BANGLADESHWomen’s rights, gender and ICTs in BangladeshBytes for All BangladeshPartha Sarker, Munir Hasan, Razina Akhterand Sanzida Sakirwww.bytesforall.orgIntroductionBangladesh has witnessed a tremendous growthin mobile and internet connectivity in the last fewyears. Today it has more than 100 million mobilephone subscribers and more than 33 million internetusers. 1 An estimated 95% of users connect tothe internet through mobile phones and the rest usebroadband internet from different internet serviceproviders. 2 However, the total number of desktopusers is likely bigger, as a single connection is usedby many people.These data do not classify usage information,for instance, according to nature of usage or gender-basedparticipation in online activities. Butit is clear that the growth of internet penetrationhas expanded social media access and usage inthe country. There are about 3.8 million Facebookusers from Bangladesh, out of which close to onemillion are female users. 3 There is no way of knowinghow many of these Facebook accounts havebeen set up using fake IDs. Dutch Bangla BankLimited reported that at least 15% of their mobilebanking users are female, while according to datafrom oDesk on freelance IT professionals, as of thefourth quarter of 2012, 1,200 of 30,000 registeredusers were female.G&R Ad Network 4 conducted an interestingresearch study into how users within the countryand abroad browse the web. Users tend to accessthe web on three separate occasions throughoutthe day, with usage peaking during the morninghours. Usage of social networks and email servicesaccount for a considerable portion of web activity,followed by web browsing.1 Bangladesh Telecom Regulatory Commission (BTRC) www.btrc.gov.bd2 www.theindependentbd.com/index.php?option=com_content&view=article&id=171715:33-million-internet-users-in-bangladesh&catid=132:backpage&Itemid=1223 www.internetworldstats.com/asia.htm and www.btrc.gov.bd4 foursquare.com/v/gr-ad-network/4d3e932ffb4c548167f9e614Policy and political backgroundViolence, harassment and infringement of privacywere ongoing problems in society, but the advent oftechnologies has made them more penetrating anddifficult to stop. Even though Article 43 of the Bangladeshconstitution states, “Every citizen shall havethe right, subject to any reasonable restrictions imposedby law in the interests of the security of theState, public order, public morality or public health,to be secured in his home against entry, search andseizure; and to the privacy of his correspondence andother means of communication,” there is no comprehensivepolicy to protect privacy in Bangladesh.In 2009, a revision of the ICT Policy, designedprimarily to support ICT development in the country,focused on gender as a cross-cutting theme fora number of areas. In order to create social equity,it promotes “mainstreaming social advancementopportunities for disadvantaged groups as an immediatepriority to minimize economic disparityand bridge the digital divide for (a) lower incomegroups, (b) ethnic minorities, (c) women, and (d)persons with disabilities and special needs.” It alsorefers to establishing women’s e‐commerce centresto expand market access in order to promotewomen-led micro-enterprises. Action items 174and 175 of the revised ICT policy suggest that thegovernment should work to increase enrolment offemale students in ICT courses and foster a gradualincrease of the female workforce in the ICT industry.The ICT Act of 2006 is probably the first comprehensivelegislation to deal with online harassment,cyber stalking, etc. and provides a framework todefine and penalise these crimes. Article 54 of theact defines a range of cyber crime offences, includingthe downloading, copying or extraction, withoutthe permission of the owner, of any data, computerdatabase or information from a computer, computersystem or computer network, including informationor data held or stored in any removable storage medium;and generating or causing the generation ofspam or sending unwanted email without the permissionof the sender or receiver for the purpose ofadvertising goods or services.Article 57 of the act refers to the penalty for publishingfalse, obscene or defamatory information inelectronic form:70 / Global Information Society Watch
(1) If any person deliberately publishes or transmitsor causes to be published or transmittedin the website or in electronic form any materialwhich is fake and obscene or its effect is such asto tend to deprave and corrupt persons who arelikely, having regard to all relevant circumstances,to read, see or hear the matter contained orembodied in it, or causes to deteriorate or createspossibility to deteriorate law and order,prejudice the image of the State or person orcauses to hurt or may hurt religious belief or instigateagainst any person or organization, thenthis activity will be regarded as an offence.(2) Whoever commits offence under sub-section(1) of this section shall be punishable with imprisonmentfor a term which may extend to tenyears and with a fine which may extend to Takaone crore (USD 1.3 million approximately).Section 68 of the ICT Act 2006 also states that thegovernment must establish one or more cyber tribunalsto ensure the speedy and effective disposal ofcases under the act, that the tribunal should try onlythe offences under the act, and that the governmentcan determine the local jurisdiction of the tribunal. 5The Pornography Control Act of 2012 6 bans theproduction, transportation and marketing of anykind of pornographic material. It establishes that ifa person produces pornography using a child, andprints, distributes and publishes such material, orsells, supplies or exhibits child pornography, he/she will be punished with up to 10 years of rigorousimprisonment and a fine of up to BDT 500,000 (USD6,500). The law also provides for seven years of rigorousimprisonment and a fine of up to BDT 200,000(USD 3,000) for producing any pornography or forcingor luring any man, woman or child into joiningpornography and taking pictures, video or film withor without their knowledge. 7The cabinet has recently approved a draftamendment to the Information and CommunicationTechnology Ordinance which increases the punishmentfor any violation of the law to 14 years ofimprisonment. This proposed amendment will nowconsider destroying information with maliciousintent, transfer of data without proper authority,hacking, and the release of vulgar and defaming informationin the electronic media as offences underthis law.5 www.icnl.org/research/library/files/Bangladesh/comm2006.pdf6 phys.org/news/2013-02-bangladesh-tribunal-cyber-criminals.html#jCp7 phys.org/news/2013-02-bangladesh-tribunal-cyber-criminals.html#jCpAnalysisThere are numerous stories and incidents of onlineharassment and privacy and security breacheswhere women are primarily the main victims. Manyof these stories are documented in Bangladeshnews media but many remain unreported, mostlydue to social stigma, exclusion and other formsof social harassment. In February 2013, when thegovernment of Bangladesh established a fast-trackcourt to deal with cyber crimes, Rahman Khan,an assistant director of the Bangladesh TelecomRegulatory Commission (BTRC), told AFP, “We arereceiving a growing number of complaints aboutabuse and harassment using fake Facebook IDs,doctoring photos, filming porno footage with mobilephones and posting them on websites, andhacking of websites.” The BTRC set up a taskforceto deal with cyber crimes last year and it was“overwhelmed with thousands of complaints,” headded. 8Here we present some sample stories of genderbased online violence and harassments. Althoughthe names of the victims have been changed to protecttheir identity, these stories are true, collectedfrom several sources. 9Shumona Sharmin was forced to close a Facebookaccount that she had been using after shefound a number of indecent messages personallyaddressed to her on her wall. She had no other optionbut to close the account.Another female Facebook user, Irene Akhter,married her classmate after a long affair. Soon aftertheir marriage, they became estranged. Her husband,a vindictive man, posted indecent pictures ofher on the internet in retaliation. After the incident,she suffered a mental collapse. Having being rejectedby her own family, Irene now lives alone.Nasrin Akhter is a garment worker. She had developedan affair with a young man who raped herone day, taking advantage of their relationship. Shewas not aware that the rape incident was taped. Therapist then distributed it among his friends and acquaintances,causing great humiliation to her andher family.Mrs. Huq received a missed call from an unknownperson. She called back to tell the caller thatit was not the mobile phone of the person he wastrying to reach. In spite of this, the caller continuedto bother her with missed calls. Mrs. Huq’s daughterblacklisted the number for her, but the unknown8 www.bangkokpost.com/tech/computer/334858/bangladesh-formstribunal-to-try-cyber-criminals9 www.newsnetwork-bd.org/cyber-crimes-up-against-women-inbangladesh71 / Global Information Society Watch
- Page 5 and 6:
Costa Rica . . . . . . . . . . . .
- Page 7:
IntroductionJoanne SandlerGender at
- Page 10 and 11:
excluded. 9 And while recent data n
- Page 12 and 13:
ox 1In February 2009, intimate pict
- Page 14 and 15:
egime, increasing surveillance of t
- Page 16 and 17:
Accessing infrastructureMariama Dee
- Page 18 and 19:
figure 2.Share of individuals with
- Page 20 and 21: figure 4.Share of where internet wa
- Page 22 and 23: figure 7.Main reasons why individua
- Page 24 and 25: A digital postcard urging people to
- Page 26 and 27: and set the scene for a new point o
- Page 28 and 29: activity, exhorting citizens to exe
- Page 30 and 31: to citizens. 30 The situated experi
- Page 32 and 33: Sexuality and the internetBruno Zil
- Page 34 and 35: ally exclusive. Commercial sex is a
- Page 36 and 37: Sometimes, strangers they meet onli
- Page 38 and 39: Violence against women onlineJan Mo
- Page 40 and 41: elated forms of VAW have become par
- Page 42 and 43: Men often feel that they own their
- Page 45 and 46: ConclusionAs Daroczi, Shevchenko, R
- Page 47 and 48: Online disobedienceNadine MoawadAss
- Page 49 and 50: mapping platform for sexual harassm
- Page 51 and 52: 1800 1850 1900Maria Gaetana Agnesi(
- Page 53 and 54: TodaySusan KareCreated the icons an
- Page 55 and 56: Whose internet is it anyway?Shaping
- Page 57 and 58: academic groundwork is needed, both
- Page 59 and 60: empowered and disempowered by them.
- Page 61 and 62: Whose internet is it anyway?Shaping
- Page 63 and 64: Country reports
- Page 65 and 66: P is for PIN: “The website works
- Page 67 and 68: Crime of Trafficking, 9 which recei
- Page 69: Role of ICTs in the trafficking of
- Page 73 and 74: BOLIVIAPreventing digital violence
- Page 75 and 76: Due to the popularity and widesprea
- Page 77 and 78: a position of privilege.” 7 It be
- Page 79 and 80: the councils that the spaces alone
- Page 81 and 82: gradually become the primary field
- Page 83 and 84: Sexuality in Communist Bulgaria”,
- Page 85 and 86: • Of the five MPCTs selected, two
- Page 87 and 88: • MPCT managers should regularly
- Page 89 and 90: protest movement that has gained si
- Page 91 and 92: to arise as to the evolving nature
- Page 93 and 94: CHINAMicroblogs: An alternative, if
- Page 95 and 96: domestic violence, and the exacting
- Page 97 and 98: colombiaWomen’s rights, gender an
- Page 99 and 100: • Women activists and human right
- Page 101 and 102: CONGO, democratic republic ofOnline
- Page 103 and 104: CONGO, REPUBLIC OFWomen’s rights
- Page 105 and 106: The different uses of ICTs for wome
- Page 107 and 108: cook islandsBalancing leadership: A
- Page 109 and 110: and the Netherlands (38.7%). Of the
- Page 111 and 112: costa ricaThe ICT sector requires t
- Page 113 and 114: côte d’ivoireYasmina Ouégnin: A
- Page 115 and 116: family expenses according to their
- Page 117 and 118: was any kind of consultation before
- Page 119 and 120: violence and violence against women
- Page 121 and 122:
Write Me In is a series of digital
- Page 123 and 124:
Online protests over “virginity t
- Page 125 and 126:
ethiopiaEmpowering women through IC
- Page 127 and 128:
the exchange take as much as 80% of
- Page 129 and 130:
indiaThe internet as a pathway for
- Page 131 and 132:
Using ICTs in support of women’s
- Page 133 and 134:
• Develop gender-sensitive techni
- Page 135 and 136:
The skill of using modern technolog
- Page 137 and 138:
However, non-official surveys indic
- Page 139 and 140:
iraqICTs and the fight against fema
- Page 141 and 142:
multimedia presentations in their v
- Page 143 and 144:
Both these groups emerged from the
- Page 145 and 146:
Action stepsPaestum 2013Just before
- Page 147 and 148:
in 2009. The Dunn et al. study foun
- Page 149 and 150:
end of the ICT spectrum, reflecting
- Page 151 and 152:
japanDealing with the backlash: Pro
- Page 153 and 154:
Akiko and teacher Nomaki Masako (wh
- Page 155 and 156:
Access to ICTs helps in the fulfilm
- Page 157 and 158:
ut the case was ultimately dismisse
- Page 159 and 160:
kenyaWomen and cyber crime in Kenya
- Page 161 and 162:
huge online following. Known as an
- Page 163 and 164:
Action steps• Lobby to have onlin
- Page 165 and 166:
For example, although the abovement
- Page 167 and 168:
In addition to the cases mentioned
- Page 169 and 170:
Two years later, when facing a simi
- Page 171 and 172:
NEPALPerspectives of Nepali women i
- Page 173 and 174:
Table 2.Women in technical position
- Page 175 and 176:
NetherlandsInternet, information an
- Page 177 and 178:
procure a safe medical abortion. Th
- Page 179 and 180:
NEW ZEALANDProposed new laws and th
- Page 181 and 182:
world. The gender inequalities play
- Page 183 and 184:
NIGERIAThe use of ICTs to express p
- Page 185 and 186:
the issue in the public eye until p
- Page 187 and 188:
PAKISTANShaping ICTs in Pakistan us
- Page 189 and 190:
with Pakistan’s internet ranking
- Page 191 and 192:
PERUWomen against violence: Using t
- Page 193:
een delays in the judicial response
- Page 197 and 198:
infrastructure, clear processes and
- Page 199 and 200:
employment. While science courses a
- Page 201 and 202:
One of the protesting organisations
- Page 203 and 204:
county libraries have been trained
- Page 205 and 206:
trained to be accustomed to gatheri
- Page 207 and 208:
ConclusionThe government of Rwanda
- Page 209 and 210:
a threat to the South African publi
- Page 211 and 212:
spainShaping the internet: Women’
- Page 213 and 214:
and up to 23% to 25% in industrial
- Page 215 and 216:
Economic activityAt the end of the
- Page 217 and 218:
Action stepsSwitzerland has ratifie
- Page 219 and 220:
• Conducting social campaigns and
- Page 221 and 222:
gender equality in the new constitu
- Page 223 and 224:
inheritance rights. However, in man
- Page 225 and 226:
thailandThai cyber sexuality: Liber
- Page 227 and 228:
Table 1.Selected examples of online
- Page 229 and 230:
ugandaUsing ICTs to create awarenes
- Page 231 and 232:
united statesThe flame war on women
- Page 233 and 234:
Council that addresses online haras
- Page 235 and 236:
Because of this the DWU became cons
- Page 237 and 238:
venezuelaICT and gender violence in
- Page 239 and 240:
company PDVSA 41 (2), the National
- Page 241:
This image from Pakistan captures t