Cyber Security Law 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 26

Bill no 39 of 2023

Revocation of The Digital Security Act, 2018 and enactment of new law to ensure cyber
security and make new provisions for the detection, prevention, suppression and
prosecution of crimes committed through digital or electronic means and related
matters.

Whereas it is expedient and necessary to revoke the Digital Security Act, 2018 (Act No.
46 of 2018) and enact a new law to ensure cyber security and make new provisions for
the detection, prevention, suppression and prosecution of crimes committed through
digital or electronic means and related matters;

Therefore it is hereby enacted as follows:—

CHAPTER I

Preliminary

1. Short title and commencement.¾(1) This Act may be called the Cyber Security Act,
2023

(2) It will be effective immediately.

2. Definitions.¾(1) In this Act, unless there is anything repugnant in the subject or


context¾

(a) “Appellate Tribunal” means the Cyber Appellate Tribunal constituted under section
82 of the Information and Communication Technology Act, 2006 (Act No. XXXIX of
2006);

(b) “data storage” means information, knowledge, event, basic concept or guideline
presented as text, image, audio or video format which¾

(i) is being or has been processed by any computer or computer system or computer
network in a formal way; and

(ii) has been processed for use in any computer or computer system or computer
network

(c) “Agency” means the National Cyber Security Agency established under section 5 of
this Act;
(d) “Computer Emergency Response Team” or “Computer Incident Response Team”
means the Computer Emergency Response Team or Computer Emergency Response
Team formed under sub-section 2 of section 9;

(e) “computer system” means a process interconnected with one or more


computers or digital devices capable of collecting, sending and storing information
singly or being connected with each other;

(f) “Council” means the National Digital Security Council constituted under section
12;

(g) “critical information infrastructure” means any external or virtual information


infrastructure declared by the Government that controls, processes, circulates or
preserves any information-data or electronic information and, if damaged or critically
affected, may adversely affect¾

(i) public safety or financial security or public health,

(ii) national security or national integrity or sovereignty;

(h) “National Computer Emergency Response Team” means Team formed under
section 9 sub-section (1);

(i) “Tribunal” means the Cyber Tribunal constituted under section 68 of the
Information and Communication Technology Act, 2006 (Act No. XXXIX of 2006);

(j) “digital” means a working method based on double digit (0 and 1/binary) or
digit, and, for carrying out the purposes of this Act, also includes electrical, digital,
magnetic, optional, biometric, electrochemical, electromechanical, wireless or electro-
magnetic technology;

(k) “digital device” means any electronic, digital, magnetic, optical, or information
processing device or system which performs logical, mathematical and memory
functions by using electronic, digital, magnetic or optical impulse, and is connected with
any digital or computer device system or computer network, and also includes all kinds
of input, output, processing, accumulation, digital device software or communication
facilities;

(l) “digital forensic lab” means the digital forensic lab established under section 10;

(m) “police officer” means a police officer not below the rank of a Inspector;
(n) “programme” means instructions expressed in the form of sound, signal, graph, or
in any other form produced with the help of a machine in a readable medium through
which any special function can be executed or be made tangibly productive by using
digital device;

(o) “Criminal Procedure” means the Code of Criminal Procedure, 1898 (Act V of 1898);

(p) “person” means any person or institution, company, partnership business, farm
or any other organization, or in case of the digital device, its controller, and also includes
any entity created by law or any artificial legal entity;

(q) “illegal access” means to access into any computer or digital device or digital
network or digital information system, without permission of the concerned authorized
person or authority or in violation of the conditions of such permission, or by means of
such access, to make interruption in exchanging any data-information of such
information system, or to suspend or prevent or stop the process of exchanging data-
information, or to change or insert or add or deduct the data-information, or to collect
any data-information by means of a digital device;

(r) “Director General” means the Director General of the Agency;

(ধ) “মানহানন” অর্ Penal


থ Code (Act No. XLV of 1860) এর section 499 এ বর্ণতথ
defamation;

(s) “defamation” means defamation as defined under section 499 of the Penal
Code (Act XLV of 1860);

(t) “malware” means such kind of computer or digital instruction, data[1]information,


programme or apps which¾

(i) changes, distorts, destructs, damages or affects any activity done by digital device or
computer, or creates adverse effect on performing activity of it; or

(ii) being connected with any other computer or digital device, becomes auto-active
while activating any programme, data[1]information or instruction of the computer or
digital device, doing any function, and by means of which causes harmful changes or
incident in the computer or digital device;

(iii) creates opportunity of stealing information from a digital device or automatic access
to it;
(u) “spirit of liberation war” means the high ideals of nationalism, socialism,
democracy and secularism which inspired our heroic people to dedicate themselves to,
and our brave martyrs to sacrifice their lives in, the national liberation struggle;

(v) “cyber security” means the security of any digital device or digital system; and

(v) “service provider” means¾

(i) any person who enables any user to communicate through computer or digital
process; or

(ii) any person, entity or institution who or which processes or preserves computer
data in favour of the service or the user of the service.

(2) The words and expressions used in this Act but not defined shall have the same
meaning as are used in the Information and Communication Technology Act, 2006.

3. Application of the Act.¾(1) If any provision of any other law is inconsistent with any
provision of this Act, the provision of this Act shall apply to the extent inconsistent with
the provision of that any other Act.

(2) Provided that the provisions of the Right to Information Act, 2009 (Act No. XX of
2009) shall be applicable to a matter related to right to information.

4. Extra territorial application of the Act.¾(1) If any person commits any offence under
this Act beyond Bangladesh which would be punishable under this Act if committed in
Bangladesh, the provisions of this Act shall be applicable in such manner as if he had
committed such offence in Bangladesh.

(2) If any person commits any offence within Bangladesh under this Act from outside of
Bangladesh using any computer, computer system, or computer network situated in
Bangladesh, the provisions of this Act shall be applicable to the person in such manner
as if the whole process of the offence had been committed in Bangladesh.

(3) If any person commits any offence beyond Bangladesh under this Act from inside of
Bangladesh, the provisions of this Act shall be applicable in such manner as if the whole
process of the offence had been committed in Bangladesh.

CHAPTER II

National Cyber Security Agency


5. Establishment of Agency, Office, etc.¾(1) For carrying out the purposes of this Act,
the Government shall, by notification in the official Gazette, establish an Agency to be
called the National Cyber Security Agency consisting of 1 (one) Director General and
number of Directors as specified in the rules.

(2) The head office of the Agency shall be in Dhaka, but the Government may, if
necessary, set up its branch offices at any place in the country outside of Dhaka.

(3) The agency will be attached to Information and Communication Technology Division.

(4) The powers, responsibilities and functions of the Agency shall be prescribed by rules

6. Appointment of the Director General and the Directors, tenure, etc.¾(1) The Director
General and the Directors shall be appointed by the Government from among the
persons specialist in computer or cyber security, and the terms and conditions of their
service shall be determined by the Government.

(2) The Director General and the Directors shall be full time employees of the Agency
and shall, subject to the provisions of this Act and rules made thereunder, perform such
functions, exercise such powers and discharge such duties as may be directed by the
Government.

(3) If a vacancy occurs in the office of the Director General, or if the Director General is
unable to perform his duties on account of absence, illness or any other cause, the
senior most Director shall provisionally perform the duties of the Director General until
the newly appointed Director General assumes his office or the Director General is able
to resume the functions of his office.

7. Manpower of the Agency.¾(1) The Agency shall have necessary manpower according
to the organizational framework approved by the Government.

(2) The Agency may, subject to such terms and conditions as may be prescribed by rules,
appoint such number of employees as may be necessary for the efficient performance of
its functions.

CHAPTER III

Preventive Measures

8. Power to remove or block some data-information.¾(1) If any data[1]information


related to any matter under the jurisdiction of the Director General, being published or
propagated in digital media, creates threat to digital security, the Director General may
request the Bangladesh Telecommunications and Regulatory Commission, hereinafter
referred to as BTRC, to remove or, as the case may be, block the said data-information.

(2) If it appears to the law and order enforcing force that any data[1]information
published or propagated in digital media hampers the solidarity, financial activities,
security, defence, religious values or public discipline of the country or any part thereof,
or incites racial hostility and hatred, the law and order enforcing force may request BTRC
to remove or block the data[1]information through the Director General.

(3) If BTRC is requested under sub-sections (1) and (2), it shall, with intimation to the
Government of the said matters, instantly remove or, as the case may be, block the
data-information. (4) For carrying out the purposes of this section, other necessary
matters shall be prescribed by rules.

9. Emergency Response Team.¾(1) For carrying out the purposes of this Act, there shall
be a National Computer Emergency Response Team under the Agency, for discharging
duties on full time basis.

(2) Any critical information infrastructure declared under section 15 may, if necessary,
form its own Computer Emergency Response Team or Computer Incident Response
Team, with the prior approval of the Agency.

(3) The Computer Emergency Response Team and Computer Emergency Team or
Computer Incident Response Team shall consist of the persons expert in digital security
and, if necessary, members of law and order enforcing force.

4) The National Computer Emergency Response Team and Computer Emergency Team
or Computer Incident Response Team shall discharge its duties in such manner as may
be prescribed by rules, on full time basis.

(5) Without prejudice to the generality of sub-section (4), the Computer Emergency
Response Team shall discharge the following duties, namely:¾

(a) to ensure the emergency security of the critical information infrastructure;

(b) to take immediate necessary measures for remedy if there is any cyber or digital
attack and if the cyber or digital security is affected; or
(d) to take overall co-operational initiatives, including exchange of information with
any similar type of foreign team or organization, for carrying out the purposes of this
Act, with the prior approval of the Government; and

(c) to take necessary initiatives to prevent probable and imminent cyber or digital
attack;

(d) to take overall co-operational initiatives, including exchange of information with


any similar type of foreign team or organization, for carrying out the purposes of this
Act, with the prior approval of the Government; and

(e) to do such other act as may be prescribed by rules.

(6) The Agency shall supervise and make co-ordination amongst the National Computer
Emergency Response Team, Computer Emergency Teams or Computer Incident
Response Team.

10. Digital forensic lab.¾(1) For carrying out the purposes of this Act, there shall be one
or more digital forensic labs under the control and supervision of the Agency.

(2) Notwithstanding anything contained in sub-section (1), if any digital forensic lab is
established under any authority or organisation of the Government before the
commencement of this Act, the Agency shall, subject to fulfilment of the standard
prescribed under section 11, give recognition to the forensic lab and in such case, the
lab shall be deemed to have been established under this Act.

(3) The Agency shall make co-ordination among the digital forensic labs.

(4) The establishment, use, operation and other matters of the digital forensic lab shall
be prescribed by rules.

(11) Quality control of digital forensic lab.¾(1) The Agency shall ensure the quality of
each digital forensic lab, according to the standards prescribed by rules.

(2) In case of ensuring the quality prescribed under sub-section (1), each digital forensic
lab shall, inter alia,¾

(a) operate the functions of the lab by properly qualified and trained manpower;

(b) ensure its physical infrastructural facilities;


(c) take necessary initiatives to maintain the security and secrecy of the data-information
preserved thereunder;

(d) use quality instruments in order to maintain the technical standard of the digital test;
and

(e) perform its functions following scientific method in such manners as may be
prescribed by rules.

Chapter 4

National Cyber Security Council

12. National Digital Security Council.¾(1) For carrying out the purposes of this Act, the
National Digital Security Council shall consist of a Chairman and the following members,
namely:¾

(a) Honorable Prime Minister of the Peoples Republic of Bangladesh, will also be the
Chairman

(b) Minister, State Minister or Deputy Minister of the Ministry of Post,


Telecommunication and Information Technology;

c) Minister of the Ministry of Law, Justice and Parliamentary Affairs;

(d) ICT Adviser to Honorable Prime Minister

(e) Principal Secretary to the Prime Minister;

(f) Governor, Bangladesh Bank;

(f) Secretary, Posts and Telecommunication Division;

(g) Secretary, Information and Communication Technology Division

(h) Secretary, Public Security Division;

(i) Foreign Secretary, Ministry of Foreign Affairs;

(j) Inspector General of Police, Bangladesh Police;

(k) Chairman, BTRC;


(l) Director General, Directorate General of Forces Intelligence;

(j) Director General, National Security Intelligence

(k) Director General, National Telecommunications Monitoring Center; and

(m) Director General, National Cyber Security Agency.

(2) Director General, National Cyber Security Agency shall provide the secretarial service
to the council.

(3) For the purpose of sub-section (1), the Council may, on the advice of the Chairman,
at any time, by notification in the Official Gazette, co-opt any expert as its member for
such period and conditions as may be prescribed.

13. Power, etc. of the Council.¾(1) For implementation of the provisions of this Act and
the rules made thereunder, the Council shall provide necessary direction and advice to
the Agency.

(2) The Council shall, inter alia, perform the following functions, namely:-

(a) to provide necessary directions for remedy if digital security is under threat;

(b) to give advice for infrastructural development of digital security and


enhancement of its manpower and quality;

(c) to formulate inter-institutional policies to ensure the digital security;

(d) to take necessary measures to ensure the proper application of this Act and rules
made thereunder;

(e) to do such other act as may be prescribed by rules.

14. Meeting, etc. of the Council.¾(1) Subject to other provisions of this section, the
Council may determine the procedure of its meeting.

(2) The meeting of the Council shall be held on such date, time and place as may be
determined by its Chairman.

(3) The Council shall hold its meetings as and when necessary.

(4) The Chairman of the Council shall preside over all meetings of the Council.
(5) No act or proceeding of the Council shall be invalid and be called in question merely
on the ground of any vacancy in, or any defect in the constitution of, the Council.

CHAPTER V

Critical Information Infrastructure

15. Critical information infrastructure.¾For fulfilling the purposes of this Act, the
Government may, by notification in the official Gazette, declare any computer system,
network or information infrastructure as critical information infrastructure.

16. Monitoring and inspection of the safety of a critical information


infrastructure.¾(1)The Director General shall, if necessary, from time to time, monitor
and inspect any critical information infrastructure to ensure whether the provisions of
this Act are properly complied with, and submit a report in this behalf to the
Government.

(2) The critical information infrastructures declared under this Act shall, upon
examination and inspection of its internal and external infrastructures, submit an
inspection report to the Government every year in such manner as may be prescribed by
rules, and communicate the subject matter of the report to the Director General.

(3) If the Director General has reason to believe that any activity of an individual
regarding any matter within his jurisdiction is threatening or detrimental to any critical
information infrastructure, then he may, suo moto, or upon a complaint of any other
person, inquire into the matter.

(4) For fullfilling out the purposes of this Act, the inspection and examination of safety of
any critical information infrastructure shall be conducted by a person expert in digital
security.

CHAPTER VI

Offence and Punishment

17. Punishment for illegal access to any critical information infrastructure, etc.-¾(1) If
any person, intentionally or knowingly,¾

(a) makes illegal access to any critical information infrastructure; or

(b) by means of illegal access, causes or tries to cause harm or damage to it, or
makes or tries to make it inactive,
then such act of the person shall be an offence.

(2) If any person under subsection(1)¾

(a) commits an offence under clause (a), he shall be punished with imprisonment for
a term not exceeding 3 (three) years, or with fine not exceeding Taka 25 (twenty five) lac,
or with both; and

(b) commits an offence under clause (b), he shall be punished with imprisonment
for a term not exceeding 6 (six) years, or with fine not exceeding Taka 1 (one) crore, or
with both.

18. Illegal access to computer, digital device, computer system, etc. and
punishment.¾(1) If any person intentionally¾

(a) makes or abets to make illegal access to any computer, computer system or
computer network; or

(b) makes or abets to make illegal access to any computer, computer system or
computer network with intent to commit an offence, then such act of the person shall
be an offence.

(2) If any person under subsection (1) ¾

(a) commits an offence under clause (a), he shall be punished with imprisonment for
a term not exceeding 6 (six) months, or with fine not exceeding Taka 2 (two) lac, or with
both;

(b) commits an offence under clause (b) he shall be punished with imprisonment for
a term not exceeding 3 (three) years, or with fine not exceeding Taka 10 (ten) lac, or with
both.

(3) If any offence under sub-section (1) is committed to a protected computer or


computer system or computer network of Critical Information Infrastructure, he shall be
punished with imprisonment for a term not exceeding 3 (three) years, or with fine not
exceeding Taka 10 (ten) lac, or with both.

19. Damage of computer, computer system, etc. and punishment.¾(1) If any person¾

(a) collects any data, data-storage, information or any extract of it from any
computer, computer system or computer network, or collects information with
moveable stored data-information of such computer, computer system or computer
network, or collects copy or extract of any data; or

(b) intentionally inserts or tries to insert any virus or malware or harmful software
into any computer or computer system or computer network; or

(c) willingly causes or tries to cause harm to data or data-storage of any computer,
computer system, computer network, or causes or tries to cause harm to any
programme saved in the computer, computer system, or computer network; or

(d) obstructs or tries to obstruct a valid or authorized person to access into any
computer, computer system or computer network by any means; or

(e) willingly creates or sells or tries to create or sell spam or sends unsolicited
electronic mails without permission of the sender or receiver, for marketing any product
or service; or

(f) takes service of any person, or deposits or tries to credit the charge fixed for the
service to the account of any other person fraudulently or by means of unfair
interference to any computer, computer system or computer network,

then such act of the person shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 7 (seven) years, or with fine not exceeding Taka
10 (ten) lac, or with both.

20. Offence and punishment related to modification of computer source code.¾(1) If


any person intentionally or knowingly hides or damages or modifies the source code
used in any computer programme, computer system or computer network, or tries to
hide, damage or modify the source code, programme, system or network through
another person, and if such source code is preservable or maintainable, then such act of
the person shall be an offence.

(2) If any person commits any offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 3 (three) years, or with fine not exceeding Taka 3
(three) lac, or with both.

21. Punishment for making any kind of propaganda or campaign against liberation war,
spirit of liberation war, father of the nation, national anthem or national flag.¾(1) If any
person, by means of digital or electronic medium, makes or instigates to make any
propaganda or campaign against the liberation war of Bangladesh, spirit of liberation
war, father of the nation, national anthem or national flag, then such act of the person
shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 5 (five) years, or with fine not exceeding Taka 1
(one) crore, or with both.

22. Digital or electronic forgery.¾(1) If any person commits forgery by using any digital
or electronic medium, then such act of the person shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 2 (two) years, or with fine not exceeding Taka 5
(five) lac, or with both.

Explanation.¾For carrying out the purposes of this section, “digital or electronic forgery”
means to operate, without right or in excess of the authorized right or by means of
unauthorized practice, erroneous data or programme, information or wrong activity,
information system, computer or digital network by producing, changing, deleting and
hiding input or output of any computer or digital network by a person.

23. Digital or electronic fraud.¾(1) If any person commits fraud by using any digital or
electronic medium, then such act of the person shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 5 (five) years, or with fine not exceeding Taka 5
(five) lac, or with both.

Explanation.¾For carrying out the purposes of this section, “digital or electric fraud”
means to change or delete any information of, or add new information to, or tamper
any information of, any computer programme, computer system, computer network,
digital device, digital system, digital network or social media by a person, intentionally
or knowingly or without permission, and doing so, to diminish the value or utility
thereof, or try to get any benefit for himself or any other person, or to cause harm to, or
deceive, any other person.

24. Identity fraud or personation.¾(1) If any person, intentionally or knowingly, by using


any computer, computer programme, computer system, computer network, digital
device, digital system or digital network-
(a) holds the identity of another person or exhibits the personal information of
another person as his own in order to deceive or cheat; or

(b) holds the personal identity of any person, alive or dead, as his own by forgery in
order to-

(i) get or cause to get benefit for himself or for any other person;

(ii) acquire any property or any interest therein;

(iii) cause harm to a natural person or individual by personating another,

then such act of the person shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 5 (five) years, or with fine not exceeding Taka 5
(five) lac, or with both.

25. Transmission, publication, etc. of offensive, false or threatening datainformation.¾(1)


If any person, through any website or any other digital or electronic medium,¾

(a) intentionally or knowingly transmits, publishes or propagates any data-


information which he knows to be offensive, false or threatening in order to annoy,
insult, humiliate or malign a person; or (b) publi

(b) publishes or propagates or abets to publish or propagate any information, as a


whole or partly, which he knows to be propaganda or false, with an intention to affect
the image or reputation of the country, or to spread confusion,

then such act of the person shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 2 (two) years, or with fine not exceeding Taka 3
(three) lac, or with both.

26. Punishment for unauthorized collection, use etc. of identity information.- (1) If any
person collects, sells, possesses, provides or uses identity information of any other
person without lawful authority, then such act of the person shall be an offence.
(2) If any person commits any offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 2 (two) years, or with fine not exceeding Taka 5
(five) lac, or with both.

Explanation.¾For carrying out the purposes of this section, “identity information” means
any external, biological or physical information or any other information which singly or
jointly can identify a person or a system, such asname, photograph, address, date of
birth, mother’s name, father’s name, signature, national identity card, birth and death
registration number, finger print, passport number, bank account number, driving
license, e-TIN number, electronic or digital signature, username, credit or debit card
number, voice print, retina image, iris image, DNA profile, security related question or
any other identification which are available for advance technology.

27. Offence and punishment for committing cyber terrorism.¾(1) If any person¾

(a) creates obstruction to make legal access, or makes or causes to make illegal
access to any computer or computer network or internet network with an intention to
jeopardize the integrity, security and sovereignty of the State and to create a sense of
fear or panic in the public or a section of the public; or

(b) creates pollution or inserts malware in any digital device which may cause or likely
to cause death or serious injury to a person; or

(c) affects or damages the supply and service of daily commodity of public or
creates adverse effect on any critical information infrastructure; or

(d) intentionally or knowingly gains access to, or makes interference with, any
computer, computer network, internet network, any protected data-information or
computer database, or gains access to any such protected data information or computer
database which may be used against friendly relations with another foreign country or
public order, or may be used for the benefit of any foreign country or any individual or
any group,

then such person shall be deemed to have committed an offence of cyber terrorism.

(2) If any person commits an offence under sub-section (1), he shall be


punished with imprisonment for a term not exceeding 14 (fourteen) years, or with fine
not exceeding Taka 1 (one) crore, or with both.

28. Publication, broadcast, etc. of information in website or in any electronic format that
hurts the religious values or sentiment.¾(1) If any person or group willingly or
knowingly publishes or broadcasts or causes to publish or broadcast anything in website
or any electronic format which hurts religious sentiment or values, with an intention to
hurt or provoke the religious values or sentiments, then such act of the person shall be
an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 2 (two) years, or with fine not exceeding Taka 5
(five) lac, or with both.

29. Publication, transmission, etc. of defamatory information.¾(1) If any person


publishes or transmits any defamatory information as described in section 499 of the
Penal Code (Act XLV of 1860) in website or in any other electronic format, he shall be
punished with fine not exceeding Taka 25 (twenty five) lac.

30. Offence and punishment for e-transaction without legal authority.¾ (1) If any
person¾

(a) without legal authority, makes e-transaction over electronic and digital means
from any bank, insurance or any other financial institution or any organisation providing
mobile money service; or

(b) makes any e-transaction notwithstanding the Government or Bangladesh Bank


declaration of such e-transactions illegal from time to time,

then such act of the person shall be an offence.

(2) If any person commits an offence under sub-section (1), he shall be punished with
fine not exceeding Taka 25 (twenty five) lac.

Explanation.¾For carrying out the purposes of this section, “e-transaction” means to


deposit or withdraw money into or from any bank, financial institution or a specific
account number through digital or electronic medium or to give direction or order for
withdrawal, or legally authorized money transaction and transfer of money through any
digital or electronic medium by a person for transferring his fund.

31. Offence and punishment for deteriorating law and order, etc.¾(1) If any person
intentionally publishes or transmits anything in website or digital layout that creates
enmity, hatred or hostility among different classes or communities of the society, or
destroys communal harmony, or creates unrest or disorder, or deteriorates or advances
to deteriorate the law and order situation, then such act of the person shall be an
offence.
(2) If any person commits an offence under sub-section (1), he shall be punished with
imprisonment for a term not exceeding 5 (five) years, or with fine not exceeding Taka 25
(twenty five) lac, or with both.

32. Offence related to hacking and punishment thereof.¾(1) If any person commits
hacking, it shall be an offence, and for this, he shall be punished with imprisonment for a
term not exceeding 14 (fourteen) years, or with fine not exceeding Taka 1 (one) crore, or
with both.

Explanation.¾In this section “hacking” means¾

(a) to destroy, cancel or change any information of the computer data storage, or to
reduce the value or efficacy of it or to cause harm in any way; or

(b) to cause harm to any computer, server, computer network or any other
electronic system by gaining access thereto without ownership or possession

33. Abetment of committing an offence and punishment thereof.¾(1) If any person


abets to commit an offence under this Act, then such act of the person shall be an
offence.

(2) In case of abetment of committing an offence, the person abetted to commit the
offence shall be punished with the same punishment as is provided for the offence.

34. Offense and punishment for filing false suit, complaint, etc.- (1) If any person files or
makes a suit or complaint against that person without knowing any just or lawful cause
for filing a suit or complaint under any other section of this Act with intent to injure
another person. , then the person who filed the case or complaint and the person who
filed the complaint shall be punished with the punishment prescribed for the original
offence.

(2) If a person files a case or complaint under sub-section (1) under more than one
section of this Act, then the amount of punishment for the main offense for which the
amount of punishment is higher among the offenses mentioned in the said section shall
be determined as the amount of punishment.

(3) The Tribunal may file and try a case on the basis of a written complaint of any
person, of an offense committed under sub-section (1).

35. Offence committed by a company.¾(1) Where an offence under this Act is


committed by a company, every owner, chief executive, director, manager, secretary,
partner or any other officer or employee or representative of the company who has
direct involvement with the offence shall be deemed to have committed the offence
unless he proves that the offence was committed without his knowledge or he exercised
all due diligence to prevent the offence.

(2) If the company referred to in sub-section (1) is a legal entity, it may be accused or
convicted separately, in addition to accusing or convicting the persons mentioned
above, but only fine may be imposed upon the company under the concerned provision

Explanation.¾In this section¾

(a) “company” includes any commercial institution, partnership business, society,


association or organization;

(b) “director”, in case of commercial institution, includes any partner or member of


the Board of Directors.

36. Power to issue order for compensation.¾If any person causes financial loss to any
other person by means of digital or electronic forgery under section 22, digital or
electronic fraud under section 23 and identity fraud or personation under section 24,
then the Tribunal may issue order to compensate the person affected with money
equivalent to the loss caused, or such amount of money as it considers to be sufficient

37. The service provider not to be responsible.¾No service provider shall be liable under
this Act or rules made thereunder for facilitating access to any data-information, if he
proves that the offence or breach was committed without his knowledge or he exercised
all due diligence to prevent the offence.

CHAPTER VII

Investigation of Offence and Trial

38. Investigation, etc.¾(1) Any offence committed under this Act shall be investigated
by a police officer, hereinafter in this chapter referred to as the Investigation Officer.

(2) Notwithstanding anything contained in sub-section (1), if it appears at the beginning


of the case or at any stage of investigation that to form an investigation team is
necessary for fair investigation, then the Tribunal or the Government may, by order,
form a joint investigation team comprising of the investigation agency, the law and
order enforcement force and the agency under the control of such authority or agency
and on such condition as may be referred to in the order.
39. Time-limit for investigation, etc.¾(1) The Investigation Officer¾

(a) shall complete the investigation within 90 (ninety) days from the date of getting
charge of investigation of an offence;

(b) may, if fails to complete the investigation within the time-limit prescribed under
clause (a), extend the time-limit of investigation for further 15 (fifteen) days, subject to
the approval of his controlling officer;

(c) shall, if fails to complete the investigation within the time-limit prescribed under
clause (b), inform the matter to the Tribunal in the form of a report with reasons to be
recorded in writing, and shall complete the investigation within the next 30 ( thirty) days
with the permission of the Tribunal.

(2) If any Investigation Officer fails to complete the investigation under subsection (1),
the Tribunal may extend the time-limit for the investigation up to a reasonable period.

40. Power of Investigation Officer.¾(1) In case of investigation of any offence under this
Act, the Investigation Officer shall have the following powers, namely:¾

(a) taking under his own custody any computer, computer programme, computer
system, computer network or any digital device, digital system, digital network or any
programme, data-information which has been saved in any computer or compact disc
or removable drive or by any other means;

(b) taking necessary initiatives to collect data-information of trafficdata from any


person or agency;

(c) taking such other step as may be necessary for carrying out the purposes of this
Act.

(2) For the interest of investigation of an offence, the Investigation Officer may take
assistance from any specialist or any specialized organisation while conducting
investigation under this Act.

41. Search and seizure by warrant.¾If a police officer has reasons to believe that¾

(a) any offence has been committed or is likely to be committed under this Act; or

(b) any computer, computer system, computer network, data information related to
an offence committed under this Act, or any evidence thereof has been preserved in any
place or to a person,
then he may, for reasons of such belief to be recorded in writing, obtain a search
warrant upon an application to the Tribunal or the Chief Judicial Magistrate or the Chief
Metropolitan Magistrate, as the case may be, and proceed with the following measures,
namely:¾

(i) taking possession of the data-information of traffic data under the possession of
any service provider

(ii) creating obstruction, at any stage of communication, to any telegraph or electronic


communication including recipient information and data-information of traffic data.

42. Search, seizure and arrest without warrant.¾(1) If any police officer has reasons to
believe that an offence under this Act has been or is being committed, or is likely to be
committed in any place, or any evidence is likely to be lost, destroyed, deleted or altered
or made unavailable in any way, then he may, for reasons of such belief to be recorded
in writing, proceed with the following measures, namely:¾

(a) to enter and search the place, and if obstructed, to take necessary measures in
accordance with the Code of Criminal Procedure;

(b) to seize the computer, computer system, computer network, datainformation or


other materials used in committing the offence or any document supportive to prove
the offence;

(c) to search the body of any person present in the place;

(d) to arrest any person present in the place if the person is suspected to have
committed or be committing an offence under this Act.

(2) After concluding search under sub-section (1), the police officer shall submit a report
on such search to the Tribunal

44. Preservation of information.¾(1) If the Director General, suo moto, or upon an


application of the Investigation Officer, believes that it is necessary to preserve any data-
information saved in a computer for the interest of an investigation under this Act, and
there is possibility to damage, destroy or change the data information or to make
unavailable, then he may require the person or institution in charge of the computer or
computer system to preserve such datainformation up-to 90 (ninety) days.
(2) The Tribunal may, upon an application, extend the time-limit of preservation of such
data-information for a period which may not exceed 180 (one hundred and eighty) days
in aggregate.

44. Not to hamper the general usage of computer.¾(1) The Investigation Officer shall
conduct investigation in such a way that the legal use of computer, computer system,
computer network or any part thereof is not hampered.

(2) Any computer, computer system or computer network or any part thereof may be
seized, if¾

(a) it is not possible to make access to the concerned computer, computer system,
computer network or any part thereof

(b) there is possibility to damage, destroy or change the datainformation or to be


unavailable unless the concerned computer, computer system, computer network or any
part thereof is seized to prevent an offence or stop an ongoing offence.

45. Assistance in investigation.¾The Investigation Officer may request any person or


entity or service provider to provide information or assist in the investigation while
conducting investigation of an offence under this Act, and if requested, the concerned
person, entity or service provider shall be bound to provide information and necessary
assistance to the Investigation Officer.

46. Secrecy of the information obtained in course of investigation.¾(1) If any person,


entity or any service provider provides or publishes any information for the interest of
investigation, no suit or prosecution shall lie against the person, entity, or service
provider.

(2) All persons, entities or service providers related to the investigation under this Act
shall maintain the secrecy of information related to the investigation.

(3) If any person contravenes the provisions of sub-sections (1) and (2), then such
contravention shall be an offence, and for such offence he shall be punished with
imprisonment for a term not exceeding 2 (two) years, or with fine not exceeding Taka 1
(one) lac, or with both.

47. Cognizance of offence, etc.¾(1) Notwithstanding anything contained in the Code of


Criminal Procedure, the Tribunal shall not take cognizance of any offence except upon a
report made in writing by any police officer.
(2) The Tribunal shall, while trying an offence under this Act, follow the procedure of
trials before Courts of Session laid down in Chapter XXIII of the Code of Criminal
Procedure subject to being consistent with the provisions of this Act.

48. Trial of offence and appeal.¾(1) Notwithstanding anything contained in any other
law for the time being in force, offences committed under this Act shall be tried by the
Tribunal only.

(2) Any person aggrieved with the judgment of the Tribunal may prefer an appeal before
the Appellate Tribunal.

49. Application of the Code of Criminal Procedure.¾(1) Save as anything contrary to the
provisions of this Act, the provisions of the Code of Criminal Procedure shall be
applicable to the investigation, trial, appeal and all incidental matters related to any
offence under this Act.

(2) The Tribunal, the Appellate Tribunal and, as the case may be, the Police Officer in the
exercise of the duties assigned to them, in accordance with the provisions of this Act,
Part-II and Part-II of Chapter VIII of the Information and Communication Technology
Act, 2006 (Act No. 39 of 2006) in respect of the following matters: - 3 shall follow the
provisions, namely:-

(a) the procedure of the Tribunal and Appellate Tribunal;

(b) time limit for delivery of judgment;

(c) no obstruction to the imposition of any other penalty in respect of fine or


confiscation;

(d) power of detention or arrest in public places, etc.;

(e) method of search; and

(f) Jurisdiction of Appellate Tribunal and procedure for hearing and disposing of
appeals.

(3) The Tribunal shall exercise all the powers of a Session Court of exercising original
jurisdiction under the Code of Criminal Procedure.

51. Taking opinion of experts, training, etc.¾(1) The Tribunal or the Appellate Tribunal
may, during trial, take independent opinion from any person expert in computer science,
cyber forensic, electronic communication, data security and in related other fields.
(2) The Government or the Agency may, if necessary, provide specialized training to all
persons concerned in the implementation of this Act, on computer science, cyber
forensic, electronic communication, data security and other necessary matters.

51. Time-limit for disposal of case.¾(1) The judge of the Tribunal shall dispose of a case
under this Act within 180 (one hundred and eighty) working days from the date on
which the charge is framed.

(2) If the judge of the Tribunal fails to dispose a case within the time-limit specified in
sub-section (1), he may, for reasons to be recorded in writing, extend the time-limit up
to 90 (ninety) days.

(3) If the judge of Tribunal fails to dispose a case within the time-limit specified in sub-
section (2), he may, with intimation to the High Court Division in the form of a report
recording reasons thereof, continue the proceedings of the case.

52. Offences to be cognizable and bailabe.¾In this Act¾

(a) the offences specified in sections 17, 19, 27 and 33 shall be cognizable and non-
bailable;

(b) the offences specified in clause (b) of sub-section (1) of section 18, sections 20,
21, 22, 23, 24, 25, 26, 29, 30, 31, 32, 35 and 47 shall be noncognizable and bailable;

(c) the offences specified in clause (a) of sub-section (1) of section 18 shall be non-
cognizable, bailable and subject to the permission of the court, be compromiseable;

53. Forfeiture.¾(1) If an offence is committed under this Act, the computer, computer
system, floppy disk, compact disk, tape drive or any other related computer materials or
instrument by means of which the offence has been committed shall be liable to
forfeiture according to the order passed by the Tribunal.

(2) Notwithstanding anything contained in sub-section (1), if the Tribunal is satisfied that
the person, under whose control or possession the computer, computer system, floppy
disk, compact disk or any other computer related material or instrument have been
found, is not responsible for committing the offence related to the materials, then the
said computer, computer system, floppy disk, compact disk, tape drive or any other
related computer materials shall not be liable to forfeiture.

(3) If any legal computer, computer system, floppy disk, compact disk, tape drive or any
other related computer material is found with the computer, computer system, floppy
disk, compact disk, tape drive or any other related computer material liable to forfeiture
under sub-section (1), then those items shall also be liable to forfeiture.

(4) Notwithstanding anything contained in other provisions of this section, if any


computer belonging to any Governmental organisation or any statutory body or any
material or instrument related thereto is used for committing an offence, it shall not be
liable to forfeiture.

CHAPTER VIII

Regional and International Cooperation

54. Regional and international cooperation.¾If any regional or international cooperation


is necessary in case of conducting an investigation or trial of an offence committed
under this Act, the provisions of the the Mutual Assistance in Criminal Matters Act, 2012
(Act No. IV of 2012) shall be applicable.

CHAPTER IX

Miscellaneous

56. Delegation of power.¾The Director General may, if necessary, by order in writing,


delegate any of his powers or duties conferred upon him under this Act to any
employee of the Agency and any other person or a police officer.

57. Evidentiary value.¾Notwithstanding anything contained contrary in the Evidence


Act, 1872 (Act I of 1872) or any other law, any forensic evidence obtained or collected
under this Act shall be admitted as an evidence in the trial.

59. Removal of difficulty.¾If any difficulty arises in implementation of the provisions of


this Act, the Government may, by notification in the official Gazette, take any necessary
action in this behalf to remove such difficulty.

59. Power to make rules.¾(1) The Government may, by notification in the official
Gazette, make rules for carrying out the purposes of this Act.

(2) Without prejudice to the generality of sub-section (1), the Government may, inter
alia, make rules especially for all or any of the following matters, by notification in the
official Gazette, namely:¾

(a) establishment of digital forensic lab;


(b) supervision of digital forensic lab by the Director General;

(c) review of traffic data or information and the process of its collection and
preservation;

(d) process of interference, review or decryption and protection;

(e) security of critical information infrastructure;

(f) procedure of regional and international cooperation in case of digital security;

(g) formation and operation of Emergency Response Team and coordination with
other teams;

(h) cloud computing, metadata.

60. Revocation and Custody.— (1) The Digital Security Act, 2018 (Act No. 46 of 2018),
hereinafter referred to as the said Act, is hereby revoked.

(2) Immediately before such revocation, pending cases under the said Act in the
concerned Tribunal and appeals against the order, judgment or punishment passed in
similar cases shall be conducted and disposed of in the concerned Appellate Tribunal as
if the said Act had not been revoked.

(3) All the cases in which a report or complaint has been made or a charge sheet has
been filed or the case is under investigation due to an offense under the said Act shall
also be deemed to be a case under trial in the Tribunal referred to in sub-section (2).

(4) Notwithstanding the revocation under sub-section (1), under the said Act—

(a) all movable and immovable properties, documents and liabilities, if any, of the
constituted Digital Security Agency shall be vested in the National Cyber Security
Agency;

(b) rules made, orders issued, instructions, notifications or guidelines or any measures
made, notified or adopted shall, subject to their being consistent with the provisions of
this Act, remain in force until repealed under this Act, and the same made, issued under
this Act, shall be deemed to have been made, notified or received;

(c) all officers and employees including the Director General and Directors of the
constituted Digital Security Agency shall be deemed to be the Director General,
Directors and officers of the National Cyber Security Agency, and shall be employed or
employed in the National Cyber Security Agency on the same terms and conditions as
they were employed or employed in the Digital Security Agency;

(d) the National Computer Emergency Response Team and the Computer Emergency
Response Team constituted under this Act shall be deemed to be the National
Computer Emergency Response Team and the Computer Emergency Response Team;

(e) a digital forensic lab established shall be deemed to be a digital forensic lab
established under this Act;

(f) Computer system, network or information infrastructure declared as critical


information infrastructure shall be deemed to be a declared critical information
infrastructure under this Act.

61. Publication of English text.¾(1) After the commencement of this Act, the
Government may, by notification in the official Gazette, publish an authentic English text
of this Act.

(2) In the event of conflict between the Bangla and the English text, the Bangla text shall
prevail.

You might also like