Skip to main content

Featured post

āĻ­ā§Ÿā§‡āĻ° āĻĻā§‡āĻļā§‡, āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻžāĻ° āĻĒā§āĻ°āĻļā§āĻ¨: āĻāĻ• āĻ—āĻ­ā§€āĻ° āĻŦāĻŋāĻļā§āĻ˛ā§‡āĻˇāĻŖ

āĻ­ā§Ÿā§‡āĻ° āĻĻā§‡āĻļā§‡, āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻžāĻ° āĻĒā§āĻ°āĻļā§āĻ¨: āĻāĻ• āĻ—āĻ­ā§€āĻ° āĻŦāĻŋāĻļā§āĻ˛ā§‡āĻˇāĻŖ āĻ­ā§Ÿā§‡āĻ° āĻĻā§‡āĻļā§‡, āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻžāĻ° āĻĒā§āĻ°āĻļā§āĻ¨: āĻāĻ• āĻ—āĻ­ā§€āĻ° āĻŦāĻŋāĻļā§āĻ˛ā§‡āĻˇāĻŖ āĻ˛ā§‡āĻ–āĻ•: āĻ†āĻĢāĻœāĻžāĻ˛ āĻšā§‹āĻ¸ā§‡āĻ¨ āĻŽāĻ¨ā§āĻĄāĻ˛ | āĻĒā§āĻ°āĻ•āĻžāĻļā§‡āĻ° āĻ¤āĻžāĻ°āĻŋāĻ–: ā§¨ā§Ģ āĻŽāĻžāĻ°ā§āĻš ā§¨ā§Ļā§¨ā§Ģ āĻ­ā§‚āĻŽāĻŋāĻ•āĻž āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻŽāĻžāĻ¨ā§āĻˇā§‡āĻ° āĻ…āĻ¨ā§āĻ¯āĻ¤āĻŽ āĻŽā§ŒāĻ˛āĻŋāĻ• āĻ…āĻ§āĻŋāĻ•āĻžāĻ°āĨ¤ āĻ•āĻŋāĻ¨ā§āĻ¤ā§ āĻŦāĻ°ā§āĻ¤āĻŽāĻžāĻ¨ āĻŦāĻŋāĻļā§āĻŦ, āĻŦāĻŋāĻļā§‡āĻˇ āĻ•āĻ°ā§‡ āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļā§‡ āĻ¨āĻ—āĻ° āĻœā§€āĻŦāĻ¨ā§‡ āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻžāĻšā§€āĻ¨āĻ¤āĻž āĻāĻ•āĻŸāĻŋ āĻ‰āĻĻā§āĻŦā§‡āĻ—āĻœāĻ¨āĻ• āĻŦāĻŋāĻˇā§Ÿ āĻšā§Ÿā§‡ āĻĻāĻžāĻā§œāĻŋā§Ÿā§‡āĻ›ā§‡āĨ¤ āĻĻāĻŋāĻ¨ āĻĻāĻŋāĻ¨ āĻŦāĻžā§œāĻ›ā§‡ āĻ›āĻŋāĻ¨āĻ¤āĻžāĻ‡, āĻĄāĻžāĻ•āĻžāĻ¤āĻŋ, āĻšāĻžāĻāĻĻāĻžāĻŦāĻžāĻœāĻŋ, āĻ¸āĻžāĻ‡āĻŦāĻžāĻ° āĻ…āĻĒāĻ°āĻžāĻ§ āĻāĻŦāĻ‚ āĻŦāĻŋāĻ­āĻŋāĻ¨ā§āĻ¨ āĻ§āĻ°āĻ¨ā§‡āĻ° āĻ¸āĻšāĻŋāĻ‚āĻ¸āĻ¤āĻžāĨ¤ āĻ āĻĒāĻ°āĻŋāĻ¸ā§āĻĨāĻŋāĻ¤āĻŋ āĻ¨āĻžāĻ—āĻ°āĻŋāĻ•āĻĻā§‡āĻ° āĻŽāĻžāĻ¨āĻ¸āĻŋāĻ• āĻšāĻžāĻĒ, āĻ…āĻ°ā§āĻĨāĻ¨ā§ˆāĻ¤āĻŋāĻ• āĻ•ā§āĻˇāĻ¤āĻŋ āĻāĻŦāĻ‚ āĻ¸āĻžāĻŽāĻžāĻœāĻŋāĻ• āĻ…āĻŦāĻ•ā§āĻˇā§Ÿā§‡āĻ° āĻ•āĻžāĻ°āĻŖ āĻšā§Ÿā§‡ āĻĻāĻžāĻā§œāĻŋā§Ÿā§‡āĻ›ā§‡āĨ¤ āĻāĻ‡ āĻ¨āĻŋāĻŦāĻ¨ā§āĻ§ā§‡ āĻ†āĻŽāĻ°āĻž āĻŦāĻžāĻ‚āĻ˛āĻžāĻĻā§‡āĻļā§‡āĻ° āĻŦāĻ°ā§āĻ¤āĻŽāĻžāĻ¨ āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻĒāĻ°āĻŋāĻ¸ā§āĻĨāĻŋāĻ¤āĻŋ, āĻ…āĻĒāĻ°āĻžāĻ§ āĻŦā§ƒāĻĻā§āĻ§āĻŋāĻ° āĻ•āĻžāĻ°āĻŖ, āĻ†āĻ‡āĻ¨ā§‡āĻ° āĻĻā§āĻ°ā§āĻŦāĻ˛āĻ¤āĻž, āĻĒā§āĻ°āĻ¯ā§āĻ•ā§āĻ¤āĻŋāĻ° āĻ…āĻĒāĻŦā§āĻ¯āĻŦāĻšāĻžāĻ° āĻāĻŦāĻ‚ āĻ¸āĻŽāĻžāĻ§āĻžāĻ¨ āĻ¨āĻŋā§Ÿā§‡ āĻŦāĻŋāĻ¸ā§āĻ¤āĻžāĻ°āĻŋāĻ¤ āĻ†āĻ˛ā§‹āĻšāĻ¨āĻž āĻ•āĻ°āĻŦā§‹āĨ¤ ā§§. āĻŦāĻ°ā§āĻ¤āĻŽāĻžāĻ¨ ...

cybersecurity-law

Cybersecurity Law Services in Bangladesh | Afzal & Associates

Cybersecurity Law Services in Bangladesh

In today's increasingly digital world, cybersecurity and data privacy are paramount. Afzal and Associates provides comprehensive legal services to help individuals and businesses in Bangladesh navigate the complex and evolving landscape of cybersecurity law. We advise clients on data protection, breach response, regulatory compliance, and other critical aspects of digital security, helping them protect their valuable information and maintain trust with their customers and partners.

Our Cybersecurity Law Services

1. Data Privacy and Protection

We advise clients on compliance with data privacy laws and regulations, both in Bangladesh and internationally. Our services include:

  • GDPR Compliance: We assist businesses in complying with the General Data Protection Regulation (GDPR), a comprehensive data privacy law that applies to organizations processing the personal data of individuals in the European Union (EU).
  • CCPA Compliance: We advise on compliance with the California Consumer Privacy Act (CCPA), a data privacy law that gives California residents rights regarding their personal information.
  • Bangladeshi Data Protection Laws: We advise on compliance with existing and emerging data protection laws in Bangladesh, including the Digital Security Act, 2018.
  • Privacy Policies and Notices: We draft and review privacy policies, terms of service, and other data protection notices to ensure they are clear, comprehensive, and compliant with applicable laws.
  • Data Protection Impact Assessments (DPIAs): We help organizations conduct DPIAs to identify and mitigate data privacy risks associated with new projects or technologies.
  • Data Subject Rights: We advise on responding to data subject requests, such as requests for access, rectification, erasure, and data portability.
  • Data Processing Agreements: We draft and review data processing agreements with vendors and other third parties to ensure adequate data protection safeguards.

Get Data Privacy Assistance

2. Cybersecurity Regulatory Compliance

We help businesses understand and comply with the growing number of cybersecurity regulations and industry standards. Our services include:

  • Digital Security Act, 2018 (Bangladesh): We advise on compliance with the DSA, which addresses various cybercrimes and regulates digital security measures.
  • Industry-Specific Regulations: We advise on cybersecurity regulations specific to various industries, such as banking and finance, healthcare, and telecommunications.
  • Critical Infrastructure Protection: We assist organizations in complying with regulations related to the protection of critical infrastructure from cyberattacks.
  • Cybersecurity Standards: We help businesses implement and maintain compliance with relevant cybersecurity standards, such as ISO 27001, NIST Cybersecurity Framework, and others.
  • Regulatory Investigations: We represent clients in investigations and enforcement actions by regulatory authorities related to cybersecurity and data privacy.

Ensure Regulatory Compliance

3. Data Breach Response and Litigation

In the unfortunate event of a data breach, we provide immediate legal guidance and support to minimize damage and ensure compliance with legal obligations. Our services include:

  • Incident Response Planning: We help organizations develop and implement comprehensive incident response plans to prepare for and respond to data breaches effectively.
  • Breach Notification: We advise on breach notification obligations under applicable laws, including the timing, content, and method of notification to affected individuals and regulatory authorities.
  • Forensic Investigations: We work with forensic experts to investigate the cause and scope of data breaches and identify responsible parties.
  • Regulatory Reporting: We assist with reporting data breaches to relevant regulatory authorities in Bangladesh and internationally.
  • Litigation and Dispute Resolution: We represent clients in litigation and other dispute resolution proceedings arising from data breaches, including claims by affected individuals, regulatory actions, and disputes with vendors or insurers.
  • Crisis Communications: We provide guidance on managing communications with stakeholders, including customers, employees, the media, and the public, following a data breach.

Get Breach Response Support

4. Digital Security and Compliance Audits

We conduct legal audits of digital security practices to help organizations identify vulnerabilities, assess risks, and ensure compliance with relevant laws and regulations. Our audits cover:

  • Review of Security Policies and Procedures: We assess the adequacy and effectiveness of an organization's cybersecurity policies and procedures.
  • Data Governance and Management: We review how data is collected, stored, processed, and shared to ensure compliance with privacy and security requirements.
  • Vendor Risk Management: We assess the cybersecurity practices of third-party vendors and service providers.
  • Compliance with Legal and Regulatory Requirements: We verify compliance with applicable laws, regulations, and industry standards.
  • Recommendations for Improvement: We provide practical recommendations for strengthening digital security and improving compliance.

Schedule a Security Audit

5. Cybersecurity Training and Education

We offer customized training programs to educate employees and executives on cybersecurity best practices, data privacy, and legal compliance. Our training covers:

  • Data Privacy Awareness: Training on data protection principles, data subject rights, and handling personal information securely.
  • Phishing and Social Engineering: Educating employees on how to recognize and avoid phishing attacks and other social engineering scams.
  • Password Security: Training on creating strong passwords and managing them securely.
  • Incident Response: Training on how to identify, report, and respond to security incidents.
  • Legal and Regulatory Compliance: Training on relevant cybersecurity laws, regulations, and industry standards.

Request Cybersecurity Training

6. Cybersecurity Contracts and Agreements

We help businesses protect their interests by drafting and reviewing contracts with vendors, service providers, and other third parties to ensure adequate cybersecurity protections and allocate risk appropriately. This includes:

  • Service Level Agreements (SLAs): Defining cybersecurity responsibilities and performance metrics.
  • Data Processing Agreements (DPAs): Ensuring compliance with data protection laws when engaging third-party data processors.
  • Confidentiality Agreements (NDAs): Protecting sensitive information shared with third parties.
  • Cybersecurity Insurance Policies: Reviewing and advising on policy terms and coverage.

Get Contract Review

7. E-commerce and Digital Transactions

We advise businesses on the legal aspects of e-commerce and digital transactions, ensuring compliance with relevant laws and regulations. This includes:

  • Online Terms of Service and Privacy Policies: Drafting and reviewing website terms and policies.
  • Electronic Signatures and Contracts: Advising on the validity and enforceability of electronic signatures and contracts.
  • Consumer Protection: Ensuring compliance with consumer protection laws in online transactions.
  • Payment Security: Advising on secure payment processing and compliance with relevant standards.
  • Data Security in E-commerce: Implementing measures to protect customer data in online transactions.

Consult on E-commerce Law

Relevant Laws and Regulations in Bangladesh

Our legal services are informed by a thorough understanding of the relevant laws and regulations governing cybersecurity and data privacy in Bangladesh, including:

  • Digital Security Act, 2018 (DSA): This is the primary law addressing cybercrime and digital security in Bangladesh. It covers offenses such as hacking, data breaches, spreading false information online, and cyber terrorism. It also includes provisions related to data protection and the responsibilities of digital service providers.
  • Information and Communication Technology Act, 2006 (ICT Act) (partially repealed and replaced by the DSA): Some provisions of the ICT Act may still be relevant, particularly those related to electronic transactions and digital signatures.
  • The Penal Code, 1860: Certain provisions of the Penal Code may be applicable to cybercrimes, such as fraud, defamation, and criminal breach of trust.
  • The Copyright Act, 2000: Protects copyrighted works online.
  • Bangladesh Telecommunication Regulatory Commission (BTRC) Regulations: The BTRC regulates the telecommunications sector and has issued regulations related to cybersecurity and data protection for telecom operators.
  • Draft Data Protection Act: Bangladesh is in the process of developing a comprehensive Data Protection Act. We stay abreast of these developments to provide up-to-date advice to our clients.

Why Choose Afzal and Associates?

  • ✅ Expertise: Our team has specialized knowledge of cybersecurity law, data privacy, and relevant technologies.
  • ✅ Experience: We have a proven track record of advising clients on a wide range of cybersecurity and data privacy matters.
  • ✅ Proactive Approach: We help clients prevent legal issues by implementing proactive compliance measures and developing robust security practices.
  • ✅ Client-Focused: We provide personalized attention and tailored legal solutions to meet the specific needs of each client.
  • ✅ Results-Oriented: We are committed to achieving the best possible outcomes for our clients, whether through negotiation, litigation, or regulatory advocacy.
  • ✅ Up-to-Date Knowledge: We stay current with the rapidly evolving landscape of cybersecurity law and technology.

Client Testimonials

"Afzal and Associates provided invaluable assistance in helping us navigate the complexities of GDPR compliance. Their expertise and practical advice were essential to our success."

- [Client Name], [Client Company/Position]

"When we experienced a data breach, Afzal and Associates responded quickly and effectively, guiding us through the legal and technical challenges and minimizing the damage."

- [Client Name], [Client Company/Position]

Meet Our Attorneys

Attorney Afzal Hosen

Afzal Hosen Mandal

Lead Attorney

Afzal Hosen Mandal is a highly experienced and respected lawyer specializing in cybersecurity law, data privacy, and technology law. He is a graduate of Southeast University (LL.B. Hons) and Uttara University (LL.M.) and is a member of the [Relevant Bar Association/Cybersecurity Organization]. He is committed to providing his clients with expert legal advice, strategic advocacy, and personalized service. He has a deep understanding of both the legal and technical aspects of cybersecurity.

Contact Us for a Consultation

If you need legal assistance with a cybersecurity or data privacy matter, please contact Afzal and Associates for a confidential consultation. We are here to help you protect your digital assets and navigate the complexities of cybersecurity law.

Frequently Asked Questions (FAQs)

❓ What is the Digital Security Act, 2018 (DSA) in Bangladesh?
The Digital Security Act, 2018 (DSA) is a Bangladeshi law that addresses cybercrime, digital security, and data protection. It covers offenses such as hacking, data breaches, spreading false information online, and cyber terrorism. It also includes provisions related to the responsibilities of digital service providers and the protection of critical information infrastructure.
❓ What are the key requirements of GDPR?
The General Data Protection Regulation (GDPR) is an EU law that requires organizations to protect the personal data and privacy of individuals within the EU. Key requirements include:
  • Lawful basis for processing: Organizations must have a valid legal basis for collecting and processing personal data (e.g., consent, contract, legitimate interests).
  • Transparency: Individuals must be informed about how their data is being used.
  • Data minimization: Only collect and process data that is necessary for the specified purpose.
  • Accuracy: Keep personal data accurate and up-to-date.
  • Storage limitation: Do not keep personal data for longer than necessary.
  • Integrity and confidentiality: Implement appropriate security measures to protect personal data.
  • Accountability: Organizations are responsible for demonstrating compliance with GDPR.
  • Data subject rights: Individuals have rights to access, rectify, erase, restrict processing, and port their data.
❓ What is a data breach notification obligation?
A data breach notification obligation is a legal requirement to notify affected individuals and/or regulatory authorities when a security breach involving personal data occurs. The specific requirements (timing, content, method of notification) vary depending on the applicable laws (e.g., GDPR, DSA, industry-specific regulations).
❓ What is a Data Protection Impact Assessment (DPIA)?
A Data Protection Impact Assessment (DPIA) is a process to identify and assess the data protection risks associated with a project, technology, or activity that involves processing personal data. DPIAs are often required under GDPR and other data protection laws for high-risk processing activities.
❓ What is the role of a Data Protection Officer (DPO)?
A Data Protection Officer (DPO) is a designated individual within an organization responsible for overseeing data protection compliance. Under GDPR, certain organizations are required to appoint a DPO. The DPO's tasks include advising on data protection obligations, monitoring compliance, and acting as a point of contact for data subjects and supervisory authorities.
❓ What is cyber insurance, and do I need it?
Cyber insurance is a type of insurance that helps businesses mitigate the financial risks associated with cyberattacks and data breaches. It can cover costs such as incident response, legal expenses, notification costs, credit monitoring, business interruption, and liability claims. Whether you need cyber insurance depends on your organization's size, industry, the sensitivity of the data you handle, and your overall risk profile. It's generally recommended for businesses that handle significant amounts of personal data or rely heavily on technology.
? What are the potential penalties for non-compliance with the Digital Security Act (DSA) in Bangladesh?
The DSA prescribes various penalties for different offenses, including fines and imprisonment. The severity of the penalty depends on the nature of the offense. For example, unauthorized access to a computer system can result in imprisonment and/or fines. Spreading false information or propaganda can also lead to significant penalties. It is crucial to consult the specific sections of the DSA and seek legal advice for accurate information related to penalties.

Disclaimer: This page provides general information about cybersecurity law in Bangladesh and is not intended as legal advice. The law is complex and subject to change. For specific legal guidance, please consult with a qualified attorney at Afzal and Associates.

Comments

Popular posts from this blog

Ahmedabad Satyagraha in Gujarat (1918)

Ahmedabad Satyagraha in Gujarat (1918) Introduction The Ahmedabad Satyagraha of 1918 marks a significant chapter in India's struggle for independence. It was a labor strike initiated by the mill workers in Ahmedabad, Gujarat, demanding an increase in wages. The strike was not just a protest against economic injustice, but it also symbolized the fight against oppressive colonial rule. The term 'Satyagraha' was coined by Mahatma Gandhi, which translates to 'insistence on truth' or 'soul force'. It was a method of non-violent resistance, and the Ahmedabad Satyagraha was one of the early instances where this method was employed in the Indian independence movement. The Satyagraha in Ahmedabad was a turning point as it marked the beginning of Gandhi's active involvement in Indian politics. It was here that Gandhi first introduced his methodology of peaceful resistance and negotiation as a means to achieve political and social change. The event holds histori...

āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž-āĻ­āĻžāĻĄāĻŧāĻžāĻĻāĻžāĻ° āĻ†āĻ‡āĻ¨ā§‡āĻ° āĻœāĻŸāĻŋāĻ˛āĻ¤āĻž āĻĒāĻžāĻ° āĻšāĻ“āĻ¯āĻŧāĻž: āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻžāĻĻā§‡āĻ° āĻœāĻ¨ā§āĻ¯ āĻāĻ•āĻŸāĻŋ āĻ—āĻžāĻ‡āĻĄ

āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž-āĻ­āĻžāĻĄāĻŧāĻžāĻĻāĻžāĻ° āĻ†āĻ‡āĻ¨ā§‡āĻ° āĻœāĻŸāĻŋāĻ˛āĻ¤āĻž āĻĒāĻžāĻ° āĻšāĻ“āĻ¯āĻŧāĻž: āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻžāĻĻā§‡āĻ° āĻœāĻ¨ā§āĻ¯ āĻāĻ•āĻŸāĻŋ āĻ—āĻžāĻ‡āĻĄ āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž-āĻ­āĻžāĻĄāĻŧāĻžāĻĻāĻžāĻ° āĻ†āĻ‡āĻ¨ā§‡āĻ° āĻœāĻŸāĻŋāĻ˛āĻ¤āĻž āĻĒāĻžāĻ° āĻšāĻ“āĻ¯āĻŧāĻž: āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻžāĻĻā§‡āĻ° āĻœāĻ¨ā§āĻ¯ āĻāĻ•āĻŸāĻŋ āĻ—āĻžāĻ‡āĻĄ āĻ¸ā§‚āĻšāĻŋāĻĒāĻ¤ā§āĻ° āĻ­ā§‚āĻŽāĻŋāĻ•āĻž āĻ…āĻ§ā§āĻ¯āĻžāĻ¯āĻŧ 1: āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž āĻšāĻŋāĻ¸ā§‡āĻŦā§‡ āĻ†āĻĒāĻ¨āĻžāĻ° āĻ…āĻ§āĻŋāĻ•āĻžāĻ° āĻ“ āĻĻāĻžāĻ¯āĻŧāĻŋāĻ¤ā§āĻŦ āĻŦā§āĻā§āĻ¨ āĻ…āĻ§ā§āĻ¯āĻžāĻ¯āĻŧ 2: āĻŦāĻšāĻŋāĻˇā§āĻ•āĻ°āĻŖ āĻ“ āĻ­āĻžāĻĄāĻŧāĻžāĻĻāĻžāĻ°āĻŋ āĻļā§‡āĻˇ āĻ…āĻ§ā§āĻ¯āĻžāĻ¯āĻŧ 3: āĻ­āĻžāĻĄāĻŧāĻž āĻ“ āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻœāĻŽāĻž āĻ…āĻ§ā§āĻ¯āĻžāĻ¯āĻŧ 4: āĻ°āĻ•ā§āĻˇāĻŖāĻžāĻŦā§‡āĻ•ā§āĻˇāĻŖ āĻ“ āĻŽā§‡āĻ°āĻžāĻŽāĻ¤ āĻ…āĻ§ā§āĻ¯āĻžāĻ¯āĻŧ 5: āĻ†āĻĢāĻœāĻžāĻ˛ āĻ…ā§āĻ¯āĻžāĻ¨ā§āĻĄ āĻ…ā§āĻ¯āĻžāĻ¸ā§‹āĻ¸āĻŋāĻ¯āĻŧā§‡āĻŸāĻ¸ āĻ•ā§€āĻ­āĻžāĻŦā§‡ āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž āĻĒāĻ°āĻžāĻŽāĻ°ā§āĻļ āĻĻāĻŋāĻ¤ā§‡ āĻĒāĻžāĻ°ā§‡ āĻ‰āĻĒāĻ¸āĻ‚āĻšāĻžāĻ° āĻ…āĻ¤āĻŋāĻ°āĻŋāĻ•ā§āĻ¤ āĻ¸āĻ‚āĻ¸ā§āĻĨāĻžāĻ¨ āĻ¯ā§‹āĻ—āĻžāĻ¯ā§‹āĻ—ā§‡āĻ° āĻ¤āĻĨā§āĻ¯ āĻ­ā§‚āĻŽāĻŋāĻ•āĻž āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž-āĻ­āĻžāĻĄāĻŧāĻžāĻĻāĻžāĻ° āĻ†āĻ‡āĻ¨ āĻŦā§āĻāĻ¤ā§‡ āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻžāĻĻā§‡āĻ° āĻœāĻ¨ā§āĻ¯ āĻ…āĻ¤ā§āĻ¯āĻ¨ā§āĻ¤ āĻ—ā§āĻ°ā§āĻ¤ā§āĻŦāĻĒā§‚āĻ°ā§āĻŖāĨ¤ āĻāĻ‡ āĻ¸āĻŽā§āĻĒā§‚āĻ°ā§āĻŖ āĻ—āĻžāĻ‡āĻĄā§‡āĻ° āĻ‰āĻĻā§āĻĻā§‡āĻļā§āĻ¯ āĻšāĻšā§āĻ›ā§‡ āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻžāĻĻā§‡āĻ° āĻ¤āĻžāĻĻā§‡āĻ° āĻ¸āĻŽā§āĻĒāĻ¤ā§āĻ¤āĻŋ āĻĒāĻ°āĻŋāĻšāĻžāĻ˛āĻ¨āĻž āĻ•āĻ°āĻžāĻ° āĻœāĻ¨ā§āĻ¯ āĻĒā§āĻ°āĻ¯āĻŧā§‹āĻœāĻ¨ā§€āĻ¯āĻŧ āĻ¤āĻĨā§āĻ¯ āĻĒā§āĻ°āĻĻāĻžāĻ¨ āĻ•āĻ°āĻžāĨ¤ āĻ†āĻĒāĻ¨āĻŋ āĻāĻ•āĻœāĻ¨ āĻ…āĻ­āĻŋāĻœā§āĻž āĻ­āĻžāĻĄāĻŧāĻžāĻŸāĻŋāĻ¯āĻŧāĻž āĻšā§‹āĻ• āĻŦāĻž āĻļā§āĻ°ā§ āĻ•āĻ°āĻ›ā§‡āĻ¨, āĻāĻ‡ āĻ¨āĻŋāĻŦāĻ¨ā§āĻ§āĻŸāĻŋ āĻ†āĻĒāĻ¨āĻžāĻ•ā§‡ āĻ†āĻĒāĻ¨āĻžāĻ° āĻ…āĻ§āĻŋāĻ•āĻžāĻ° āĻ“ āĻĻāĻžāĻ¯āĻŧāĻŋāĻ¤ā§āĻŦ, āĻŦāĻšāĻŋāĻˇā§āĻ•āĻ°āĻŖ āĻĒā§āĻ°āĻ•ā§āĻ°āĻŋāĻ¯āĻŧāĻž, āĻ­āĻžāĻĄāĻŧāĻž āĻ“ āĻ¨āĻŋāĻ°āĻžāĻĒāĻ¤ā§āĻ¤āĻž āĻœāĻŽāĻž, āĻ°āĻ•ā§āĻˇāĻŖāĻžāĻŦā§‡āĻ•ā§āĻˇāĻŖ āĻ“ āĻŽā§‡āĻ°āĻžāĻŽāĻ¤, āĻāĻŦāĻ‚ āĻ†āĻĢāĻœāĻžāĻ˛ āĻ…ā§āĻ¯āĻžāĻ¨ā§āĻĄ āĻ…ā§āĻ¯āĻžāĻ¸ā§‹āĻ¸āĻŋāĻ¯āĻŧā§‡āĻŸāĻ¸ āĻ•ā§€āĻ­āĻžāĻŦā§‡ āĻŦāĻŋāĻļā§‡āĻˇāĻœā§āĻž āĻ†āĻ‡āĻ¨āĻŋ āĻĒāĻ°āĻžāĻŽāĻ°ā§āĻļ āĻĻāĻŋāĻ¤ā§‡ āĻĒāĻžāĻ°ā§‡ āĻ¤āĻž āĻŦ...

āĻ…āĻ§ā§āĻ¯āĻžāĻ¯āĻŧ 2: āĻŦāĻžāĻ‚āĻ˛āĻžāĻ¯āĻŧ āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ• āĻļāĻžāĻ¸āĻ¨

āĻŦāĻžāĻ‚āĻ˛āĻžāĻ¯āĻŧ āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ• āĻļāĻžāĻ¸āĻ¨ āĻŦāĻžāĻ‚āĻ˛āĻžāĻ¯āĻŧ āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ• āĻļāĻžāĻ¸āĻ¨ āĻ¸ā§āĻšāĻŋāĻĒāĻ¤ā§āĻ° āĻ­ā§‚āĻŽāĻŋāĻ•āĻž āĻĒāĻ˛āĻžāĻļā§€āĻ° āĻ¯ā§āĻĻā§āĻ§ (ā§§ā§­ā§Ģā§­) āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻļāĻžāĻ¸āĻ¨ā§‡āĻ° āĻĒā§āĻ°āĻžāĻĨāĻŽāĻŋāĻ• āĻŦāĻ›āĻ°āĻ—ā§āĻ˛āĻŋ (1757-1857) 1857 āĻ¸āĻžāĻ˛ā§‡āĻ° āĻŦāĻŋāĻĻā§āĻ°ā§‹āĻš āĻāĻŦāĻ‚ āĻāĻ° āĻĒā§āĻ°āĻ­āĻžāĻŦ āĻĒā§āĻ°āĻ¯āĻŧāĻžāĻ¤ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ• āĻ¸āĻŽāĻ¯āĻŧāĻ•āĻžāĻ˛ (1858-1947) āĻŦāĻ™ā§āĻ—āĻ­āĻ™ā§āĻ— (1905) āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻļāĻžāĻ¸āĻ¨ā§‡āĻ° āĻ…āĻŦāĻ¸āĻžāĻ¨ āĻāĻŦāĻ‚ āĻ­āĻžāĻ°āĻ¤ āĻŦāĻŋāĻ­āĻžāĻœāĻ¨ (1947) āĻ‰āĻĒāĻ¸āĻ‚āĻšāĻžāĻ° āĻŦāĻžāĻ‚āĻ˛āĻžāĻ¯āĻŧ āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ• āĻļāĻžāĻ¸āĻ¨ (1757-1947) āĻĒāĻ°āĻŋāĻšāĻ¯āĻŧ āĻŦāĻžāĻ‚āĻ˛āĻžāĻ¯āĻŧ āĻŦā§āĻ°āĻŋāĻŸāĻŋāĻļ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ• āĻļāĻžāĻ¸āĻ¨ 1757 āĻĨā§‡āĻ•ā§‡ 1947 āĻ¸āĻžāĻ˛ āĻĒāĻ°ā§āĻ¯āĻ¨ā§āĻ¤ āĻĒā§āĻ°āĻžāĻ¯āĻŧ āĻĻā§āĻ‡ āĻļāĻ¤āĻžāĻŦā§āĻĻā§€ āĻŦāĻŋāĻ¸ā§āĻ¤ā§ƒāĻ¤ āĻ›āĻŋāĻ˛āĨ¤ āĻāĻ‡ āĻ¸āĻŽāĻ¯āĻŧāĻ•āĻžāĻ˛ā§‡ āĻ‰āĻ˛ā§āĻ˛ā§‡āĻ–āĻ¯ā§‹āĻ—ā§āĻ¯ āĻ°āĻžāĻœāĻ¨ā§ˆāĻ¤āĻŋāĻ•, āĻ…āĻ°ā§āĻĨāĻ¨ā§ˆāĻ¤āĻŋāĻ• āĻāĻŦāĻ‚ āĻ¸āĻžāĻŽāĻžāĻœāĻŋāĻ• āĻĒāĻ°āĻŋāĻŦāĻ°ā§āĻ¤āĻ¨ āĻĻā§‡āĻ–āĻž āĻ¯āĻžāĻ¯āĻŧ āĻ¯āĻž āĻāĻ‡ āĻ…āĻžā§āĻšāĻ˛ā§‡ āĻ¸ā§āĻĨāĻžāĻ¯āĻŧā§€ āĻĒā§āĻ°āĻ­āĻžāĻŦ āĻĢā§‡āĻ˛ā§‡āĨ¤ āĻŦāĻžāĻ‚āĻ˛āĻžāĻ° āĻ‡āĻ¤āĻŋāĻšāĻžāĻ¸ā§‡āĻ° āĻœāĻŸāĻŋāĻ˛āĻ¤āĻž āĻāĻŦāĻ‚ āĻ”āĻĒāĻ¨āĻŋāĻŦā§‡āĻļāĻŋāĻ•āĻ¤āĻžāĻ° āĻŦā§ƒāĻšāĻ¤ā§āĻ¤āĻ° āĻĒā§āĻ°ā§‡āĻ•ā§āĻˇāĻžāĻĒāĻŸā§‡ āĻāĻ° āĻ¸ā§āĻĨāĻžāĻ¨āĻ•ā§‡ āĻ‰āĻĒāĻ˛āĻŦā§āĻ§āĻŋ āĻ•āĻ°āĻžāĻ° āĻœāĻ¨ā§āĻ¯ āĻāĻ‡ āĻāĻ¤āĻŋāĻšāĻžāĻ¸āĻŋāĻ• āĻ¯ā§āĻ—āĻ•ā§‡ āĻŦā§‹āĻāĻž āĻ…āĻ¤ā§āĻ¯āĻ¨ā§āĻ¤ āĻ—ā§āĻ°ā§āĻ¤ā§āĻŦāĻĒā§‚āĻ°ā§āĻŖā§ˇ ...