শনিবার, ২৬ অক্টোবর, ২০১৩

ICT Act-2006




ICT Act-2006

[ From chapter-25 of the book "Information Technology in Banking" written by Abul Kashem Md. Shirin and Nusrat Tamanna Prianka and published by Institute of Bankers, Bangladesh (IBB) ]


1.         Introduction

After the invention of computers and improvement in digital technology and communication systems dramatic changes have taken place in our lives. Business transactions are being made with the help of computers. However in our country the people were reluctant to conduct business or conclude transactions in electronic form due to lack of legal framework. Many legal provisions recognize paper based records and documents bearing signature of parties and make them admissible in evidence in various disputes. Transactions in electronic form were often not recognized in courts. Many legal rules assume the existence of paper records and documents, signed records, original records, physical cheques, face to face meetings, etc. As more and more activities are carried out by electronic means, it becomes more and more important that evidence of these activities be available to demonstrate legal rights and obligations that flow from them.

2.         Applicable fields of ICT Act-2006

In view of the above, an act was enacted in the name of ‘Information and Communication Technology Act-2006’ in 2006 which shall apply to-

         a Negotiable Instrument
         the creation, performance or enforcement of a power of attorney
         a Trust
         a Will
         any Contract for the Sale or Conveyance of Immovable property or any interest in such property
         documents of title
         any such class of documents or transactions as may be notified by the Government in the Official Gazette.

3.         Objectives

The main objectives of the Information and Communication Technology Act-2006 are to:

1.      Eliminates barriers to e-commerce,
2.      Promotes legal and business infrastructures to secure e-transactions,
3.      Facilitates electronic filing in government agencies,
4.      Ensures efficient delivery of electronic records from government offices,
5.      Help maintain the latest technology by freeing it from nuisance as punitive provisions publishing obscene or defamatory information in electronic form,
6.      Ensures ten years imprisonment and a fine of up to Taka 10 million (Tk.1.00 Crore) or both, for the cyber offenders
7.      Powers of Police Officers and Other Officers,
8.      Establishment of Cyber Appellate Tribunal.

4.         Selected clauses

Some of the clauses of the Act are presented below in a simplified form:

Clause-5.         Authentication of Electronic Records by Digital Signature
           
(1)   Subject to the provisions of sub-clause (2) any subscriber may authenticate an electronic record by affixing his digital signature.
           
(2)   The authentication of the electronic record shall be effected by the use of an open technique or an established equipment or technique developed for crating electronic signature.

Clause-6.         Legal Recognition of Electronic Records

Where any law provides that information or any other matter shall be in writing or in the typewritten or printed form, then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is

(a)        rendered or made available in an electronic form; and
(b)        accessible so as to be usable for a subsequent reference

Clause-7.         Legal recognition of Electronic Signature

Where any law provides that information or any other matter shall be authenticated by affixing the signature or any document should be signed or bear the signature of any person then, notwithstanding anything contained in such law, such requirement shall be deemed to have been satisfied, if such information or matter is authenticated by means of digital signature affixed in such manner as may be prescribed by the Government.

Clause-8.         Use of Electronic Records and Digital Signatures in Government and its agencies
 
Where any law requires –

(a)        the filing of any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in   a particular manner;

(b)        the issue or grant of any licence, permit, sanction or approval by whatever name called in a particular manner;

(c)        the receipt or payment of money in a particular manner,

then, notwithstanding anything contained in any other law for the time being in force, such requirement shall be deemed to have been satisfied if such filing, issue, grant, receipt or payment, as the case may be, is effected by means of  such electronic form as may be prescribed by the Government.

Clause-13.       Attribution, Acknowledgment and Dispatch of Electronic Records

An electronic record shall be attributed to the originator

(a)        if it was sent by the originator himself;

(b)        by a person who had the authority to act on behalf of the originator in   respect of that electronic record; or

(c)        by an information system programmed by or on behalf of the originator to operate automatically.

Chapter-5:      CONTROLLER & CERTIFYING AUTHORITIES

Clause-18.       Appointment of Controller and other officers

(1)   The Government may, by notification in the Official Gazette, appoint a Controller of Certifying Authorities for the purposes of this Act and may also by the same or subsequent notification appoint such number of Deputy Controllers and Assistant Controllers as it deems fit.

Clause-19.       The Controller may perform all or any of the following functions, namely –

(a) exercising supervision over the activities of the Certifying Authorities;

(b) certifying public keys of the Certifying Authorities

(c) laying down the standards to be maintained by the Certifying Authorities;

(d) specifying the qualifications and experience which employees of the Certifying Authorities should possess;

(e) specifying the conditions subject to which the Certifying Authorities shall conduct their business;

(f) specifying the content of written, printed or visual material and advertisements that may be distributed or used in respect of a Digital Signature Certificate and the Public Key;

(g) specifying the form and content of a Digital Signature Certificate and the key;

(h)  specifying the form and manner in which accounts shall be maintained by the Certifying Authorities;

(i)   specifying the terms and conditions subject to which auditors may be appointed and the remuneration to be paid to them;

(j)   facilitating the establishment of any electronic system by a Certifying  Authority either solely or jointly with other Certifying Authorities and regulation of such systems;

(k) specifying the manner in which the Certifying Authorities shall conduct their dealings with the subscribers;

(l)   resolving any conflict of interests between the Certifying Authorities and the subscribers;

(m) laying down the duties of the Certifying Authorities;

(n) maintaining a data-base containing the disclosure record of every Certifying Authority containing such particulars as may be specified by regulations, which shall be accessible to public.

Clause-20.       Recognition of foreign Certifying Authorities

(1)   Subject to such conditions and restrictions as may be specified by regulations, the Controller may with the previous approval of the Central Government, and by notification in the Official Gazette, recognise any foreign Certifying Authority as a Certifying Authority for the purposes of this Act.

(2)   Where any Certifying Authority is recognised under sub-section (1), the Digital Signature Certificate issued by such Certifying Authority shall be valid for the purposes of this Act.

Clause-22.       License to issue digital signature certificates

(1)  Any person may make an application, to the Controller, for a licence to issue Digital Signature Certificates.

(3)   No licence shall be issued unless the applicant fulfills such requirements with respect to qualification, expertise, manpower, financial resources and other infrastructure facilities, which are necessary to issue Digital Signature Certificates as may be prescribed by the Central Government.

(4)   A license granted under this section shall –

(a) be valid for such period as may be prescribed by the Central Government;

(b) not be transferable or heritable;

(c) be subject to such terms and conditions as may be specified by the regulations.

Clause-31.       Certifying Authority to follow certain procedures

Every Certifying Authority shall-

(a) make use of hardware, software, and procedures that are secure from  intrusion and misuse:

(b) provide a reasonable level of reliability in its services which arc  reasonably suited to the performance of intended functions;

(c) adhere to security procedures to ensure that the secrecy and privacy of  the digital signatures are assured; and

(d) observe such other standards as may be specified by regulations.

Clause-36.       Certifying Authority to issue Digital Signature Certificate

(1)  Any person may make an application to the Certifying Authority for the issue of a Digital Signature Certificate in such form as may be prescribed by the Government.

(2) Every such application shall be accompanied by a certification practice statement or where there is no such statement, a statement containing such particulars, as may be specified by regulations.

(3) On receipt of an application under sub-section (1), the Certifying Authority may, after consideration of the certification practice statement or the other statement under sub-section

(4) and after making such enquiries as it may deem fit, grant the Digital Signature Certificate or for reasons to be recorded in writing, reject the application

Provided that no Digital Signature Certificate shall be granted unless the Certifying Authority is satisfied that -

(a) the applicant holds the private key corresponding to the public key to be listed in the Digital Signature Certificate;

(b) the applicant holds a private key, which is capable of creating a digital signature;

(c) the public key to be listed in the certificate can be used to verify a digital signature affixed by the private key held by the applicant.

Chapter-6:      DUTIES OF SUBSCRIBERS

Clause-42.       Acceptance of Digital Signature Certificate.

A subscriber shall be deemed to have accepted a Digital Signature Certificate if he publishes or authorizes the publication of a Digital Signature Certificate - (a) to one or more persons; (b) in a repository, or otherwise demonstrates his approval of the Digital Signature Certificate in any manner.

Chapter-8:      PENALTIES AND ADJUDICATION

Clause-54.       Penalty for damage to computer, computer system, etc

If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network -  

(a) accesses or secures access to such computer, computer system or computer network.

(b) downloads, copies or extracts any data, computer data base or information  from such computer, computer system or computer network including information  or data held or stored in any removable storage medium;

(c)  introduces or causes to be introduced any computer contaminant or computer  virus into any computer, computer system or computer network;

(d) damages or causes to be damaged any computer, computer system or computer  network, data, computer data base or any other programs residing in such  computer, computer system or computer network;

(e) disrupts or causes disruption of any computer, computer system or computer network;

(f) denies or causes the denial of access to any person authorised to access  any computer, computer system or computer network by any means;

(g) provides any assistance to any person to facilitate access to a computer,  computer system or computer network in contravention of the provisions of this  Act, rules or regulations made thereunder,

(h) charges the services availed of by a person to the account of another  person by tampering with or manipulating any computer, computer system, or computer network,  

he shall be punished with imprisonment up to ten years, or with fine not more than Taka 10 lac, or with both.

Clause-55.       Tampering with Computer Source Documents

Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer program, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine not exceeding Taka three lac, or with both.

Clause-56.       Hacking with Computer System

(1)   Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person, destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, commits hacking.

(2)   Whoever commits hacking shall be punished with imprisonment up to ten years, or with fine not exceeding Taka one crore, or with both.

Chapter-8: Part-2:      THE CYBER REGULATIONS APPELLATE TRIBUNAL

Clause-68.       Establishment of Cyber Appellate Tribunal

(1)   The Government shall, by notification, establish one or more appellate tribunals to be known as the Cyber Regulations Appellate Tribunal.

(2)   The Central Government shall also specify, in the notification referred to in sub-section (1), the matters and places in relation to which the Cyber Appellate Tribunal may exercise jurisdiction.


National ICT Policy – 2002



National ICT Policy – 2002

[ From chapter-24 of the book "Information Technology in Banking" written by Abul Kashem Md. Shirin and Nusrat Tamanna Prianka and published by Institute of Bankers, Bangladesh (IBB) ]


1.         Why ICT Policy?

Information & Communication Technology (ICT) is one of the most important tools to achieve economic prosperity of a country through improving the management and efficiency in every sphere of life. The experience of the developed and emerging economies supports the above notion. To effectively harness the power of ICTs, Bangladesh formulated its first National ICT Policy in 2002. The National ICT Policy 2002 could not reach the professed levels of success due to lack of appropriate plans to achieve the goals set in the policy as well as poor implementation of the underlying actions.

The policy has 103 policy directives in 16 areas. Among those, 8 were fully or largely accomplished, 61 were partially accomplished and 34 remained unaddressed. Lack of ownership and coordination are the two main reasons, while absence of actors or implementing agencies in the policy document contributed much to non fulfillment of the desired goals.

2.         Objectives of ICT Policy

The objectives of the policy are as under:

1.         In order to give a thrust to the ICT sector and expeditious development of Software industry and its export required infrastructural facilities and legal framework will be created..
2.         Provide effective incentives for development of ICT sector to both local and foreign entrepreneurs;
3.         Develop an efficient ICT infrastructure that provides open access to international and national network;
4.         Promote and facilitate use of ICT in all sectors of the economy for transparency, good governance and efficiency improvement;
5.         Establish legislative and regulatory framework for ICT issues like IPR, data security and protection, digital signature, e-Commerce, ICT education etc. as well as to ensure quality ICT education provided by different private organizations
6.         Set up national databases that are reliable and easily accessible to all the people of the country;
7.         Promote use of ICT by providing special allocations for ICT project implementation in the public sector. Train the decision makers in ICT use and promote a ICT culture;.
8.         Develop a large pool of world class ICT professionals to meet the needs of local and global markets
9.         Set up a very high quality ICT institution to continuously promote and foster ICT Industry;
10.       Enact Laws and Regulations for uninterrupted growth of ICT, in conformity with World Trade Organization (WTO) stipulations.

3.         Coverage of ICT Policy

The policy incorporates a clear guideline for the Government and other organizations to perform some activities within a timeline in the following fields:
 
1.                  Training and Human Resources Development
2.                  ICT Infrastructure
3.                  Research and Development in ICT
4.                  ICT Industry
4.1.                        Software Industry
4.2.                        Hardware Industry
4.3.                        Services Industry
5.                  E-Commerce
6.                  E-Government/E-Governance
7.                  Legal Issues
8.                  Health Care
9.                  Agriculture and Poverty Alleviation
10.              Social Welfare
11.              Transportation
12.              Tourism
13.              Environment
14.              Judiciary
15.              Regional and International Cooperation

The policy also suggests the way as to how to implement and monitor the suggested activities, how to obtain funds and resources, and on the required institutional arrangement for ICT Policy Updating, Standardizing, Implementing and Monitoring.

4.         Selected Policy Clauses

The policy clauses related to Banking are produced below:

3.2.26              Solar power will be encouraged specially in those inaccessible areas where use of ICT is constrained due to lack of electricity

3.2.27              Use of VoIP and WLL (Wireless Local Loop) technologies will be reviewed and realistic measures taken thereafter.

3.4.1.1             To develop and encourage the local software industry, price preference may be given to locally developed software in all public and private sector procurement.

3.4.1.5             Joint ventures between local and foreign entrepreneurs in the ICT sector will be vigorously promoted.

3.4.1.6             An annual target of 3 (three) billion US dollars from earnings of export of software, data entry and IT-enabled services shall be planned up to year 2006. The target shall be revised periodically to match the growth of the market.

3.4.2.1             Hardware industry often requires a huge capital investment and entrepreneurs shall be encouraged to establish production facilities for components, peripherals and accessories with joint venture cooperation and technology transfer agreements. Foreign owned and multinational companies, who will establish such production facilities in Bangladesh and employ our workforce, shall be offered special incentives.

3.5       E-Commerce

3.5.1   The Government and the private sector will promote business in electronic form and create an environment in which it will be well secured. Government will take initiative to introduce and promote Government-to-Government (G2G) transaction under the purview of e-commerce. Gradually this initiative will also be extended from G2G to Government to Business (G2B) transaction in the same line.

3.5.2    Authentication of the identities of both buyer and seller or the involved parties in an electronic transaction is crucial to promote inter-bank transaction, encryption e-commerce. Security of electronic transaction should be ensured through appropriate measures.

3.5.3    Establish immediately inter-banking payment system in electronic form.

3.5.4    Legal framework to provide the guiding principles, rules and legislation for e-Commerce shall be put in place.

3.6.6    Government will introduce and promote ICT based services like G2G (Government to Government), G2E (Government to Employee), G2C (Government to Customer) etc.

3.6.7    Preference shall be given to ICT literate candidates for the purpose of recruitment in public offices. ICT-literacy shall also be evaluated in the ACR of officials to ensure utilization of ICT in the public services.

3.7.2    ICT Act should be enacted immediately to protect against computer crimes such as computer fraud, hacking and damage to programs and data and introducing/spreading computer viruses.

3.7.3    Data security and interoperability should be ensured through actions such as setting of encryption standards and international agreements on interoperability.

3.7.4    With the increase in the use of Internet and Information Technology in every sphere of human activities, formulation of new laws or amendment to the existing ones should be done as deemed necessary, to ensure security of data, freedom of information.

3.11.3 ICT will be used for online booking and ticketing services of all public and private transport companies.