Professional Documents
Culture Documents
Bangladesh. During the last decade private and public sector has done a revolution with the use of
technical enhancement. Due to unauthorized intervention to the system, company loses huge
confidential information which caused a large amount of financial lose. It has already been
identified that especially Financial Institutions are in the most threading organization for
cybercrime that at the same time reflects to the personal life. Some development partners has
started working how to tackle cybercrime and improve effective communications.
2. Methodology
Employing the following qualitative methods has collected the relevant information:
• Literature Review (secondary source of information; journals, reports etc.) • In-depth interviews
were made with the Manager and others of Cybercafé. • Focus Group Discussion with the students
of private university. • Key Informant Interview with the Member of Cybercrime unit.
3. Types of Cybercrime
Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber
crime may be said to be those species, of which, genus is the conventional crime, and where either
the computer is an object or subject of the conduct constituting crime”. “Any criminal activity that
uses a computer either as an instrumentality, target or a means for perpetuating further crimes
comes within the ambit of cyber crime.
7. Conclusion
Capacity of human mind is unfathomable. It is not possible to eliminate cybercrime from the
cyberspace. It is quite possible to check them. History is the witness that no legislation has
succeeded in totally eliminating crime from the globe. The only possible step is to make people
aware of their rights and duties and further making the application of the laws more stringent to
check crime. Undoubtedly the Act is a historical step in the cyber world. Further it cannot be
denied that there is a need to bring changes in the Information Technology Act to make it more
effective to combat cybercrime. It can be concluded with a word of caution for the pro-legislation
school that it should be kept in mind that the provisions of the cyber law are not made so stringent
that it may retard the growth of the industry and prove to be counter-productive.
8. Recommendations
• Clear and self-explanatory Standard Operating Procedure to be imposed immediately for the
Cybercrime Unit; • A comprehensive induction program should be developed for all the concerns
of ICT and implement it as pilot basis; • A separate Cybercrime Protection Act should be enacted.
17
NOTES
1 Cyber- combining form (in nouns and adjectives) connected with
electronic communication networks especially the internet.
2 Kind of shop/outlet in where customer can use internet by paid.
20
BIBLIOGRAPHY
1. The Penal Code, 1860 (Act No. XLV of 1860) 2. The Information and Communication
Technology Act, 2006 3. Report on Regional Cybercrime Seminar, Dhaka (2007) 4. Boham and
Haley (2002) 5. Kumar Vinod – Winning the Battle against Cyber Crime 6. Kapoor G.V. - Byte
by Byte 7. Mehta Dewang- Role of Police In Tackling Internet Crimes 8. Duggal Pawan – The
Internet: Legal Dimensions 9. Monjur Kader: Criminology (Cybercrime)