SlideShare une entreprise Scribd logo
1  sur  28
Digital tools can be used as a blessing for both general masses and the media in
Bangladesh alike. However it also came up with different scopes of misapplication
with high undue exposure and abuse. It is a weapon or tool that can be used to
prosecute the guilty if used wisely but at the same time the platform in the wrong
hands with power can abuse it. To minimize the offences, the government approved
Digital Security Act (DSA) 2018.
The Digital Security Act-2018 provides punishment for:
Illegal access to any critical information infrastructure, under section 17
Illegal access to computer, digital device, computer system, under section 18
“Propaganda or campaign against the Liberation War, the Father of the Nation"
according to section 21
Identity fraud or personation, under section 24
Cyber-terrorism and defamation, under section 27
Posting offensive content against religious values to create social unrest and
destroying “communal harmony”, under section 28 and 31
Briefly explaining DSA
Analysis of the Intended Role of DSA-2018
Analysis of The Troublesome Parts
Data Collection:
Necessary data for the research is collected from secondary data sources like
several research reports and other sources like texts, research monographs, cases
and various published and unpublished materials & different news portals.
Data Analysis:
Systematically arranging and applying logical techniques to describe and illustrate,
condense and recap, and evaluate data with accurate and appropriate analysis.
Presenting the analysis of collected data is undertaken MS Word, case by case of
relevant sections that are supposed to be contradicted with freedom of speech and
so on.
The Intended Role of DSA-2018
Section 8:
Power to remove or block information and data:
If the Director General is satisfied that something that is published or
disseminated in the digital platform falling within his domain may poses threat to
digital security, he may request Bangladesh Telecommunication Regulatory
Commission (BTRC) to remove such information or data or, in specific cases block
the platform.
If it is evident to the law enforcing agencies that something published and
disseminated through any digital device or digital medium can create disunity in
the country, disrupt economic activities and security, defence, hurt religious
values, create communal hatred or bad feelings, create turbulence in law and
order situation then the law enforcing agencies can request the BTRC to remove
such content or block it.
Section 25:
The offences regarding defaming, humiliating and embarrassing a person,
damaging the image and reputation of state and so one are addressed as crime.
This section may be very fruitful against crime mostly against women. We have
seen that women are the main victim of such cases where some men intentionally
spread out private contents through social medium. Many sociologists and experts
opine their positive opinion that this section will ensure those victim women to get
fair justice against the culprit.
Section 28:
Publication, broadcast, etc. of information in website or in any electronic format
that hurts the religious values or sentiment. If any person or group willingly or
knowingly publishes or broadcasts or causes to publish or broadcast anything in
website or any electronic format which hurts religious sentiment or values, with an
intention to hurt or provoke the religious values or sentiments, then such act of the
person shall be an offence.
Analysis of the Troublesome Parts &
Their Negative Impacts
Section 8:
Section 8 of the DSA bestows on the Director-General of the Digital Security Agency
the power to decide if any information published or disseminated through digital
media constitutes a threat to the digital security of the nation. If the Director-
General finds a threat, then he can request that the Bangladesh
Telecommunication Regulatory Commission (BTRC) remove or block such
information. Similarly, Section 8(2) of the DSA authorizes law enforcement agencies
to request the BTRC, through the Director-General of the Digital Security Agency,
to remove or block any information published or disseminated through digital
media on various grounds, such as disruption of the unity in the country, disruption
of its economic activity, its security, defense, or public order, or causing racial hatred
and hurting religious sentiments. Thus, both of these Sections of the DSA permit
the removal of content from digital platforms on vague and nebulous grounds.
Section 21:
Section 21 of the DSA makes it an offense to use digital platforms to spread
propaganda against Bangladesh’s liberation war, the spirit of the liberation war, the
“Father of the Nation” Sheikh Mujibur Rahman—also the father of the current
Prime Minister and the national anthem, or the national flag. It stipulates a
maximum punishment of ten years in prison, a hefty fine of Tk. one crore or both for
the commission of such an offense.
Section 25:
Section 25 of the DSA prescribes a punishment of three years’ imprisonment or Tk.
three lakhs or both for the use of digital platforms for sending, publishing, or
broadcasting any offensive, false or intimidating information, which annoys,
insults, humiliates or denigrates a person or which tarnishes “the image of the
nation. The use of vague words, such as “annoy,” “insult,” and “humiliate” as
grounds for criminalizing the dissemination of information online makes the
provisions of Section 25 susceptible to abuse
Sections 28 and 31:
Sections 28 and 31 of the DSA read together prohibit the publication or circulation
via digital platforms any information which hurts religious values or creates
“hostility, hatred or animosity among different classes or communities of people,”
destroys “communal harmony,” creates “instability or chaos,” or deteriorates “law
and order.” While the state is well within its right to make laws that promote
religious and communal harmony by minimizing the scope for conflict, such an
objective must not unduly interfere with an individual’s right to freedom of speech
and expression
Section 32:
Arguably, one of the most dangerous provisions of the DSA is Section 32, which
prescribes a maximum jail term of fourteen years or a fine not exceeding Tk.
twenty-five lakhs or both for the commission or assisting the commission of an
offense under the Official Secrets Act. The Official Secrets Act —which is based on
the colonial-era legislation of the same name—is aimed at protecting state secrets,
using a computer, digital device, computer network or digital network.
Section 43:
Section 43 empowers law enforcement agencies to search, seize, and arrest without
seeking warrants from courts. The conferral of such wide power on law enforcement
agencies gives rise to the fear that it would be used to indiscriminately detain
critics exercising their constitutionally guaranteed freedom of speech and
expression. This fear is bolstered in light of the past experiences.
Section 53:
Section 53 describe about the segments of the law which are cognizable or not and bailable
or not. According to it, 14 offences are non-bailable and cognizable offences out of 20 or so
more provisions.
The lowest punishment under the DSA is one year in prison, but on average the punishment
ranges from four to seven years. Strikingly, the Road Transport Act, passed on the same day
as the DSA and following mass student protests demanding stricter laws for regulating the
chaotic roads of the country, provides for a maximum punishment of five years in prison for
killing people in road accidents, whereas a journalist under the DSA can be sentenced to
fourteen years in prison for investigative journalism. The prescription of a fourteen year jail
term under the DSA is harsher than the imprisonment term of ten years that had been fixed
by the former Section 57 of the ICTA. Furthermore, the offenses specified in fourteen
different Sections of the DSA have been made non-bailable.
 After scrutinizing some events & reports it can be said that journalists, right workers, civil
society members are being restrained from doing what is right because of these draconian laws.
Various UN human rights bodies have long raised concerns about the ill-defined, overly broad
provisions of the DSA that have been used to punish criticism of the government.
 To conclude it can be said that freedom of speech is an essential human right and should not be
compromised by security legislation. Freedom of expression is essential for institutionalizing a
culture of democracy. However free expression must be reasonable, and are to be subjected to
judicial review. Also comparative constitutional law standards of freedom of expression can be of
aid in guiding a proper evaluation of the legislation.
The recommendations of the study are:
The government should be more flexible to discover the concern of the journalists
and acquire positive changes the law as well as ensure the free environment to
practice free journalism.
On the other hand, the journalists should put more concentration on their unity,
professional honesty and good will to work for the voiceless, so that they will get
more public acceptance which will ultimately safeguard their freedom.
The whole Digital Security Act 2018 should be looked into and carried into full
compliance with international human rights standards.
The following areas of the Digital Security Act should be canceled specifically:
Section 8, Chapter 3 which grants sweeping powers to DSA, an executive body, to
block information online and restrict freedom of expression beyond what is
permissible under international freedom of expression standards.
Sections 21, 25, 28, 29, 31 of Chapter 6 which include speech offences,
characterized in vague and overbroad terms.
Section 38 which deals with service provider’s liability. At the very least, it ought
to be changed to require 'real' information of illegality and the taking of
‘reasonable’ steps before liability can be imposed.
Section 56, 59 and 60 of Chapter 9, which respectively set out various powers to
delegate, to ‘remove difficulties’ and to make rules. Or, at the very least, these
Sections should be drastically limited in their scope.
Several definitions in Chapter 2 must be clarified, including data storage, critical
information infrastructure, digital security, illegal entrance, cognition of
Liberation War and service provide.
Computer- related offences in sections 17-20, 33 and 34 should be reviewed and
brought more closely in line with relevant international standards in this area,
such as the Cybercrime Convention 2001.
If sections 21,25,28,29 and 31 are revoked, section 35 should only be revised to
include a requirement of intent.
Digital Security Act (DSA) 2018 in Bangladesh

Contenu connexe

Tendances

Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshHome
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladeshOrko Abir
 
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshCyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshAbir Hossain Talukder
 
Rule of law of Administrative Law
Rule of law of Administrative LawRule of law of Administrative Law
Rule of law of Administrative LawKeshav Choudhary
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenitysneha164
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeAdeel Rasheed
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 
Law of defamation
Law of defamationLaw of defamation
Law of defamationJimi Kayode
 
Offences against women in india
Offences against women in indiaOffences against women in india
Offences against women in indiaNilendra Kumar
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 

Tendances (20)

Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
BTRC
BTRCBTRC
BTRC
 
Cyber Security & Crime In Bangladesh
Cyber Security & Crime In BangladeshCyber Security & Crime In Bangladesh
Cyber Security & Crime In Bangladesh
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in BangladeshCyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
 
Rule of law of Administrative Law
Rule of law of Administrative LawRule of law of Administrative Law
Rule of law of Administrative Law
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Law of defamation
Law of defamationLaw of defamation
Law of defamation
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Offences against women in india
Offences against women in indiaOffences against women in india
Offences against women in india
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 

Similaire à Digital Security Act (DSA) 2018 in Bangladesh

Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’Md.Rezaul Hoque Razu
 
Social Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfSocial Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfFree Law - by De Jure
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxManuGupta344215
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...linda gichohi
 
Report on new it bill cirminalization of foe in social media by shreedeep r...
Report on new it bill cirminalization of foe in social media   by shreedeep r...Report on new it bill cirminalization of foe in social media   by shreedeep r...
Report on new it bill cirminalization of foe in social media by shreedeep r...Shreedeep Rayamajhi
 
Here is the full text of the judgement on 66 a of IT act
Here is the full text of the judgement on 66 a of IT actHere is the full text of the judgement on 66 a of IT act
Here is the full text of the judgement on 66 a of IT actBhimashankar Sanga
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international lawblogzilla
 
Internet freedom and fo e discussion with various stakholders
Internet freedom and fo e  discussion with various stakholdersInternet freedom and fo e  discussion with various stakholders
Internet freedom and fo e discussion with various stakholdersShreedeep Rayamajhi
 
Freedom of expression (fo e) and the internet in nepal
Freedom of expression (fo e) and the internet in nepalFreedom of expression (fo e) and the internet in nepal
Freedom of expression (fo e) and the internet in nepalShreedeep Rayamajhi
 
An Analysis of Tunisia’s Draft Counterterrorism Law
An Analysis of Tunisia’s Draft Counterterrorism Law An Analysis of Tunisia’s Draft Counterterrorism Law
An Analysis of Tunisia’s Draft Counterterrorism Law Jamaity
 
Memo.2015.04.08.tunisia counterterrorism law.HRW.eng
Memo.2015.04.08.tunisia counterterrorism law.HRW.eng Memo.2015.04.08.tunisia counterterrorism law.HRW.eng
Memo.2015.04.08.tunisia counterterrorism law.HRW.eng Jamaity
 
Understanding Prevention Of Terrorism Act 2015: Prospects And Future
Understanding Prevention Of Terrorism Act 2015: Prospects And FutureUnderstanding Prevention Of Terrorism Act 2015: Prospects And Future
Understanding Prevention Of Terrorism Act 2015: Prospects And Futuresurrenderyourthrone
 
ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013FM Associates
 
legal analysis for Iraq: Draft Informatics Crimes Law By article 19
legal analysis for Iraq: Draft Informatics Crimes Law By article 19 legal analysis for Iraq: Draft Informatics Crimes Law By article 19
legal analysis for Iraq: Draft Informatics Crimes Law By article 19 Hayder Hamzoz
 

Similaire à Digital Security Act (DSA) 2018 in Bangladesh (20)

Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’
 
Social Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfSocial Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdf
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
DigitALL: Bridging the Gender-Digital Gap through Tackling Online-Gender Base...
 
Report on new it bill cirminalization of foe in social media by shreedeep r...
Report on new it bill cirminalization of foe in social media   by shreedeep r...Report on new it bill cirminalization of foe in social media   by shreedeep r...
Report on new it bill cirminalization of foe in social media by shreedeep r...
 
Here is the full text of the judgement on 66 a of IT act
Here is the full text of the judgement on 66 a of IT actHere is the full text of the judgement on 66 a of IT act
Here is the full text of the judgement on 66 a of IT act
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
Mde1569832017 english
Mde1569832017 englishMde1569832017 english
Mde1569832017 english
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Internet freedom and fo e discussion with various stakholders
Internet freedom and fo e  discussion with various stakholdersInternet freedom and fo e  discussion with various stakholders
Internet freedom and fo e discussion with various stakholders
 
Freedom of expression (fo e) and the internet in nepal
Freedom of expression (fo e) and the internet in nepalFreedom of expression (fo e) and the internet in nepal
Freedom of expression (fo e) and the internet in nepal
 
An Analysis of Tunisia’s Draft Counterterrorism Law
An Analysis of Tunisia’s Draft Counterterrorism Law An Analysis of Tunisia’s Draft Counterterrorism Law
An Analysis of Tunisia’s Draft Counterterrorism Law
 
Memo.2015.04.08.tunisia counterterrorism law.HRW.eng
Memo.2015.04.08.tunisia counterterrorism law.HRW.eng Memo.2015.04.08.tunisia counterterrorism law.HRW.eng
Memo.2015.04.08.tunisia counterterrorism law.HRW.eng
 
Understanding Prevention Of Terrorism Act 2015: Prospects And Future
Understanding Prevention Of Terrorism Act 2015: Prospects And FutureUnderstanding Prevention Of Terrorism Act 2015: Prospects And Future
Understanding Prevention Of Terrorism Act 2015: Prospects And Future
 
ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013ICT (amendment) ordinance 2013
ICT (amendment) ordinance 2013
 
legal analysis for Iraq: Draft Informatics Crimes Law By article 19
legal analysis for Iraq: Draft Informatics Crimes Law By article 19 legal analysis for Iraq: Draft Informatics Crimes Law By article 19
legal analysis for Iraq: Draft Informatics Crimes Law By article 19
 

Plus de Md. Mehedi Al Hasan Rakib (14)

Bank Funds & Liquidity Management
Bank Funds & Liquidity ManagementBank Funds & Liquidity Management
Bank Funds & Liquidity Management
 
Business plan: Jewelry
Business plan: JewelryBusiness plan: Jewelry
Business plan: Jewelry
 
Generational Differences in the Work Values of Corporate Employees in Bangladesh
Generational Differences in the Work Values of Corporate Employees in BangladeshGenerational Differences in the Work Values of Corporate Employees in Bangladesh
Generational Differences in the Work Values of Corporate Employees in Bangladesh
 
Constraint Management: Bottleneck
Constraint Management: BottleneckConstraint Management: Bottleneck
Constraint Management: Bottleneck
 
Future Bicycle Bangladesh
Future Bicycle BangladeshFuture Bicycle Bangladesh
Future Bicycle Bangladesh
 
Marketing Introduction
Marketing IntroductionMarketing Introduction
Marketing Introduction
 
HRIS in Education Sector
HRIS in Education SectorHRIS in Education Sector
HRIS in Education Sector
 
ICT in Banking Sector, Bangladesh
ICT in Banking Sector, BangladeshICT in Banking Sector, Bangladesh
ICT in Banking Sector, Bangladesh
 
Internal & External Environment Analysis of Incepta
Internal & External Environment Analysis of InceptaInternal & External Environment Analysis of Incepta
Internal & External Environment Analysis of Incepta
 
Call Centre Training
Call Centre TrainingCall Centre Training
Call Centre Training
 
Negotiation
NegotiationNegotiation
Negotiation
 
Job Evalution
Job EvalutionJob Evalution
Job Evalution
 
Advertisement: a Bridge or Barrier Between Consumer & Business
Advertisement: a Bridge or Barrier Between Consumer & BusinessAdvertisement: a Bridge or Barrier Between Consumer & Business
Advertisement: a Bridge or Barrier Between Consumer & Business
 
Start Up Business Plan
Start Up Business PlanStart Up Business Plan
Start Up Business Plan
 

Dernier

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Dernier (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Digital Security Act (DSA) 2018 in Bangladesh

  • 1.
  • 2.
  • 3. Digital tools can be used as a blessing for both general masses and the media in Bangladesh alike. However it also came up with different scopes of misapplication with high undue exposure and abuse. It is a weapon or tool that can be used to prosecute the guilty if used wisely but at the same time the platform in the wrong hands with power can abuse it. To minimize the offences, the government approved Digital Security Act (DSA) 2018.
  • 4. The Digital Security Act-2018 provides punishment for: Illegal access to any critical information infrastructure, under section 17 Illegal access to computer, digital device, computer system, under section 18 “Propaganda or campaign against the Liberation War, the Father of the Nation" according to section 21 Identity fraud or personation, under section 24 Cyber-terrorism and defamation, under section 27 Posting offensive content against religious values to create social unrest and destroying “communal harmony”, under section 28 and 31
  • 5. Briefly explaining DSA Analysis of the Intended Role of DSA-2018 Analysis of The Troublesome Parts
  • 6. Data Collection: Necessary data for the research is collected from secondary data sources like several research reports and other sources like texts, research monographs, cases and various published and unpublished materials & different news portals. Data Analysis: Systematically arranging and applying logical techniques to describe and illustrate, condense and recap, and evaluate data with accurate and appropriate analysis. Presenting the analysis of collected data is undertaken MS Word, case by case of relevant sections that are supposed to be contradicted with freedom of speech and so on.
  • 7.
  • 8. The Intended Role of DSA-2018
  • 9. Section 8: Power to remove or block information and data: If the Director General is satisfied that something that is published or disseminated in the digital platform falling within his domain may poses threat to digital security, he may request Bangladesh Telecommunication Regulatory Commission (BTRC) to remove such information or data or, in specific cases block the platform. If it is evident to the law enforcing agencies that something published and disseminated through any digital device or digital medium can create disunity in the country, disrupt economic activities and security, defence, hurt religious values, create communal hatred or bad feelings, create turbulence in law and order situation then the law enforcing agencies can request the BTRC to remove such content or block it.
  • 10. Section 25: The offences regarding defaming, humiliating and embarrassing a person, damaging the image and reputation of state and so one are addressed as crime. This section may be very fruitful against crime mostly against women. We have seen that women are the main victim of such cases where some men intentionally spread out private contents through social medium. Many sociologists and experts opine their positive opinion that this section will ensure those victim women to get fair justice against the culprit.
  • 11. Section 28: Publication, broadcast, etc. of information in website or in any electronic format that hurts the religious values or sentiment. If any person or group willingly or knowingly publishes or broadcasts or causes to publish or broadcast anything in website or any electronic format which hurts religious sentiment or values, with an intention to hurt or provoke the religious values or sentiments, then such act of the person shall be an offence.
  • 12.
  • 13. Analysis of the Troublesome Parts & Their Negative Impacts
  • 14. Section 8: Section 8 of the DSA bestows on the Director-General of the Digital Security Agency the power to decide if any information published or disseminated through digital media constitutes a threat to the digital security of the nation. If the Director- General finds a threat, then he can request that the Bangladesh Telecommunication Regulatory Commission (BTRC) remove or block such information. Similarly, Section 8(2) of the DSA authorizes law enforcement agencies to request the BTRC, through the Director-General of the Digital Security Agency, to remove or block any information published or disseminated through digital media on various grounds, such as disruption of the unity in the country, disruption of its economic activity, its security, defense, or public order, or causing racial hatred and hurting religious sentiments. Thus, both of these Sections of the DSA permit the removal of content from digital platforms on vague and nebulous grounds.
  • 15. Section 21: Section 21 of the DSA makes it an offense to use digital platforms to spread propaganda against Bangladesh’s liberation war, the spirit of the liberation war, the “Father of the Nation” Sheikh Mujibur Rahman—also the father of the current Prime Minister and the national anthem, or the national flag. It stipulates a maximum punishment of ten years in prison, a hefty fine of Tk. one crore or both for the commission of such an offense.
  • 16. Section 25: Section 25 of the DSA prescribes a punishment of three years’ imprisonment or Tk. three lakhs or both for the use of digital platforms for sending, publishing, or broadcasting any offensive, false or intimidating information, which annoys, insults, humiliates or denigrates a person or which tarnishes “the image of the nation. The use of vague words, such as “annoy,” “insult,” and “humiliate” as grounds for criminalizing the dissemination of information online makes the provisions of Section 25 susceptible to abuse
  • 17.
  • 18. Sections 28 and 31: Sections 28 and 31 of the DSA read together prohibit the publication or circulation via digital platforms any information which hurts religious values or creates “hostility, hatred or animosity among different classes or communities of people,” destroys “communal harmony,” creates “instability or chaos,” or deteriorates “law and order.” While the state is well within its right to make laws that promote religious and communal harmony by minimizing the scope for conflict, such an objective must not unduly interfere with an individual’s right to freedom of speech and expression
  • 19. Section 32: Arguably, one of the most dangerous provisions of the DSA is Section 32, which prescribes a maximum jail term of fourteen years or a fine not exceeding Tk. twenty-five lakhs or both for the commission or assisting the commission of an offense under the Official Secrets Act. The Official Secrets Act —which is based on the colonial-era legislation of the same name—is aimed at protecting state secrets, using a computer, digital device, computer network or digital network.
  • 20. Section 43: Section 43 empowers law enforcement agencies to search, seize, and arrest without seeking warrants from courts. The conferral of such wide power on law enforcement agencies gives rise to the fear that it would be used to indiscriminately detain critics exercising their constitutionally guaranteed freedom of speech and expression. This fear is bolstered in light of the past experiences.
  • 21.
  • 22. Section 53: Section 53 describe about the segments of the law which are cognizable or not and bailable or not. According to it, 14 offences are non-bailable and cognizable offences out of 20 or so more provisions. The lowest punishment under the DSA is one year in prison, but on average the punishment ranges from four to seven years. Strikingly, the Road Transport Act, passed on the same day as the DSA and following mass student protests demanding stricter laws for regulating the chaotic roads of the country, provides for a maximum punishment of five years in prison for killing people in road accidents, whereas a journalist under the DSA can be sentenced to fourteen years in prison for investigative journalism. The prescription of a fourteen year jail term under the DSA is harsher than the imprisonment term of ten years that had been fixed by the former Section 57 of the ICTA. Furthermore, the offenses specified in fourteen different Sections of the DSA have been made non-bailable.
  • 23.  After scrutinizing some events & reports it can be said that journalists, right workers, civil society members are being restrained from doing what is right because of these draconian laws. Various UN human rights bodies have long raised concerns about the ill-defined, overly broad provisions of the DSA that have been used to punish criticism of the government.  To conclude it can be said that freedom of speech is an essential human right and should not be compromised by security legislation. Freedom of expression is essential for institutionalizing a culture of democracy. However free expression must be reasonable, and are to be subjected to judicial review. Also comparative constitutional law standards of freedom of expression can be of aid in guiding a proper evaluation of the legislation.
  • 24.
  • 25. The recommendations of the study are: The government should be more flexible to discover the concern of the journalists and acquire positive changes the law as well as ensure the free environment to practice free journalism. On the other hand, the journalists should put more concentration on their unity, professional honesty and good will to work for the voiceless, so that they will get more public acceptance which will ultimately safeguard their freedom. The whole Digital Security Act 2018 should be looked into and carried into full compliance with international human rights standards.
  • 26. The following areas of the Digital Security Act should be canceled specifically: Section 8, Chapter 3 which grants sweeping powers to DSA, an executive body, to block information online and restrict freedom of expression beyond what is permissible under international freedom of expression standards. Sections 21, 25, 28, 29, 31 of Chapter 6 which include speech offences, characterized in vague and overbroad terms. Section 38 which deals with service provider’s liability. At the very least, it ought to be changed to require 'real' information of illegality and the taking of ‘reasonable’ steps before liability can be imposed. Section 56, 59 and 60 of Chapter 9, which respectively set out various powers to delegate, to ‘remove difficulties’ and to make rules. Or, at the very least, these Sections should be drastically limited in their scope.
  • 27. Several definitions in Chapter 2 must be clarified, including data storage, critical information infrastructure, digital security, illegal entrance, cognition of Liberation War and service provide. Computer- related offences in sections 17-20, 33 and 34 should be reviewed and brought more closely in line with relevant international standards in this area, such as the Cybercrime Convention 2001. If sections 21,25,28,29 and 31 are revoked, section 35 should only be revised to include a requirement of intent.