions and channels to prevent cyber breaches
and crimes committed by real cyber criminals leveraging our dependence on
the electronics ecosystem. The government can lead initiatives to make the
masses understand the nuances of various provisions of the Act and the
genuine intent behind them by running mass media campaigns so that
ignorance does not lead to incrimination. This will also help all stakeholders
to effectively engage in ensuring digital security instead of feeling unduly
suppressed by the Act’s provisions.
z
Recommendations: Long Term
• Strengthen data protection laws and establish data rights at individual,
professional, social and corporate levels;
• AI is becoming increasingly prominent in the digital horizon, which will
have an enormous impact on cybersecurity. To stay ahead of future
issues that may arise, Bangladesh needs to form an expert panel
specialized in AI and formulate legal provisions for enabling its use and
governing security issues relating to it.
• Other emerging matters of crucial importance in the digital space such as
cryptocurrencies and IoT must also be taken under legal frameworks for
digital security in order to be proactive, rather than reactive to the rapidly
changing world of digital technologies.

Contenu connexe

Tendances

Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladeshOrko Abir
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Sheya Singhal vs union of india case.ppt
Sheya Singhal vs union of india case.pptSheya Singhal vs union of india case.ppt
Sheya Singhal vs union of india case.pptMIJANURRAHAMAN46
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Offences against women in india
Offences against women in indiaOffences against women in india
Offences against women in indiaNilendra Kumar
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 

Tendances (20)

Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Freedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitutionFreedom of expression and Bangladesh constitution
Freedom of expression and Bangladesh constitution
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
cyber crime
cyber crimecyber crime
cyber crime
 
Sheya Singhal vs union of india case.ppt
Sheya Singhal vs union of india case.pptSheya Singhal vs union of india case.ppt
Sheya Singhal vs union of india case.ppt
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Offences against women in india
Offences against women in indiaOffences against women in india
Offences against women in india
 
Equal justice to women role of courts-
Equal justice to women  role of courts-Equal justice to women  role of courts-
Equal justice to women role of courts-
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 

Similaire à Research on Digital Security Act 2018

Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rightsarchiejones4
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in KenyaCollinsKimathi
 
Right to Information Act - Features
Right to Information Act - FeaturesRight to Information Act - Features
Right to Information Act - Featuresramrag2001
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Right to Information Legislation in India
Right to Information Legislation in IndiaRight to Information Legislation in India
Right to Information Legislation in Indiaicgfmconference
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Social Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfSocial Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfFree Law - by De Jure
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Senate bill 1733 salient points
Senate bill 1733 salient pointsSenate bill 1733 salient points
Senate bill 1733 salient pointsErnesto Neri
 
RTI (Right to Information).pptx
RTI (Right to Information).pptxRTI (Right to Information).pptx
RTI (Right to Information).pptxMishraAnup1
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 

Similaire à Research on Digital Security Act 2018 (20)

Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
Right to Information Act - Features
Right to Information Act - FeaturesRight to Information Act - Features
Right to Information Act - Features
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Rti act
Rti actRti act
Rti act
 
Right to Information Legislation in India
Right to Information Legislation in IndiaRight to Information Legislation in India
Right to Information Legislation in India
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Social Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfSocial Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdf
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Senate bill 1733 salient points
Senate bill 1733 salient pointsSenate bill 1733 salient points
Senate bill 1733 salient points
 
National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks National security and Freedom of expresion after Wikileaks
National security and Freedom of expresion after Wikileaks
 
RTI (Right to Information).pptx
RTI (Right to Information).pptxRTI (Right to Information).pptx
RTI (Right to Information).pptx
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 

Dernier

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringSteering Law
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainBridgeWest.eu
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Dr. Oliver Massmann
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理bd2c5966a56d
 

Dernier (20)

8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
Police Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. SteeringPolice Misconduct Lawyers - Law Office of Jerry L. Steering
Police Misconduct Lawyers - Law Office of Jerry L. Steering
 
The Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in SpainThe Main Steps on Starting a Business in Spain
The Main Steps on Starting a Business in Spain
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
Corporate Sustainability Due Diligence Directive (CSDDD or the EU Supply Chai...
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 

Research on Digital Security Act 2018

  • 1. z Constitutionality and Viability of the Digital SecurityAct 2018 Nilima Tariq ID:16323501
  • 2. z Purpose of theResearch  Understand the controversies  Examine constitutional rights affected by the Act & justification of the controversies  Evaluate constitutionality of the Act  Evaluate viability of the Act based on: - international guidelines on cybersecurity - universally acknowledged principles for governance
  • 3. z Chapters in the Monograph  Chapter-1: An overview of Cybersecurity & the Digital Security Act 2018  Chapter-2: Controversies & consequences of the Digital Security Act 2018  Chapter-3: Constitutionality of the Digital Security Act  Chapter-4: Analysis of viability of the Digital Security Act 2018
  • 4. z Cybersecurity & its importance in Bangladesh • Government’s priority of digitization – Digital Bangladesh manifesto – leading to rapid growth in use of internet and IT in all sectors • Potential cyberthreats within and beyond national borders: - Bangladesh Bank cyber heist in February 2016 - growing incidents of cyberbullying, fake news, hacking of important websites, content piracy, etc. • Increased complexity of cybercrimes and cyber breaches including extortion, privacy violations and so on.
  • 5. z Emergence of the Digital Security Act 2018 ICT Act 2006 National Cybersecurity Strategy 2014 Controversies BGD e-GOV CIRT (Computer Incident Response Team) BB heist incident Necessity of a legal framework to keep pace with global development and need for IT governance
  • 6. z Main Contentions of the Controversies • Broadly defined offences exposed to abuses by authorities with wide discretionary powers • Harsh sentencing disproportionate to the crimes/offences • Intimidates public and press from free speech, obstructing constructive criticism • Provision for arrest without warrant, posing threats of undue harassment • Contravenes multiple civil rights guaranteed by Constitution and universally recognized principles of democracy
  • 7. z Practical Applications of the Act Positive Outcomes  Arrests for sale of fake question papers to medical college admission seekers using fake IDs of Facebook  Potential positive outcomes: remedies for illegal access to private & unauthorized information/data, digital forgery/fraud, malware, service disruption, illegal transactions, hacking. Negative/Questionable Outcomes  Barrister Mainul Hossain – defamation charges under DSA added to list of previous accusations  Arrests of journalists, FORUM-ASIA member, reporter for publishing a report on the looting of relief materials, and for mocking political figures  Potential negative outcomes: severe aggravation of justice in many ways including imposition of penalty for raising voice against corruption.
  • 8. z Constitutionality of the Act:Sections • Sections 21 - propaganda or campaign against liberation war, Cognition of liberation war, Father of the nation, National Anthem or National Flag - Definitions for these crimes not specific, hence possibility of distortion to fit agenda and result in harassment even if there is no final conviction. - Up to life imprisonment and/or 3 crore taka fine, if convicted • Section 25 - Publishing, sending of offensive, false or fear inducing data-information, etc. & • Section 28 - Publication, Broadcast, etc. of such information in any website or in any electronic format that hampers the religious sentiment or values - Definitions for these crimes not specific, hence obstructing freedom of expression of thoughts and conscience and press. • Section 29 - To publish, broadcast, etc., defamation information - Incrimination may be justified but may be subject to violation if applied with malicious intent, and punishment for offense is more than twice the prescribed term in Penal Code.
  • 9. z Constitutionality of the Act:Sections • Section 31 - Deterioration of Act-order, etc. and Punishment - Extremely generalized definition of offence: “intentionally publish or broadcast any kind of file in any website or digital format which will create hostility, hatred or adversity among people or destroy any communal harmony or create unrest or disorder or deteriorates or threatens to deteriorate the law and order” - Sentencing of up to 5/7 years, intimidating the public and press from openly holding an opinion • Section 32 - Breaching Government Secret Offence and Punishment - creates hostile environment for any journalists attempting to investigate any crimes, corruption or corporate misappropriation, threatening their life, liberty and career.
  • 10. z Constitutionality of the Act:Sections apart from Chapter Six • Sections 43 - Police can search, seize and arrest anyone out of mere assumption of committing any offence under the Act while taking any arbitrary actions if interrupted with no accountability whatsoever. • Section 53 - Unlimited time to continue trial while the detainee is confined in jail. When taken in conjunction with Section 43, it can cause gross infringement of basic human rights and unpredictable consequences resulting in loss of confidence in the justice system. A detainee, arrested out of mere suspicion or accusations of committing an offence under this Act may be kept in indefinite confinement. • Section 8 - Government agencies and even law enforcement agencies given power to compel BTRC to remove data from the face of the internet, grossly hampering access to information.
  • 11. z Constitutionality of the Act:Articles Violated • 32. Protection of right to life and personal liberty • 33. Safeguards as to arrest and detention • 35. Protection in respect of trial and punishment • 36. Freedom of movement • 37. Freedom of assembly • 38. Freedom of association • 39. Freedom of thought and conscience, and of speech • 43. Protection of home and correspondence • 44. Enforcement of fundamental rights
  • 12. z Viability of the Act • International Chamber of Commerce Business Action to Support the Information Society (ICC BASIS) – “Cybersecurity standards must be globally accepted, industry-led and recognised by the broadest community possible” • Article 9 of The International Covenant on Civil and Political Rights (ICCPR) – 4. Anyone who is deprived of his liberty by arrest or detention shall be entitled to take proceedings before a court, in order that that court may decide without delay on the lawfulness of his detention and order his release if the detention is not lawful. 5. Anyone who has been the victim of unlawful arrest or detention shall have an enforceable right to compensation.
  • 13. z Viability of the Act • The Commonwealth Latimer House principles highlight the importance of the separation of powers between the Legislature, the Executive and the Judiciary to ensure effective governance and democracy. For cyber governance also, it is imperative to ensure the separation of powers to prevent arbitrary exercise of powers and safeguard freedom for all. • The Rule of Law pyramid:
  • 14. z Conclusion • Government has shown commendable initiative to sustain the dream of Digital Bangladesh that inspired its election amidst the chaos of the post caretaker government era. However, many areas remain subject to justified criticism in the field of digital transformation and cyber governance. • The new statute is just the beginning of a long journey that will only have greater challenges moving forward with ever-growing& rapid technological advancement. Thus it is indispensable to make sure the fundamentals of the legal frameworks create a solid base to address and boldly face the future issues.
  • 15. z Recommendations: Short Term • Add explanations and exceptions to Sections 21 and 28, and reduce sentencing for Section 21; • Repeal or amend Sections 25 and 31; • Add a subsection to Section 29 or an additional section 29A to impose punishment for false claims of defamation when corruption or illegal activity is exposed; • Repeal Section 32 to prevent attacks on whistle blowers, RTI, activists, writers and the press; • Rephrase Section 8 to specify and clearly define what kinds of information may be blocked; • Add provisions to the Act for compensating people who are wrongly accused with the offences under the Act maliciously and without reasonable ground; • Ensure policymakers’ participation in international conferences on cybersecurity to catch up on latest developments and trends in the area;
  • 16. z Recommendations: Short Term • People are not always aware of the necessity for maintaining certain restrictions in digital interactions and channels to prevent cyber breaches and crimes committed by real cyber criminals leveraging our dependence on the electronics ecosystem. The government can lead initiatives to make the masses understand the nuances of various provisions of the Act and the genuine intent behind them by running mass media campaigns so that ignorance does not lead to incrimination. This will also help all stakeholders to effectively engage in ensuring digital security instead of feeling unduly suppressed by the Act’s provisions.
  • 17. z Recommendations: Long Term • Strengthen data protection laws and establish data rights at individual, professional, social and corporate levels; • AI is becoming increasingly prominent in the digital horizon, which will have an enormous impact on cybersecurity. To stay ahead of future issues that may arise, Bangladesh needs to form an expert panel specialized in AI and formulate legal provisions for enabling its use and governing security issues relating to it. • Other emerging matters of crucial importance in the digital space such as cryptocurrencies and IoT must also be taken under legal frameworks for digital security in order to be proactive, rather than reactive to the rapidly changing world of digital technologies.