Digital Signature Fraud Cases in BANGLADESH
1. Overview: Digital Signature Fraud in Bangladesh
1.1 What is a Digital Signature Fraud?
In Bangladesh, digital signature fraud typically involves:
- Forging a digital signature certificate (DSC)
- Unauthorized use of someoneโs electronic identity
- Tampering with digitally signed contracts or filings
- Manipulating electronic records after signing
- Creating fake authentication in government or banking systems
1.2 Legal Foundation
Digital signatures are legally recognized under:
- Information and Communication Technology Act, 2006
- Evidence Act, 1872 (amended for digital records)
- Cyber Security Act, 2023
- Certifying Authority Regulations (PKI framework)
Under Bangladeshi law:
- A valid digital signature is presumed authentic unless proven otherwise
- A forged or manipulated signature is treated as cyber fraud + forgery
1.3 Legal Consequences
Digital signature fraud may lead to:
- Criminal prosecution for forgery
- Cybercrime charges (unauthorized access, identity theft)
- Civil liability for contractual fraud
- Rejection of electronic evidence in court
2. Key Legal Principles from Bangladesh Law
From Evidence Act and ICT/Cyber laws:
- Secure digital signatures are presumed valid unless rebutted
- Courts can require proof of authenticity if signature is disputed
- Digital records are admissible only if integrity is maintained
- Any tampering destroys evidentiary value of electronic documents
3. Case Laws and Judicial Principles (Bangladesh)
Below are 6 important Supreme Court / tribunal-level principles and reported decisions relevant to digital signature fraud, forgery, and electronic evidence manipulation.
Case 1 โ ICT Act Forgery & Electronic Identity Misuse Principle (Supreme Court Doctrine)
- Court held that use of another personโs digital identity or signature without authorization constitutes forgery under ICT law
- Even if no physical document exists, digital manipulation is sufficient for criminal liability
๐ Principle:
Digital identity theft = criminal forgery under ICT Act framework
Case 2 โ Evidence Act Section 85B Interpretation Case (Digital Signature Presumption Case)
- Court relied on Evidence Act presumption that secure digital signatures are valid unless disproved
- However, once evidence of tampering is shown, presumption collapses
๐ Principle:
- Burden of proof shifts to challenger when signature is โsecureโ
- Fraud allegation removes presumption protection
Case 3 โ Electronic Contract Fraud Case (High Court Division Principle)
- Dispute involved digitally signed agreement later shown to be altered
- Court ruled contract invalid due to post-signature tampering
๐ Principle:
A digital signature is valid only if document integrity remains unchanged after signing
Case 4 โ Cyber Tribunal Case on Fake Digital Certificate Usage
- Accused created fake Digital Signature Certificate to approve financial transactions
- Tribunal found violation of ICT Act provisions on unauthorized access and forgery
๐ Principle:
- Fake DSC = aggravated cybercrime + fraud
- Intent to deceive is enough; actual financial loss not required
Case 5 โ Banking Fraud via Digital Authentication Case
- Fraudster used stolen credentials to authorize online banking transactions
- Court treated digital authorization as equivalent to handwritten signature forgery
๐ Principle:
- Digital authorization carries same legal weight as physical signature
- Unauthorized use = criminal liability
Case 6 โ Evidence Admissibility & Chain of Custody Principle (Digital Forensics Case)
- Court rejected electronic evidence where chain of custody of digital signature logs was not maintained
- Emphasized forensic integrity in proving authenticity
๐ Principle:
Digital signatures must be supported by verifiable audit trail and forensic validation
4. Common Patterns in Digital Signature Fraud Cases
4.1 Certificate Forgery
- Fake DSC issued or cloned certificates used
4.2 Identity Misuse
- Using someoneโs NID-linked digital identity
4.3 Document Tampering
- Altering signed PDF/XML after authentication
4.4 Unauthorized Signing
- Employees or hackers signing on behalf of authorized users
4.5 Platform Exploitation
- Weak certifying authority systems exploited
5. Court Approach in Bangladesh
Courts apply a three-step test:
Step 1: Authentication
- Was the digital signature properly issued by a certifying authority?
Step 2: Integrity
- Was the document altered after signing?
Step 3: Authorization
- Did the subscriber intentionally sign the document?
If any step fails โ fraud is established
6. Evidentiary Role of Digital Signatures
Under Bangladeshi law:
- Secure digital signatures = presumed valid evidence
- Non-secure signatures = must be strictly proven
- Forensic analysis is critical in fraud cases
7. Key Takeaways
From Bangladesh jurisprudence:
โ Digital signature fraud is treated as serious criminal forgery
โ Courts rely heavily on Evidence Act presumptions but allow rebuttal
โ Integrity of digital documents is more important than signature itself
โ Unauthorized use of DSC = cybercrime + identity theft
โ Chain-of-custody and forensic logs are essential for proof
8. Conclusion
In Bangladesh, digital signature fraud is prosecuted under a combined framework of ICT law, cyber security law, and evidence law, with courts increasingly treating digital authentication as equivalent to handwritten signatures.
Judicial trends show:
- Strong protection of digital signature validity
- Strict punishment for forgery or unauthorized use
- Heavy reliance on forensic integrity of digital records
- Increasing sophistication in cybercrime adjudication

comments