ICT and Income from ICT

48
Report on ICT ACT AND INCOME FROM ICT ‘‘Biborno’’ Section-A, 8 th Batch Department of Management Studies Faculty of BBA Jagannath University Page 1 of 48

Transcript of ICT and Income from ICT

Report on

ICT ACT AND INCOME FROM ICT

‘‘Biborno’’

Section-A, 8th Batch

Department of Management Studies

Faculty of BBA

Jagannath University

Page 1 of 48

April – 2014

Report on

ICT ACT AND INCOME FROM ICT

‘‘Biborno’’

Section-A, 8th Batch

SL NAME ID REMARK01 S. M. MOMINUL ISLAM B12020200602 MD.HABIBUR RAHAMAN B12020203803 MD. SAJJAD HOSSAIN B-12020206504 AHANAF TAHMID ALVEE B12020200505 TASNIM AKTER B12020209706 SUMAIYA RAISA B12020206807 MD. RAKIB B12020205808 MD. RIFAT RAIYAN KHAN B-12020202309 MOAZ IBN MAHBUB B12020202510 MD. SOJOL MIAA B120202098

Supervisor

FAHMIDA AKTER NIPA

Lecturer

Department of Management Studies

Page 2 of 48

Faculty of BBA

Jagannath University

April --2014

Supervisor’ Forwarding

………………………………

FAHMIDA AKTER NIPA

Lecturer

Department of Management Studies

Faculty of BBA

Jagannath University

Page 3 of 48

April--2014

DeclarationI do hereby solemnly declare that the work presented in this Report has been carried out by

us and my group members has not been previously submitted to any other

University/College/Organization for an academic qualification/certificate/diploma or degree.

The work we have presented does not breach any existing copyrightand no portion of this

Page 4 of 48

report is copied from any work done earlier for a degree or otherwise.

I further undertake to indemnify the Department against any loss or damage arising from

Breach of the foregoing obligations.

…………………….

S.M. MOMINUL ISLAM

On Behalf of The Group ‘‘Biborno’’

Section-A

BBA 8thBatch

……………………

Date

AcknowledgmentPraise is to almighty Allah who has given us the strength and opportunity to complete this

Report . This report is the outcome of the contributions and sin care cooperation of my group

members. For the fear of sounding like a vote of thanks speech, I could not possibly thank all

Page 5 of 48

of those marvelous people who have contributed something of them directly or indirectly in

preparing this report successfully. They are of course some very special people who cannot

go without mention. It gives me immense thank them for theircordial cooperation and

encouragement.

First of all, I would like to thanks Almighty Allah and my parents and I express heartfelt

gratitude to my honorable Supervisor, FAHMIDA AKTER NIPA ,Lecturer, Department of

Management Studies, Faculty of Business Studies, Jagannath University who provided us all

out help, supports and guidelines in preparing this report. Without his inspiration and advice

it could be very difficult to prepare this report.

In spite of sincere and denoted efforts, there might be some mistakes in the study report. I

take the entire responsibility for such unintended errors and omissions.

S. M. MOMINUL ISLAM

On behalf of the group ‘‘Biborno’’

Id: B120202006, Section-A, 8thbatch

Department of Management Studies

Faculty of BBA

Jagannath University

Page 6 of 48

EXECUTIVE SUMMARY

Information and Communication Technologies (ICTs) were recognizedby the world leaders as a key development. In the Poverty Reduction Strategy of the country called National Strategy for Accelerated Poverty Reduction 2009 (NSAPR-II), ICTs were similarly identified and given due importance. The government’s ‘Digital Bangladesh by 2021’ vision plans to mainstreams ICTs as a pro-poor tool to eradicate poverty, establish good governance ,ensure social equity through quality education, healthcare and law enforcement for all, and prepare the country for climate change

Page 7 of 48

Table of content

SL Title Page no1. Introduction 082. Digital signature 093. Law regarding digital signature 104. Definition of 'Electronic Commerce - ecommerce'

10

5. Some common applications related to electronic commerce

12

6. The different types of e-commerce

12

7. Union Information and Services Centers

14

8. Satellite in ICT 15

9. What is Cybercrime 1710 Types of Cyber crime 18

11. Law of Cyber Crime 19

12. How Can we Stay Safe 2013. Cellular phone 21-24

Page 8 of 48

14. TAX on smart phone 2615. Incoming source from ICT 3o

16. E-govt. facilities in Bangladesh 31

17. Digital police 3118. EMTS 3219. E-Tender 32

WHAT IS ICT? ICT (information and communications technology - or technologies)

is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems andso on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. ICTs are often spoken of in a particular context, such as ICTs in education, health care, or libraries. The term is somewhat more common outside of the BD.

Information and Communication Technology (ICT) is a large umbrella term that covers all the technical equipment to process and communicate information. ICT covers two aspects of information technology and communication technology. Information technology encompasses all matters relating to the processing, use as a tool, manipulation, and management of information.

Page 9 of 48

While communication technology is everything associated with the use of tools to process and transfer data from one device to another. Therefore, the information technology and communication technology are two inseparable concepts. So the Information and Communication Technology (ICT) contains the broadest sense of anyactivity related to the processing, manipulation, management, transfer of information among media.

The term ICT emerged after the combination of computer technology(both hardware and software) and communications technology in themid-20th century. The combination of both technologies are rapidly evolving beyond other technology areas. Until the beginning of the 21st century ICT continue to experience a variety of changes and have not seen the point of saturation.

There are a few milestones of technological development significantly contribute to the development of ICT to date. First, the findings of telephone by Alexander Graham Bell in 1875. The findings were then developed into communication with the wired network provision covering the entire continent of America, even then followed by the installation of transatlantic communications cable.

The telephone network is a massive infrastructure built first by humans for global communication. Entering the 20th century, precisely between the years 1910 and 1920, realized a wireless voice transmission through the first AM radio broadcasts. Wireless voice communications was also growing rapidly. Then followed by an audio-visual transmission without wires, in the form of television broadcasts in the 1940s.

The development of electronic technology, which is the forerunnerof the current ICT, get golden moments in the Cold War era. Science and technology competition between the Western bloc (United States) and Eastern Bloc (former Soviet Union) actually spur the development of electronic technology through the effortsof miniaturization of electronic circuits for controlling spacecraft and the machines of war.

Page 10 of 48

In the telecommunications and computing infrastructure the content in the form of multimedia to get the right place to thrive. Convergence of telecommunications – was multimedia computing that characterizes the 21st century, just like the 18thcentury was characterized by the industrial revolution

ICT Act prepared to provide legal recognition and security of Information and Communication Technology and rules of relevant subjects

Digital signature

A digital signature (not to be confused with a digital certificate) is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures are easily transportable, cannot be imitated by someone else, and can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.

A digital signature can be used with any kind of message, whetherit is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.

How It Works

Assume you were going to send the draft of a contract to your lawyer in another town. You want to give your lawyer the assurance that it was unchanged from what you sent and that it isreally from you.

Page 11 of 48

1. You copy-and-paste the contract (it's a short one!) into an e-mail note.

2. Using special software, you obtain a message hash (mathematical summary) of the contract.

3. You then use a private key that you have previously obtainedfrom a public-private key authority to encrypt the hash.

4. The encrypted hash becomes your digital signature of the message. (Note that it will be different each time you send a message.)

At the other end, your lawyer receives the message.

1. To make sure it's intact and from you, your lawyer makes a hash of the received message.

2. Your lawyer then uses your public key to decrypt the messagehash or summary.

3. If the hashes match, the received message is valid.

Law regarding digital signature

(a) the filing of any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in a particular manner;

(b) the issue or grant of any license, permit, sanction, approval or order by whatever name called in a particular manner;

(c) the receipt or payment of money in a particular manner;

anything contained in such law, filing, issue, grant of the document and receipt and payment of money, as the case may be, iseffected by means of prescribed electronic form.

Definition of 'Electronic Commerce - ecommerce'

Page 12 of 48

A type of business model, or segment of a larger business model, that enables a firm or individual to conduct businessover an electronic network, typically the internet. Electronic commerce operates in all four of the major marketsegments: business to business, business to consumer, consumer to consumer and consumer to business. It can be thought of as a more advanced form of mail-order purchasing through a catalog. Almost any product or service can be offered via ecommerce, from books and music to financial services and plane tickets.

The buying and selling of products and services by businesses and consumers through an electronic medium, without using any paper documents. E-commerce is widely considered the buying and sellingof products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce. E-commerce is subdivided into three categories: business to business or B2B (Cisco), business to consumer or B2C (Amazon), and consumer to consumer or C2C (eBay). also called electronic commerce.

E-commerce can be divided into 7 subsections:

E-tailing or "virtual storefronts" on websites with online catalogs, sometimes gathered Buying into a "virtual mall"

or selling on websites and/or online marketplaces The gathering and use of demographic data through web

contacts and social media Electronic data interchange, the business-to-business

exchange of data E-mail and fax and their use as media for reaching

prospective and established customers (for example, with newsletters)

Business-to-business buying and selling The security of business transactions

Some common applications related to electronic commerce are:

Page 13 of 48

Document automation in supply chain and logistics Domestic and international payment systems Enterprise content management Group buying Automated online assistants Instant messaging Newsgroups Online shopping and order tracking Online banking Online office suites Shopping cart software Teleconferencing Electronic tickets Social networking

What are the different types of e-commerce?

The major different types of e-commerce are: business-to-business (B2B); business-to-consumer (B2C); business-to-government (B2G); consumer-to-consumer (C2C); and mobile commerce (m-commerce).What is B2B e-commerce?

B2B e-commerce is simply defined as e-commerce between companies.This is the type of e-commerce that deals with relationships between and among businesses. About 80% of e-commerce is of this type, and most experts predict that B2B e-commerce will continue to grow faster than the B2C segment. The B2B market has two primary components: e-Fra structure and e-markets. E-frastructureis the architecture of B2B, primarily consisting of the following:

logistics - transportation, warehousing and distribution (e.g., Procter and Gamble);

Page 14 of 48

application service providers - deployment, hosting and management of packaged software from a central facility (e.g., Oracle and Linkshare);

outsourcing of functions in the process of e-commerce, such as Web-hosting, security and customer care solutions (e.g., outsourcing providers such as eShare, NetSales, iXL Enterprises and Universal Access);

auction solutions software for the operation and maintenanceof real-time auctions in the Internet (e.g., Moai Technologies and OpenSite Technologies);

content management software for the facilitation of Web sitecontent management and delivery (e.g., Interwoven and ProcureNet); and

Web-based commerce enablers (e.g., Commerce One, a browser-based, XML-enabled purchasing automation software).

E-markets are simply defined as Web sites where buyers and sellers interact with each other and conduct transactions.10

The more common B2B examples and best practice models are IBM, Hewlett Packard (HP), Cisco and Dell. Cisco, for instance, receives over 90% of its product orders over the Internet.

Most B2B applications are in the areas of supplier management (especially purchase order processing), inventory management (i.e., managing order-ship-bill cycles), distribution management (especially in the transmission of shipping documents), channel management (i.e., information dissemination on changes in operational conditions), and payment management (e.g., electronicpayment systems or EPS).11

eMarketer projects an increase in the share of B2B e-commerce in total global e-commerce from 79.2% in 2000 to 87% in 2004 and a consequent decrease in the share of B2C e-commerce from 20.8% in 2000 to only 13% in 2004 (Figure 3).

Page 15 of 48

Figure 3. Share of B2B and B2C E-Commerce in Total Global E-Commerce (2000 and 2004)

Figure 4. Projected B2B E-Commerce by Region, 2000-2004 ($billions)

Union Information and Services Centers

Union Information and Services Centers (UISC) are newly established one-stop service outlets operating at all 4,547 UnionParishads (UP, lowest tier of local government) of the country. Through use of ICT, UISC is able to bring various types of information related to government, livelihood and private

Page 16 of 48

services to the doorstep of citizens in rural areas. It ensures services providers and users to save time, cost and has made operations hassle free. Operating under the Public-Private-Peoples’ Partnership (PPPP) modality, these centers are run by local entrepreneurs, hosted by UPs and supported by central administration. UISCs began operations in 2009 in 30 Union Parishads (UP) throughpartnership between Local Government Division and a2i programme. The Quick Win initiative expanded rapidly culminating in a launchin all 4,501 UPs of the country on November 11, 2010 by the hon’ble Prime Minister of Bangladesh and UNDP Administrator. EachUISC is operated by two young local entrepreneurs - a male and a female – under supervision of a local advisory headed by UP Chairman. The UP provides space and utility for the center. LocalGovernment Division coordinates with Cabinet Division and Bangladesh Computer Council to establish the basic ICT setup including computers, laptops, printers, multimedia projector, digital camera, webcam and solar panel. The entrepreneurs are free to install additional facilities to support business growth,at the same time, ensuring that the social sustainability of the center is achieved by delivering government information and services. UsefulnessUISCs have enabled citizens to easily and cost effectively accesslivelihood information and services that affect their daily lives. Today, a farmer in a remote location can learn about appropriate fertilizer and pesticide use for his crops; a victim of domestic abuse can access information on legal resources; a villager can apply for land records, a migrant labourer can learnEnglish using digital resources; and unbanked people can access banking services from UISC. All these are now possible from a UISC located typically within walking distance or a few kilometers from the citizen’s home.  Government of Bangladesh declared a vision of Digital Bangladeshby 2021 to ensure services at peoples’ doorsteps. A total number of 4,501 UISCs (Union Information and Service Centres) have been established at all Union Parishads (the lowest tier of the local government) of Bangladesh. These e-Service access points are inaugurated simultaneously on 11th November, 2010 by Hon’ble

Page 17 of 48

Prime Minister of Bangladesh and UNDP’s administrator & former Prime Minister of New Zealand Ms Helen Clark in order to translate the dream of ‘Digital Bangladesh’ into reality. UISCs are the ‘e-Service delivery outlets’ which initiated a new era ininformation and service delivery for rural and marginalized people. With the aim to ensure services at citizens’ doorsteps, UISCs are offering various government services, like public examination results, online university admission, birth-death registration, agricultural & law consultancy, telemedicine, life insurance; private services, like mobile banking, English learning, computer training, email, internet browsing and so on. At present 40 lac citizens per month are receiving services countrywide. 9002 young entrepreneurs are working with 4,501 UISCs and half of them are women. Entrepreneurs are self-employedand they manage their life with their own income. Increased entrepreneurial and self-employment activities help UISCs generate a monthly average income of BDT 3 corer. These hubs of information and services at doorsteps of local people save their time, energy and money.

Today’s world is shaped by availability of Information and Communication Technology (ICT). Because global economy is poweredby technology, fueled by information and driven by knowledge. This rapid change demands a dynamic renovation in Bangladesh also. Government of Bangladesh is committed to foster the development activities through the appropriate use of ICTs, and declared a vision of ‘Digital Bangladesh’ by 2021 to ensure services at peoples’ doorsteps. Union Information & Services Centre (UISC) is ICT enabled one-stop service outlet located at Union Parishads at union (the lowest tier of the local government) level. Similar to the ‘telecenter’ concept by different private organizations, the UISC model, however, is unique in the sense that it builds on the concept of Public Private Partnership (PPP) instead of donation dependent models, and brings govt. services within reach of every citizen in terms of proximity and cost. A total number of 4,501 UISCs have been established at all Union Parishads, all of them inaugurated simultaneously on 11th November, 2010 by Hon’ble Prime Minister of Bangladesh and UNDP’s administrator & former Prime Minister of

Page 18 of 48

New Zealand Ms Helen Clark in order to translate the dream of ‘Digital Bangladesh’ into reality.

Satellite in ICT

What Is a Satellite?

A satellite is an object that moves around a larger object. Earthis a satellite because it moves around the sun. The moon is a satellite because it moves around Earth. Earth and the moon are called "natural" satellites.

But usually when someone says "satellite," they are talking abouta "man-made" satellite. Man-made satellites are machines made by people. These machines are launched into space and orbit Earth oranother body in space.

There are thousands of man-made satellites. Some take pictures ofour planet. Some take pictures of other planets, the sun and other objects. These pictures help scientists learn about Earth, the solar system and the universe. Other satellites send TV signals and phone calls around the world.

Why Are Satellites Important?

Satellites fly high in the sky, so they can see large areas of Earth at one time. Satellites also have a clear view of space. That's because they fly above Earth's clouds and air.

Before satellites, TV signals didn't go very far. TV signals onlytravel in straight lines. So they would go off into space insteadof following Earth's curve. Sometimes they would be blocked by mountains or tall buildings.

Phone calls to faraway places were also a problem. It costs a lotand it is hard to set up telephone wires over long distances or underwater.

Page 19 of 48

With satellites, TV signals and phone calls can be sent up to a satellite. The satellite can then send them back down to different spots on Earth.

What Are the Parts of a Satellite?

Satellites come in many shapes and sizes. But most have at least two parts in common - an antenna and a power source. The antenna is used to send and receive information. The power source can be a solar panel or battery. Solar panels make power by turning sunlight into electricity.

Many NASA satellites carry cameras and scientific sensors. They may gather information about Earth's land, air and water. Or theymay collect data from the solar system and universe.

What Were the First Satellites in Space?

The Soviet Union was the first to launch a satellite into space. The satellite was launched in 1957 and was called Sputnik 1.

NASA has launched many satellites into space. The first was Explorer 1 in 1958. Explorer was America's first man-made satellite. The first satellite picture of Earth came from NASA's Explorer 6 in 1959.

How Does NASA Use Satellites?

Satellites provide information about Earth's clouds, oceans, landand air. They also can observe wildfires, volcanoes and smoke. All this information helps scientists predict weather and climate. It helps farmers know what crops to plant. It helps control the spread of disease. And it helps with response to emergencies.

Page 20 of 48

Satellites also tell us a lot about space. Some watch for dangerous rays coming from the sun. Some explore stars, planets, asteroids and comets.

Satellites come in all shapes and sizes and play a variety of roles.

Weather satellites help meteorologists predict the weather or see what's happening at the moment. The Geostationary Operational Environmental Satellite (GOES) is a good example. These satellites generally contain cameras that canreturn photos of Earth's weather, either from fixed geostationary positions or from polar orbits.

Communications satellites allow telephone and data conversations to be relayed through the satellite. Typical communications satellites include Telstar and Intelsat. The most important feature of a communications satellite is the transponder -- a radio that receives a conversation at one frequency and then amplifies it and retransmits it back to Earth on another frequency. A satellite normally contains hundreds or thousands of transponders. Communications satellites are usually geosynchronous (more on that later).

Broadcast satellites broadcast television signals from one point to another (similar to communications satellites).

Scientific satellites, like the Hubble Space Telescope, perform all sorts of scientific missions. They look at everything from sunspots to gamma rays.

Navigational satellites help ships and planes navigate. The most famous are the GPS NAVSTAR satellites.

Rescue satellites respond to radio distress signals (read this page for details).

Earth observation satellites check the planet for changes ineverything from temperature to forestation to ice-sheet coverage. The most famous are the Landsat series.

Military satellites are up there, but much of the actual application information remains secret. Applications may include relaying encrypted communication, nuclear monitoring, observing enemy movements, early warning of missile launches, eavesdropping on terrestrial radio links,

Page 21 of 48

radar imaging and photography (using what are essentially large telescopes that take pictures of militarily interesting areas).

What is Cybercrime?

Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission.In other words Cybercrime is any criminal act dealing with computers and networks. Additionally, cybercrime also includes traditional crimes conducted through the Internet.

How cybercrime happens ?

Simply by connecting to the Internet we are making ourselves a potential target of criminals. Everyday, criminals use automated tools to scan for unprotected or vulnerable computers. Criminals may target us

may be the subject of a random attack. Whether a specific target or just a random attack, there are two main ways, by which our computer can be affected by cyber crime:

Our computer is used to steal our personal information: Two examples are Trojans and spyware. Trojans are a form of malware masquerading as something the user may want to download or install, that may then perform hidden or unexpected actions, suchas allowing external access to the computer. A Trojan may be usedto install spyware such as ‘key logging’ software, which records keystrokes including passwords and then forwards the ‘key logged’information to the attacker.

Our computer is used to facilitate other crimes and attacks on others: Computers can be hijacked to provide storage of illegal

Page 22 of 48

images or illegal downloads of music. Hijacked computers could also be used as a platform to launch attacks or commit crimes against others.

Types of Cyber crime

Chapter eight section 54 to 67 of the ICT Act 2006 describe the cybercrimesboth civil and criminal matters. The followings shall be treated as crime ;

- Unauthorized copying, extracting and downloading of any data, database- Introduction of virus- Damage and disruption to computer system and computer network- Denial of access to authorized person to computer- Providing assistance to make possible to commit to crime- Hacking with computer system- Tampering computer source documents- Electronic forger for the purpose of cheating and harming reputation- Using a forged Electronic record- Publication of digital signature certificate for the fraudulentpurpose- Confiscation of computer, network etc- Publication of information which is obscene in electronic form- Misrepresentation and suppressing material facts for obtaining digitalsignature certificate- Breach of confidentiality and privacy- Publishing false digital signature certificate

Law of Cyber Crime

Page 23 of 48

If any person does any crime under section 54 of the ICT Act 2006 he will begiven penalty of maximum 10 years rigorous imprisonment or fined up to 10lacks taka or for the both of above.

If any person does any crime under section 55 he will be given penalty ofmaximum 3years imprisonment or fined up to 3 lacks taka or with both.Whoever commits hacking under this act shall be punished of maximum 3 yearsimprisonment or fined up to 1 core taka or with both. Whoever commits suchcrime

under section 57 of this act shall be punished of maximum 10yearsimprisonment or fined up to 1 core taka or with both. Penalty for failureto surrender license is 6 month imprisonment or fined up to 10 thousandtaka or with both. Penalty for failure to comply with order made by thecontroller is maximum 1 years imprisonment or fined up to 1 lacks taka orwith both . Penalty for violation of the order of the controller in emergencyperiod is maximum 5 years or fined up to 5 lacks or with both. Punishment forunauthorized access to protected system is the maximum 10 years or fined upto 10 lacks or with both. Penalty for false representation and hidinginformation is maximum 2 years imprisonment or fined up to 2

Page 24 of 48

lacks or withboth .Penalty for discloser of confidentiality and privacy is

maximum 2 years imprisonment or fined up to 2 lacks or with both .Punishmentfor publishing false digital signature certificate is maximum 2 yearsimprisonment or fined up to 2 lacks or with both. Penalty for Publication ofdigital signature certificate for the fraudulent purpose is maximum 2 yearsimprisonment or fined up to 2 lacks or with both.

Section 66. Punishment for tampering with computer source documents

Whoever intentionally or knowingly conceals, destroys or alters or intentionally or knowingly causes any other person to conceal,destroy or alter any computer source code used for a computer, computer program , computer system or computer network, when the computer source code is required to be kept or maintained by any law for the time being in force, shall be punishable with imprisonment of either description for a term which may extend tothree years, or with fine which may extend to Taka two lakhs, or with both.Explanation.- For the purpose of this section, “computer source code” means the listing of program, computer commands, design andlayout and program analysis of computer resource in any form.

Section 67. Hacking with computer system

- Whoever, with the intent to cause or knowing that he is likely to cause wrongful loss or damages to the public or any other person, does any act and thereby destroys, deletes or alters any information residing in a computer resource or diminishes its

Page 25 of 48

value or utility or affects it injuriously by any means, commits the offence of “hacking”.

Section 68. Punishment for hacking

- Whoever commits hacking shall be punished with imprisonment of either description for a term which may extend to three years, orwith fine which may extend to Taka two lakhs, or with both.

Advantages of Cyber law

This Act has some disadvantages and also some advantages. This Act has provided us few advantages like as under the ICT Act, 2006, conduct important issues of security, which are so criticalto the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures thatwould be required to have been passed through a system of a security procedure, as stipulated by the government at a later date. On the other hand Companies now be able to carry out electronic commerce using the legal infrastructure provided by the Act. Subsequently this Act provided other facilities to run cyber or Information and Technology business.

However as Internet have grown in our country, the need has been felt to enact the appropriate cyber laws, which are indispensableto legalize and regulate Internet in Bangladesh. The existing laws of Bangladesh even with the most generous and moderate interpretation, could not be interpreted in the light of the promising cyberspace. We hope concern authority should take some steps to develop our existing cyber law.

How Can we Stay Safe?

Page 26 of 48

Keep your operating system updated/patched. Set it to "auto update".

Use anti-virus and anti-spyware software and keep them updated.

Do not visit un-trusted websites or follow links provided byunknown or un-trusted sources.

Secure your transactions. Look for the "lock" icon on the browser's status bar and be sure "https" appears

in the website's address bar before making an online purchase. The "s" stands for "secure" and indicates

that the communication with the webpage is encrypted. Be cautious about all communications you receive including

those purported to be from "trusted entities" and be careful when clicking links contained within those

messages. Do not respond to any unsolicited (spam) incoming e-mails. Do not open any attachments contained in suspicious emails. Do not respond to an email requesting personal information

or that ask you to "verify your information" or to "confirm your user-id and password." Beware of emails that threaten any dire consequences should

you not "verify your information". Do not enter personal information in a pop-up screen.

Providing such information may compromise your identity and increase the odds of identity theft. Have separate passwords for work related and non-work

related accounts

Recommendation :

Cyber crime is a Global issue effects, not only on our computer systems but also on the communication systems entirely .As for ICT rapidly increasing their development, Cyber crime also developing its brunches so far .But also the protecting systems

Page 27 of 48

is available all over the world .Cyber Law and its penalty is onethem performing a vast of success.

Cellular phone

A Cellular phone is a telecommunication device that users radio waves over a networked area and is served through a cell site or base station at a fixed location, enabling calls to transmit wireless over a wide range, to a fixed landline or via the internet.

In this networked system, the Cellular phone is identified as a mobile system consisting of the equipment and SIM card that actually assigns the mobile telephone number.

A Cellular phone is known as a cellphone or mobile phone or smartphone.

A smart phone is a mobile phone with highly advanced features.

A cellular phone is called a cellphone.

Types of cellular phone

Smartphones: A smartphone is considered to be the combination of the traditional PDA(personal digital assistant) and cellular phone, with a bigger focus on the cellular phone part. Smartphones allow users to store information, e-mail, instant programs, along with using a mobile phone in one device.

Conventional: Conventional phone consists o f a base unit and handset. The base unit will have a cord running from it to an outlet in the wall.

Prepaid: prepaid phones are smart choice for those who rarely usetheir cellular device . Because these phones are not tied to a monthly rate , users can spend as much or as a little as their budget.

Page 28 of 48

Unlocked: Traditional cell phones are locked, meaning they are specific service provider but Unlocked phones have no such limitations and can operate on multiple networks. Unlocked phonesare typically more expensive than network phones and are also more difficult to set up and to maintain.

Uses of Smartphone

Phones are taxed in many ways. Most countries charged value addedtax on handset. Many impose customs duties on imported phones (45.6% in Syria), $5 per handset in Bangladesh,$8 in Pakistan, and $24 in turkey as well as at on calls and sometimes additionaltelecoms specific taxes too

Scheduling In a business setting, smartphones are often used to aid

scheduling and personal organization. Smartphones are tightly coupled with existing scheduling software that lets you view, change and respond to appointments and conflicts as they arise in your schedule.

Internet Access Smartphones effectively provide Internet access at a high

level of fidelity to users on the go. Smartphones give you the capability to do a real-time check of the news, stock information and email. In addition, many smartphones have integrated Internet browsers that you can use to surf the Internet or watch videos online.

Specialty Technology Smartphones often provide enhanced technology such as a

global positioning system (GPS). Often the GPS functionalityis tightly integrated with other features of a the phone that let you quickly find your location on a map. In addition, a smartphone can give you specific directions to your destination. Multimedia

In addition to viewing videos and streaming songs from the Internet, smartphones also can act as a content management

Page 29 of 48

system for users. Smartphones allow users to download songs,pictures and videos. Smartphones typically come with camerasthat you can use to take pictures or videos of where you areand instantly share them with friends and family.

surprising uses for your old smartphone

1. A media streaming gadget and player

Load it up with your favorite songs, shows or movies and pair it with a good set of earbuds.

Your gadget can also use your home Wi-Fi to stream videos or music. Fire up Netflix or Amazon's Music service app and go to town .If your phone has an HDMI port, it can connect to your HDTV. You can use it as a media-streaming gadget in place of a Rock box or Apple TV .If you have a newer TV, check to see if theTV manufacturer has a remote control app.

2. A portable gaming unit

If you have a child or grandchild begging for a Nintendo DS or Sony Vita, your old smartphone can be better. There are hundreds of game apps to entertain them, and many of them are free.

3. A fine GPS

Your smartphone makes a fine GPS. It downloads maps to use offline and offers free turn-by-turn navigation. Google Maps can also download maps offline.

4. Kitchen recipe holder

In addition to a co-pilot, your smartphone can be your assistant chef. Load it up with some cooking apps and your favorite recipes. Fire up a recipe site and get the creative juices

Page 30 of 48

flowing. Because it's so small, -you can keep it right by the stove.

5. An alarm clock

If your gadget doesn't find a home in your kitchen or living room, bring it into the bedroom. Turn it into alarm clock with anapp like Alarm Clock Xtreme for Android .

You can keep your main smartphone somewhere else. You'll sleep better without interruptions from notifications .

6. A Wi-Fi phone

If your phone is unlocked, you can stick a prepaid SIM card into it for cheaper calls, too. You can use it to save money while traveling abroad.

Don't feel limited to just one of these ideas. The more you use your old smartphone, the less chance you have to damage your new smartphone. You can save battery life and data for more importantthings.

The Benefits of Smartphones

smartphones can do things much more quickly than their standard mobile phone and PDA precursors.

Keeping you organized - smartphone handsets can function as personal organizer’s, with electronic diaries, contact lists, andautomatic reminders.

Flexible working - as with a PDA, you can use your smartphone to take notes, review and edit your appointments,contacts and documents, all while you're on the move.

Information at your fingertips - more and more services are being made available on smartphones, from access to maps, satnav and directions to television transmissions with news coverage or weather reports to traffic information and

Page 31 of 48

scheduling alerts - which means your business can always stay one step ahead of what's going on.

Never out of touch - you can connect to the internet for e-mail and web access 'on the move', or connect to your computer network to access relevant data, wherever you are, making it easier for remote workers, or a mobile workforce to stay in touch with the business.

Better information sharing - considerably more data can be received and transmitted via a smartphone, such as large e-mail attachments or data files from websites. Previous mobiles could only manage small e-mails without attachments.

Greater functionality : Smartphones could offer you a new way of marketing to customers, Multimedia Messaging Services(MMS) lets you include animation, graphics and music in a message.

Faster communication - web access is quicker than in previously available mobiles, making it easier to access e-mail and information from the Net. Some models and carriers offer an 'always-on' internet access service making connection easier.

Business benefit of smartphone

Cell phones in general are extremely useful for salespeople, who often spend a lot of time on the road and value being able to stay in touch. Here are just a few ways that sales people can benefit from the luxury of a smartphone.

1. Find Your Way

Your phone's GPS can get you to appointments on time, even if you're in a strange city far from home. Most GPS software will even alert you of major traffic delays and find you an alternate route.

Page 32 of 48

2. Access Customer Data

Many CRMs allow you to connect from your smartphone and pull out useful data on prospects and customers. It's easy to retrieve a customer's order history or your background with a prospect, keeping you armed with vital information.

3. Last-Minute Research

While you're sitting in your car or in the lobby waiting for yourprospect to appear, you can pull out the smartphone and do some last-minute Google searching and perhaps find a new tidbits of information.

4. Schedule-Keeping

When you've got six sales appointments lined up in one day, keeping them straight can be a nightmare. Most smartphones have apps that allow you to record not only who and where, but also your notes about the impending appointment.

5. Update Social Media Accounts

Smartphones can make social media marketing a lot easier by allowing you to take a minute here or there to post updates and read comments.

6. Get Real-Time Answers

When your prospect asks a question during an appointment and you don't know the answer, it's not necessarily a stumper. A smartphone allows you to check your company website or CRM to pull up information about your products and give an immediate – and correct – answer.

7. Contacts At Your Fingertips

A smartphone makes your entire address book available to you at all times. So if you suddenly need to call your former co-worker

Page 33 of 48

from the road to provide an introduction to a new prospect, it's not a problem.

Who uses smartphones?

I see a lot of people using smartphones lately. But I wonder why people use them. I always thought smartphones are strictly for businessmen who need to use excel and word document on the go. But I see students using blackberries, and moms using palm cantors besides them.I use a Blackberry, which I suppose isn't really a smart phone, but more of a communication device, since it has BB Messenger, the awesome Blackberry e-mail system and such. I love it, because I have to communicate a lot at my job. Ican also hop on the internet and check out Google maps when I need to find a customer's house instead of buying a GPS, and do some light research if a customer's computer doesn't have Internet access.

Tax of smartphone

As if the president’s hostile takeover of the nation’s healthcaresystem weren’t bad enough, a congressional panel has revealed that smartphones, tablets and their various applications could soon be taxed under Obama care.

This may sound absurd since there appears to be no connection between Obama’s socialized healthcare system—officially known as the Affordable Care Act—and the electronic devices that may fall victim to the new government tax. Here is how it could happen; under Obama care any type of medical equipment—such as surgical tools, bedpans and heart devices—will be slapped with a new 2.3% excise tax.

Page 34 of 48

The tax was built into the Affordable Care Act as a way for the government to collect enough money to provide millions of uninsured with affordable health insurance plans. It’s all part of Obama’s bigger plan to redistribute wealth through a bloated government, though many Democrats believe the medical device tax takes things a bit too far.

In fact, a bipartisan group of U.S. senators introduced legislation a few weeks ago to repeal the medical device tax and a prominent group of Democrat senators quietly asked Senate majority leader Harry Reid to delay implementing the tax because it could negatively impact the industry and its 2 million high-skilled manufacturing jobs. A mainstream newspaper obtained the letter and posted it on its website.

This week a congressional committee reveals that the tax could beworse that previously imagined because it could also apply to electronic devices like smart phones and popular tablets. If so, the Food and Drug Administration (FDA) would use Obamacare to taxAmericans’ smartphones and tablets, according to the panel of Republicans from the House Energy and Commerce Committee.

That’s because the devices are increasingly being used to monitorchronic conditions such as diabetes and high blood pressure or health information like diet and fitness. In mid 2011 the FDA proposed regulating mobile medical apps that are used as an accessory to a medical device already regulated by the FDA or transform a mobile communications device into a regulated medicaldevice by using attachments or sensors. If this happens, the new Obamacare tax would apply to these devices.

Page 35 of 48

In a letter to FDA Commissioner Margaret Hamburg lawmakers on theenergy committee ask the agency to clarify the uncertainty surrounding mobile medical applications and how they will be regulated. They also request that the FDA reveal any discussions or analysis related to the effects of the medical device tax on smartphones and tablets and how many mobile medical apps have sought FDA approval before entering the market.

SIM card taxes

The sim card tax of tk. 800 per connection of each new subscriberis the single largest obstacle to the acquisition of new subscribers, consisting a major barrier to growth and blocking new investment in update mobile networks.

Govt. to Tax Smartphones

TEMPO.CO, Jakarta - Smartphone will likely be more expensive as the government began assessing to impose Income Tax for LuxuriousGoods on it. the Administrator at Fiscal Policy Agency, said thatthere is no certain announcement yet about the tax on smartphone." tax on smartphones were meant to reduce import.

The policy sets to kick off despite the fact that smartphone import decreased this year, compared to 2012. The Trade Ministry noted that smartphone import reached US$927.6 millions in the first five months in 2013, dropping 17.22 percent from last year's amount.

The government is reviving an idea to impose luxury goods sales taxes on cell phones in a move to spur growth in the domestic industry.

Page 36 of 48

Import taxes on consumption goods, which were raised last month from 2.5 percent to 7.5 percent, had so far been considered sufficient to help grow the local cell phone industry, Hidayat added.

If the luxury tax proposal is accepted, the 20 percent tax will affect smartphones that are priced above Rp 5 million (US$441.56)per unit. At present, domestic manufacturers mostly make medium- and low-end cell phones and source a wide array of components through imports.

The idea of charging the luxury goods sales tax first emerged last year, but was turned down over concerns of illegally-imported cell phones potential flooding the domestic market.

In early 2012, the government stepped up its fight against illegal imports by requiring importers to register with the TradeMinistry, which is set to issue import licenses.

Last month, the government also increased import taxes on consumption goods, including cell phones, as it struggled to pushdown the current-account deficit that has resulted from widening trade deficit.

Indonesia, with Southeast Asia’s largest economy and a populationof more than 240 million, is one of the world’s biggest and most promising cell phone markets. The number of subscriber identification module (SIM) cards sold nationwide exceeded 120 percent of the total population as of 2012.

Sales of high-end cell phones totaled around 8.25 million units, representing 15 percent of overall cell phones sold across the country. Imports of smartphones reached a value of approximately $3 billion last year.The new tax may lower annual imports by $1.8billion, according to local media reports.

Page 37 of 48

Distributors and importers of cell phones expressed mixed views over the government’s plan to place the 20 percent tariff on smartphones. Chairman of the Cell Phone Dealers and Importers Association (Aspiteg), Alie Cendrawan, supported the plan, sayingthat the measure would be effective in accelerating expansion in the domestic cell phone industry by pulling in investment.

“For several years, some investors have expressed their interest in setting up facilities in Indonesia but, until now, none [of the plans] have been realized,” Alie told The Jakarta Post. “Investment will bring significant multiplier effects, particularly job creation, and even create opportunities for us to export locally-made cell phones,” he added.

Advisory to Embassy,High Commissions and InternationalOrganization regarding VAT refund

To grant facility of VAT exemption/refund to High Commission ofthe Republic of Malawi in favour of official purchases as well aspersonal purchases of its diplomats and Mahatma Gandhi Instituteof Education for Peace and Sustainable Development (MGIEP) in NewDelhi on purchase of goods

Advisory to Embassy,High Commissions and InternationalOrganization regarding VAT refund CENVAT Credit (Fifth Amendment)Rules, 2014

Whether the goods transferred i.e. religious pictures not for useas calendar is tax free being covered by entry 45 Schedule I ofDVAT Act?

Whether the goods transferred i.e. religious pictures not for useas calendar is tax free being covered by entry 45 Schedule I ofDVAT Act?

Page 38 of 48

Delegation of Power Vested in Commissioner(VAT)

Goa offers to refund VAT on ATF to attract more airlines

Delhi Value Added Tax(Amendment)Rules,2014

The Importance Of Cell Phones In Modern Society

Cell phones have become a necessity for many people throughout the world. The ability to keep in touch with family, business associates, and access to email are only a few of the reasons forthe increasing importance of cell phones. Today's technically advanced cell phones are capable of not only receiving and placing phone calls, but storing data, taking pictures, and can even be used as walkie talkies, to name just a few of the available options.

Cell phones are the perfect way to stay connected with others andprovide the user with a sense of security. In the event of emergency, having a cell phone can allow help to reach you quickly and could possibly save lives. However, the importance ofcell phones goes way beyond personal safety. Modern cell phones are capable of internet access, sending and receiving photos and files, and some cell phones are equipped with GPS technology, allowing for use in most locations around the world and allowing the cell phone to be found or the user located in the event of loss or emergency.

Cell phone users can instantly send data to the home or office, check for important email, use their cell phone as a PDA or calendar, and store photos which can be easily transferred to a PC or laptop computer.

Cell phone manufacturers have produced a wide range of cell phones, which sell for prices that range from very inexpensive toover one thousand dollars. The available options give users the choice of purchasing a basic cell phone to use simply for making

Page 39 of 48

calls, or choosing a complex, technologically advanced cell phonethat can perform as many or even more tasks that a home computer.

The importance of cell phones has increased the competition in the wireless service provider industry, making cell phones very affordable and very easy to use. Cell phones have become almost astatus symbol in addition to the convenience and security that comes from owning them.

Problems We love our music apps, and the smartphones that made it commonplace to carry around advanced, diverse music functionality, rather than relying on a "dumb" iPod or waiting until you get back to your computer to try the cool stuff.

However, phones are getting in the way of apps.

If you use music apps, you know the following routine :

Pick up your phone.

Turn it on.

Type in the security code

A) Swipe the screen until the app shows up; or B) search for the app, if you have tons of apps installed and don't know where eachone lives.

Run the app, probably waiting a few seconds to for it to fire up.Maybe you have to sign in, too.

Click the Down arrow or the Skip button.

Collect the shards of your shattered pancake reverie.

This is not cool. On grandpa's CD player, skipping a song took about a second, and involved pressing exactly one button on a remote control.

Page 40 of 48

Well, it is progress in a sense, because the whole point is that we now have instant access to way more music than a CD could everhold. But as a physical interface between human and music, the smartphone might actually be considered a big step back, because they're designed to do everything.

Incoming source from ICT

FIVERR

Fiverr is among top trusted online earning sites. One can join free and advertise his services. The main theme of fiverr is thateverything is for 5 dollars. When one will join fiverr to earn money and list his ad, the buyer will pay $5 and he will get $4 (fiverr cuts $1 charge).

Now for many $4 is a small amount, but it adds up when one complete more tasks. Also fiverr has some extras that you can sell for $10-$20. Fiverr is the top earning site simply because the ease of use. This is a marketplace where you can sell anything even singging, dancing , pranks , and even funny stuff. Even students can join and make money online with Fiverr.

ODESK

Odesk is my favorite online earning site as a freelancer. It isjust like the marketplace like fiverr but it is a bit serious andpays a lot more. Buyers from USA, UK and all around the worldlook for cheap labor from countries like India , Pakistan ,Bangladesh and other countries to get the job done.

Mainly the buyer post a job while the freelancer will apply forthe jobs. Then when he gets the job, he will be paid per hour onproject based. He will get money on per working hour. Peopleusually get paid $4-$6 per hour. And some experienced people can

Page 41 of 48

earnaround $10. That’s about 800 BDT per hour and that’sfantastic.

If someone looking for genuine online earning sites then he doesn’t have tolook further, odesk is the place for him to be. But in order to get jobs and become successful and be able to earn a good amount , he will need to do some hardwork. His job will be mostly building the profile, taking tests and applyingto jobs. But if he becomes patient and approach professionally, he will get his dream career.

GOOGLE ADSENSE

If someone is looking for trusted online earning sites then google is the one he can trust. But earning online through ad sense os not easy and it generates slow income. However the good thing is that you can earn passive. It means you can earn when you sleep. To earn money using ad sense one will need at least a blog website. Google offers free blogs from blogger.com. Registera blog and start writing.

Then once he has built a blog with a good quality articles and started to see visitors coming, then apply for ad sense and put the ad code in his site. When people click on his ads, he will make money. AdSense will send you a check when your earnings havereached $100. From experience, earning online through ad sense with 1 site is slow. If someone has more sites with large number of views he can earn faster.

AMAZON

Amazon is a leading e-commerce store. They have their own affiliate program. This means if you help them sell some products, you will earn commission. This online earnings site is free to join. Sign p for an amazon affiliate account and put the related product widgets on your website. Just like ad sense you will need a blog or website. However you will not need amazon’s

Page 42 of 48

approval to host the products .In absence it will take a lot of visitors to generate ad clicks and then earn a decent amount. In amazon affiliate marketing you can have a limited number of targeted visitors who will purchase your item and then earn you acommission. Your blog and the ads should be related. If you blog about table lamps as the ads.

E-govt. facilities in Bangladesh

DIGITAL POLICE

The Bangladesh Police is the main law enforcement agency of

Bangladesh to provide service to all citizens and make Bangladesh

a better and safer place to live and work. It also uphold the

rule of law, ensures safety and security of citizens, prevents

and detect crime, brings offenders to justice and maintains peace

and public order. It is administered by the central interior

ministry of the Government of Bangladesh. Outside the

Dhaka capital region and other major cities, police is organised

at the district and thana levels. Raised in 1976, the Dhaka

Metropolitan Police is charged with maintaining security and

order in the national capital and largest city

Page 43 of 48

Bangladesh govt. has start a digital policing system in UTTARA to

serve people.

The specialty of the branch are

Well trained

Well qualified

Special motor cycle and ambulance

Reach the spot within short time

Online service

To monitoring the area with CCTV

Special application made with the help of BUET

What is EMTS?

The regular paper based money order service of the post office seemed a time consuming, expensive and inefficient approach of remit money to any part of the country. There was a demand for quick transfer of money to locations where the beneficiary can collect and use it instantly. With this perspective in view, Bangladesh Post launched a new money order service named Electronic Money Transfer Service (EMTS), commonly known as Mobile Money Order Service. This fulfilled the expectations of people to remit the desired amount of money to their near and dear ones so as to utilize when they need. This is mobile as well as web based remittance service available in all important post offices of the country. The sender can send the money within a minute and recipient/beneficiary can collect it

Page 44 of 48

instantly. Both sender and recipient get confirmation of the remittance and disbursement as soon as it is made in their mobile phones.

Area Coverage :

This service is available in all important post offices of the country. Presently 2750 post offices provide the EMTS which is covering all district, upazilla/thana and important/busy rural post office locations. Every month hundreds of post officials are being trained and the service is expanded to those locations.

EMTS Tools/Devices:

Bangladesh Post maintains a server and call center to monitor and support the service. All Electronic Money Transfer Service locations (post offices) are equipped with computer, internet connectivity and/or mobile phones which are used to send the issue or payment request to the server.

Procedure:The sender goes to the post office and fills up an issue form (EMO -1) giving required information like sender name,address, mobile phone number, recipient's name, address mobile phone number, amount of money to be sent etc. The post office staff sends the information to the central server through the computer or official EMTS mobile phone. When the request is accepted and confirmed by the server through issuing SMS generating a 16 digit unique PIN to senders mobile phone and a separate confirmation message issent to issuing post office. The sender shall inform the recipient to collect the money from his/her nearest post office. The recipient goes to the post office and again fill up the disburse form (EMO-2) and claim the money showing the PIN. The post office counter operator verifies the information given by the recipient from server with those used earlier by sender; if everything is match the disbursement procedure is made. As soon as the disbursement

Page 45 of 48

is completed the sender is again confirmed by another SMS generated by the server.

E-TENDER

An internet based process wherein the complete tendering process; from advertising to receiving and submitting tender-related information are done online. This enables firms to be more efficient as paper-based transactions are reduced or eliminated, facilitating for a more speedy exchange of information.

THE BENEFITS OF E-TENDER

Structure best practice process for consistency Security , Audit trails and high availability

infrastructure Eliminate postal , printing, and storage cost Electronic approach support sustainability agendas Structure process and online questionnaires help you

achieve compliant responses Asses your project at any time anywhere in the world

Page 46 of 48

Reference

Bangladesh ICT act 2006 Union porishad information and service center

(http://a2i.pmo.gov.bd/content/union-information-and-service-centres-uisc)

Smart phone (http://cellphones.about.com/od/smartphonebasics/a/what_is_smart.htm )

Page 47 of 48

Satellite

(http://en.wikipedia.org/wiki/Satellite )

Incoming source from ICT(file:///C:/Documents%20and%20Settings/Intel/My%20Documents/Downloads/4258-6321-1-PB.pdf )

E-Govt(http://www.mopa.gov.bd/)

Page 48 of 48