i‡qemvbu : · cv_‡ii e¨emv cÖwzôvb, uªv÷ i †kv¤úvbx †mev cÖ`vbkvix, avbbrxex,...
TRANSCRIPT
evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU evsjv‡`k e¨vsK cÖavb Kvh©vjq
XvKv|
I‡qemvBU : www.bangladeshbank.org.bd
weGdAvBBD mvKz©jvi bs- 08 /2013 ZvwiL t 14/07/ 1420 e½vã 29/10/2013 wLª÷vã
cÖavb wbev©nx
mKj wi‡qj G‡÷U †W‡fjcvi, g~j¨evb avZz I cv_‡ii e¨emv cÖwZôvb, Uªv÷ I †Kv¤úvbx †mev cÖ`vbKvix, AvBbRxex, †bvUvix ,Ab¨vb¨ AvBb †ckvRxex Ges GKvD‡›U›U|
wcÖq g‡nv`q,
gvwbjÛvwis cÖwZ‡iva AvBb, 2012 Ges mš¿vm we‡ivax AvBb, 2009 Gi weavbvejx
cwicvjb msµvšÍ AbymiYxq welqvejxi Dci cÖYxZ MvBWjvBÝ Rvix cÖm‡½|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012 Gi 2(e)(H, I, J Ges AA) avivq Ges mš¿vm we‡ivax
AvBb, 2009 Gi 20(H, I, J Ges AA) avivq wi‡qj G‡÷U †W‡fjcvi, g~j¨evb avZz I
cv_‡ii e¨emv cÖwZôvb, Uªv÷ I †Kv¤úvbx †mev cÖ`vbKvix, AvBbRxex, †bvUvix ,Ab¨vb¨ AvBb
†ckvRxex Ges GKvD‡›U›U †K wi‡cvU© cÖ`vbKvix ms¯’v wn‡m‡e AšÍfy©³ Kiv n‡q‡Q|
2.0 weMZ 13 gvP©, 2013 Zvwi‡L evwYR¨ mwPe g‡nv`‡qi mfvcwZ‡Z¡ AbywôZ mfvi wm×všÍ
†gvZv‡eK 11 m`m¨ wewkó GKwU †dvKvm MÖæc MVb Kiv nq Ges D³ †dvKvm MÖæc Zv‡`i
Kvh©cwiwa Abyhvqx wi‡qj G‡÷U †W‡fjcvi, g~j¨evb avZz I cv_‡ii e¨emv cÖwZôvb, Uªv÷ I
†Kv¤úvbx †mev cÖ vbKvix, AvBbRxex, †bvUvix ,Ab¨vb¨ AvBb †ckvRxex Ges GKvD‡›U›U Gi
e¨emvi e¨vwß, cÖK…wZ, Kvh©vejx, AvBbx KvVv‡gv Ges G msµvšÍ AvšÍR©vwZK gvb`‡Ûi we‡ePbvq
Zv‡`i gva¨‡g gvwbjÛvwis I mš¿v‡m A_©vqb msNwUZ nIqvi SuywK ‡gvKv‡ejvi mnvqK wn‡m‡e
"Guidelines on prevention of money laundering & combating financing of
terrorism for Designated Non Financial Businesses and Professions" kxl©K
GKwU MvBWjvBÝ cÖYqb K‡i‡Q|
3.0 Gÿ‡Y wi‡qj G‡÷U †W‡fjcvi, g~j¨evb avZz I cv_‡ii e¨emv cÖwZôvb, Uªv÷ I †Kv¤úvbx
†mev cÖ`vbKvix, AvBbRxex, †bvUvix ,Ab¨vb¨ AvBb †ckvRxex Ges GKvD‡›U›U Gi ‡ÿ‡Î
gvwbjÛvwis I mš¿vmx Kv‡h© A_© †hvMvb cÖwZ‡ivaK‡í AbymiYxq wb‡`©kbv m¤wjZ ewY©Z
MvBWjvBÝwU gvwbjÛvwis cÖwZ‡iva AvBb, 2012Gi 23 (N) aviv I mš¿vm we‡ivax AvBb, 2009
Gi 15(1)(R) avivq cÖ`Ë ÿgZv e‡j cwicvj‡bi Rb¨ Rvix Kiv n‡jv; hv evsjv‡`k e¨vs‡Ki
I‡qe mvBU (http://www.bb.org.bd/mediaroom/circulars/circulars.php) n‡Z
WvDb‡jvW Kiv hv‡e|
G mvKz©jv‡i ewY©Z MvBWjvBÝwUi wb‡`©kbv Awej‡¤^ Kvh©Ki n‡e|
AbyMÖnc~e©K cÖvwß ¯^xKvi Ki‡eb|
Avcbv‡`i wek¦¯Í,
ms‡hvRbx t eY©bv †gvZv‡eK| ¯^vÿwiZ/-
( †`ecÖmv` †`ebv_) gnve¨e¯’vcK
†dvb : 9530118
cÖwZwjwc bs- weGdAvBBD (cwjwm) 03/2012-
ZvwiL : DwjøwLZ
AeMwZ I cÖ‡qvRbxq e¨e ’v MÖn‡Yi Rb¨ cÖwZwjwc †cÖiY Kiv n‡jv t- (‡R¨ôZvi µg Abyhvqx bq)
1. mwPe, e¨vsK I Avw_©K cÖwZôvb wefvM, A_© gš¿Yvjq, evsjv‡`k mwPevjq, XvKv| 2. mwPe, evwYR¨ gš¿Yvjq, evsjv‡`k mwPevjq, XvKv| 3. mwPe, ‡jwRm‡jwUf I msm` welqK wefvM, AvBb gš¿Yvjq, evsjv‡`k mwPevjq, XvKv| 4. mwPe, M„nvqb I MYc~Z© gš¿Yvjq, †m¸bevwMPv, XvKv| 5. ‡Pqvig¨vb, ivRavbx Dbœqb KZ…©cÿ, w`jKzkv ev/G, XvKv| 6. †iwR÷ªvi, †iwR÷ªvi Ae R‡q›U ÷K †Kv¤úvbxR, XvKv| 7. WvB‡i±i †UªW AMv©bvB‡Rkb, evwYR¨ gš¿Yvjq, evsjv‡`k mwPevjq, XvKv| 8. ‡cÖwm‡W›U, evsjv‡`k evi KvDwÝj, evsjv‡`k mywcÖg †KvU©, XvKv| 9. ‡cÖwm‡W›U, AvBwmGwe, KviIqvb evRvi, XvKv| 10. ‡cÖwm‡W›U, AvBwmGgGwe, bxj‡ÿZ, XvKv| 11. ‡cÖwm‡W›U, , win¨ve, 1/wR, b¨vkbvj cøvRv, wd« ¯‹zj ÷ªxU, †mvbviMvuI †ivW, XvKv| 12. ‡cÖwm‡W›U, , evsjv‡`k Ry‡qjvm© mwgwZ, 3 evqZzj †gvKviig gv‡K©U (Z…Zxq Zjv), XvKv| 13. gnve¨e ’vcK, evsjv‡`k e¨vsK, gwZwSj,
XvKv/PÆMÖvg/ivRkvnx/Lyjbv/e¸ov/wm‡jU/m`iNvU,XvKv/ewikvj/iscyi/gqgbwmsn| 14. †Pqvig¨vb, evsjv‡`k G‡mvwm‡qkb Ae e¨vsKvm©, 42, Kvgvj AvZvZzK© GwfwbD, ebvbx, XvKv| 15. †Pqvig¨vb, G‡mvwm‡qkb Ae e¨vsKvm©, evsjv‡`k, B÷vb© Kgvwk©qvj Kg‡cø·, 73, KvKivBj, XvKv| 16. cÖavb wbev©nx Kg©KZv©, mKj Zdwmjx e¨vsK I mKj Avw_©K cÖwZôvb| 17. wbe©vnx cwiPvjK, Mfb©i g‡nv`‡qi mwPevjq, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 18. Mfb©i g‡nv`‡qi e¨w³MZ Kg©KZ©v, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 19. †WcywU Mfb©i g‡nv`qM‡Yi mv‡_ mshy³ Dc-cwiPvjK/mnKvix cwiPvjK, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 20. A_©‰bwZK Dc‡`óv/wbe©vnx cwiPvjK g‡nv`qM‡Yi e¨w³MZ mnKvix, evsjv‡`k e¨vsK, cÖavb Kvh©vjq, XvKv| 21. gnvcwiPvjK, evsjv‡`k Bbw÷wUDU Ae e¨vsK g¨v‡bR‡g›U, wgicyi, XvKv| 22. gnvmwPe, w` Bbw÷wUDU Ae e¨vsKvm© evsjv‡`k, weGmAviGm feb, 10g Zjv, KvIivb evRvi, †ZRMuvI, XvKv|
¯vÿwiZ/-
(‡gvt gvmy` ivbv) Dc cwiPvjK
†dvb : 9530010-75/2467
GUIDELINES ON PREVENTION OFMONEY LAUNDERING & COMBATING
FINANCING OF TERRORISM
FOR
DESIGNATED NON- FINANCIALBUSINESS AND PROFESSIONS
BANGLADESH FINANCIAL INTELLIGENCE UNITBANGLADESH BANK
Focus GroupConvener
Mr. Jabed AhmedDirector (Joint Secretary), Trade OrganizationMinistry of Commerce.
MemberMr. Prosanta Kumar DasDirector (Joint Secretary)Rajdhani Unnayan Kartripakkha (RAJUK).
Mr. Md. Abdur RashidDeputy Registrar (Deputy Secretary)Registrar of Joint Stock Companies and Firms (RJSC).
Mr. Md. Afzalur RahmanDeputy SecretaryBangladesh Bar Council.
Mr. Shah MominSenior Assistant SecretaryMinistry of Finance.
Dr. Khaleda ParvenSenior Assistant SecretaryLegislative & Parliamentary Affairs DivisionMinistry of Law, Justice and Parliamentary Affairs.
Mr. Md. Ruhul AminAssistant Trade ConsultantMinistry of Commerce.
Engr. Anisuzzaman Bhuiyan RanaSecretary GeneralReal Estate and Housing Association of Bangladesh, REHAB
Dr. Dewan Aminul Islam, MBBSSecretary GeneralBangladesh Jewellers Association.
Mr. Md. Syful Islam, FCA, FCMACouncil Member & Former PresidentInstitute of Chartered Accountants Bangladesh (ICAB).
Member Secretary
Mr. Md. Masud Rana, CAMSDeputy DirectorBangladesh Financial Intelligence Unit, Bangladesh Bank.
Preface
The techniques of Money Laundering and Terrorist Financing (ML/TF) are everevolving process. The methods and techniques used for money laundering andterrorist financing are changing in response to developing counter measures.Financial Action Task Force (FATF), the international standard setter for AML/CFT,has introduced 40+9 recommendations aiming to money laundering (ML) andfinancing of terrorism (TF), which applicable to all countries around the globe.Afterwards, in 2012 FATF has revised its 40+9 recommendations and introduced anew set of 40 recommendations by merging them.
In line with the international standards and initiatives, Bangladesh Government haspassed Money Laundering Prevention Act (MLPA), 2002. After several amendments inseveral years a new Money Laundering Prevention Act, 2012 has been passed in2012. The Government has also enacted Anti Terrorism Act (ATA) in 2009 aiming tocombat terrorism and terrorism financing and this Act was also amended in 2012 and2013. Both the Acts have empowered Bangladesh Financial Intelligence Unit (BFIU),Bangladesh Bank (BB) to perform the anchor role in combating ML/TF throughinstructing reporting agencies and building awareness among the stakeholders.
This Guideline titled "Guidelines on prevention of money laundering & combatingfinancing of terrorism for Designated Non-Financial Businesses and Professions(referred herein as Guideline)” will be applicable for Designated Non-FinancialBusinesses and Professions as describes in section 2(w) (ix-xii) of Money LaunderingPrevention Act, 2012 (MLPA, 2012), i.e. real estate developer, dealer in preciousmetals or stones, trust and company service provider, lawyer, notary, other legalprofessional and accountant (referred herein as DNFBP); and section 2(20)(i, j, k, l)in Anti Terrorism Act (ATA), 2009. This Guideline has been prepared specially forDNFBP to enable them to keep in place an effective preventative measures againstML/TF related issues which leads to establish ML/TF risks free business.
BFIU has issued this Guideline in pursuant to section 23 of MLPA, 2012 and isdeemed to be the best practice paper for the AML/CFT compliance. Having identifiedthe vulnerabilities of DNFBPs being abused by money launderers and terroristfinanciers, BFIU, as part of its supervisory process, will assess the adequacy ofprocedures adapted to AML/CFT by the DNFBP and the degree of compliance withsuch procedures. This guideline is designed to enable DNFBPs to undertake itsfunction in consistence with the Bangladesh's AML/CFT laws and regulations. Anoverriding aim of this Guideline is to ensure that appropriate identificationinformation is obtained in relation to their Clients by DNFBPs. This is not only toassist the detection of suspect transactions but also to create an effective "audittrail" in the event of an investigation, if necessary.
Table of contents
CHAPTER ONE : The Objective Page
1.1Introduction.......................................................................................... 1
1.2 International Standards and way forward................................................. 1
CHAPTER TWO: Basics of Money Laundering and Terrorist Financing
2.1Introduction.......................................................................................... 3
2.2 What is Money Laundering .................................................................... 3
2.3 What is Terrorist Financing .................................................................... 5
2.4 2.4 Why is AML/CFT Important? ........................................................................ 7
2.5 2.5 What need to do in short? ............................................................... 7
2.6 2.6 The Role of the Bangladesh Financial Intelligence Unit (BFIU).................... 11
2.7 2.7 Role of the respective regulators of DNFBPs.............................................. 11
CHAPTER THREE: Suspicious indicators and case examples
3.1 Introduction ........................................................................................ 16
3.2 Lawyer, notary, other legal professionals and Accountants ............... 16
3.2.1 Suspicious Activity Indicators........................................................ 17
3.2.2 Some case examples................................................................... 18
3.3 Real Estate Developer....................................................................... 19
3.3.1 Suspicious Activity Indicators: customer identification...................... 20
3.3.2 Suspicious Activity Indicators: the transaction................................ 20
3.3.3 Suspicious Activity Indicators: others............................................ 20
3.3.4 Some case examples.................................................................. 20
3.3 3.4 Dealers in Precious Metals and Stones ….......................................... 23
3.4.1 Suspicious Activity Indicator for retail market.................................. 23
3.4.2 Suspicious Activity Indicator for wholesale market............................ 24
3.4.3 Some case examples................................................................... 25
3.5 Trust and Company Service Providers................................................ 27
3.5.1 Suspicious Activity Indicators......................................................... 27
3.5.2 Some case examples.................................................................... 28
CHAPTER FOUR: Compliance program for DNFBPs
4.1 Introduction........................................................................................ 31
4.2 Risk Assessment.................................................................................. 31
4.3 Commitment for AML/CFT Compliance Regime......................................... 32
4.4 Client Due Diligence (CDD).................................................................... 32
4.4.1 Identification of Clients ................................................................ 33
4.4.2 Timing of CDD ............................................................................ 34
4.4.3 Enhanced Due Diligence (EDD) ..................................................... 36
4.4.4 Identifying and Dealing with Politically Exposed Persons (PEPs).......... 36
4.4.5 Ongoing Due Diligence.................................................................. 36
4.4.6 Non-face to face customer ............................................................ 37
4.4.7 Reliance of third party .................................................................. 37
4.4.8 Suspicious transaction/activity monitoring and reporting.................... 37
4.4.9 Cash Transaction Report................................................................ 38
4.4.10 Other issues............................................................................... 38
4.5 Non -disclosure of reporting ................................................................... 39
4.6 Safe harbor for reporting....................................................................... 39
4.7 Regulatory cooperation......................................................................... 39
4.8 Staff awareness and training.................................................................. 40
4.9 Record keeping.....................................................................................
Annexure : STR & CTR Reporting and respective laws
40
List of Abbreviations
ML/TF Money Laundering/Terrorist Financing
AML/CFT Anti-Money Laundering/Combating the Financing of Terrorism
BFIU Bangladesh Financial Intelligence Unit
APG Asia Pacific Group on Money Laundering
ATA Anti Terrorism Act
BB Bangladesh Bank
BDT Bangladesh Taka
CMI Capital Market Intermediaries
CDD Client Due Diligence
CTC Counter Terrorism Committee
DNFBP Designated Non Financial Business andProfessions
FATF Financial Action Task Force
FCBs Foreign Commercial Banks
FIU Financial Intelligence Unit
GoB Government of Bangladesh
ICRG International Cooperation Review Group
KYC Know Your Client
MLPA Money Laundering Prevention Act
MLPO Money Laundering Prevention Ordinance
NCC National Coordination Committee on AML/CFT
SRO Self Regulatory Organization
STR Suspicious Transaction Report
UNCAC United Nations Convention Against Corruption
UNODC UN Office on Drugs and Crime
UNSCR United Nations Security Council Resolution
1
Chapter: One
The Objectives
1.1 Introduction:
This guideline is designed to help accountants, lawyers, real estate developers,
dealer in precious metals and stones and trust and company service providers (as
referred as Reporting Organization in section 2 (w) of Money Laundering
Prevention Act, 2012) , and their employees, gain a better understanding of the
following:
o Money laundering and terrorist financing;
o Suspicious Transaction Reporting and suspicious activity indicators;
o Complete compliance program including customer due diligence and keeping;
o International regulatory standards.
After reading this guideline, once should be able to:
o understand one's responsibilities in respect of anti-money laundering and
counter- terrorist financing;
o appreciate the risks of money laundering and terrorist financing specific to
sectors;
o identify suspicious transactions in the course of business; and
o understand one's legal obligations to report suspicious transactions.
1.2 International Standards and way forwards
The Financial Action Task Force on Money Laundering (FATF) is an inter-
governmental body formed in 1989. It sets international standards, develops and
promotes policies and best practices to combat money laundering and combating
terrorist financing. The original FATF 40 Recommendations, which set the
2
international standards against money laundering, were first drawn up in 1990.
The Recommendations were revised in 1996 and 2003 subsequently. In 2001,
the FATF expanded its mandate to deal with the issue of the financing of
terrorism, and introduced the 09 Special Recommendations against terrorist
financing. Afterwards in 2012 FATF has further revised its 40+9
Recommendations and produces revised new set of 40 Recommendations. These
FATF Recommendations extend the anti-money laundering requirements to six
Designated Non-financial Businesses and Professions, which include
accountants, casinos, estate agents, lawyers, precious metals and
precious stones dealers, and trust and company service providers.
Similar to financial institutions, they are required to conduct customer
due diligence, keep proper records and report suspicious transaction. The
FATF Recommendations specifically require these three requirements to be
stipulated in the laws of the each country. Suspicious transaction reporting,
customer due diligence and record keeping obligation has already been set out in
the relevant legislation in Bangladesh (Section 25 of Money Laundering
Prevention Act, 2012 and section 16 of Anti Terrorism Act, 2009). The DNFBPs
are required by law, when doing a transaction with a customer, with or without a
threshold or a specific situation:
• ask the customer to produce his/her proof of identity;
• identify the beneficiary of the transaction (if the transaction is done through
an agent or an intermediary);
• keep record of each and every transaction for a specified period; and
Report to the BFIU in case of any suspicion related to ML/TF etc.
3
Chapter: Two
Basics of Money Laundering and Terrorist Financing
2.1 Introduction
Every Reporting Organization, which includes DNFBPs in Bangladesh, is required to
put in place anti-money laundering program for their business and provide anti-
money laundering training to their employees. The Reporting Organizations,
including DNFBPs are subject to be inspected by the Bangladesh Financial
intelligence Unit (BFIU), and they may be sanctioned if the companies/business does
not meet their legal obligations.
The Government is still deliberating the best regulatory model for the Reporting
Organization in terms of AML/CFT. At this stage, BFIU consider a capacity building
and educational approach rather than a punitive approach more appropriate. BFIU
will strike a good balance between compliance with international standards and the
business interest.
2.2 What is Money Laundering?
In a simple word, “money laundering” covers all kinds of methods used to change
the identity of illegally obtained money (i.e. crime proceeds) so that it appears to
have originated from a legitimate source.
A money laundering scheme will therefore usually involve a combination of several
different techniques and vehicles, which may not necessarily involve the conventional
financial sector. Accountants, lawyers, real estate developers, precious metals and
precious stones dealers and trust and company service providers are all known to
have been employed in money laundering schemes worldwide.
Pursuant to the Section 2 of the Money Laundering Prevention Act, 2012 -
“Money Laundering” means –
4
(i) knowingly move, convert, or transfer proceeds of crime or propertyinvolved in an offence for the following purposes:
(1) concealing or disguising the illicit origin/nature, source, location,ownership or control of the proceeds of crime; or
(2) assist any person for evading the legal consequences of his orher action who is involved in the commission of the predicateoffence;
(ii) smuggle funds or property abroad earned through legal or illegalmeans;
(iii) knowingly transfer or remit the proceeds of crime into or out ofBangladesh with the intention of hiding or disguising its illegal source;
(iv) conclude or attempt to conclude financial transactions in such amanner as to avoid reporting requirement under this Act.
(v) convert or movement or transfer property with the intention toinstigate or assist the carrying out of a predicate offence;
(vi) acquire, possess or use property, knowing that such property is theproceeds of a predicate offence; or
(vii) perform such activities so that illegal source of the proceeds of crimemay be concealed or disguised; or
(viii) participate in, associate with, conspire to commit, attempt to commitor abet, instigate or counsel to commit any offences mentioned above.
While the techniques for laundering illicit funds vary considerably and are often
highly intricate, there are generally three stages in the process:
• Placement:
involves placing the crime proceeds in the financial system (e.g. depositing
cash into a bank account, exchange currency of small denominations to
currency of large denominations);
5
• Layering:
involves converting the proceeds of crime into another form and creating
complex layers of financial transactions to disguise the audit trail and the
source and ownership of the funds (e.g. buying precious metals or stones with
cash, buying and selling of stocks, commodities or properties; taking out and
repaying a loan); and
• Integration:
involves placing the laundered proceeds back in the economy under a veil of
legitimacy.
These three stages are not distinct. They are very often overlapping with each other
and repeated, making tracing of crime proceeds and their sources difficult.
In Bangladesh, crime proceeds are generated from various illegal activities. They can
be derived from corruption including bribery , drug trafficking, smuggling, illegal
gambling, blackmail, extortion, loan sharking, tax evasion, controlling prostitution,
robbery, theft, fraud, copyright infringement, insider dealing and market
manipulation.
2.3 What is Terrorist Financing?
Terrorist financing can be defined in simple terms as the financial support, in any
form, of terrorism or of those who encourage, plan, or engage in terrorism. Money
laundering and terrorist financing manipulations are similar, mostly having to do with
concealment and disguise.
Money launderers will send crime proceeds through legal channels in order to
conceal its criminal origin, whilst terrorist financiers will transfer funds that may be
derived from legal or illicit origin in such a way as to conceal their source and
ultimate use, i.e. support of terrorism.
6
Pursuant to the section 7 of the Anti Terrorism (amendment) Act, 2009, financing ofterrorism means:
(1) If any person or entity knowingly supplies or expresses the intention to
supply money, service, material support or any other property to
another person or entity and where there are reasonable grounds to
believe that the full or partial amount of the same have been used or
may be used for any purpose by an individual terrorist, terrorist entity
or terrorist group or terrorist organization then he or she or the said
entity shall be treated committing the offence of financing for terrorist
activities.
(2) If any person or entity knowingly receives money, services, material
support or any other property from another person or entity and where
there are reasonable grounds to believe that full or partial amount of the
same have been used or may be used for any purpose by an individual
terrorist, terrorist entity or terrorist group or terrorist organization, then
he or she or the said entity shall be treated committing the offence of
financing for terrorist activities.
(3) If any person or entity knowingly makes arrangements for collecting
money, services, material support or any other property for another
person or entity and where there are reasonable grounds to believe that
the full or the partial amount of the same have been used or may be
used for any purpose by an individual terrorist, terrorist entity or
terrorist group or terrorist organization then he or she or the said entity
will be treated committing the offence of financing for terrorist activities.
(3) If any person or entity knowingly instigate in such a manner, another
person or entity to supply, receive, or arrange money, services, material
support or any other property and where there are reasonable grounds to
believe that the full or the partial amount of the same have been used or
may be used for any purpose by an individual terrorist, terrorist entity or
terrorist group or terrorist organization then he or she or the said entity
will be treated committing the offence of financing for terrorist activities.
7
2.4 Why is Anti-Money Laundering and Counter-Terrorist FinancingImportant?
As part global efforts, it is very important for Bangladesh to maintain effective anti-
money laundering (AML) and counter financing of terrorism (CFT) regime, which is
inevitable to maintain the integrity and stability of financial system in Bangladesh.
Money laundering and terrorist financing can have devastating consequences to the
whole community.
In the absence of an effective regime against money laundering and terrorist
financing in accordance with the international standards, the money launderers and
terrorists and their associates will have the opportunities to generate illicit funds and
provide to continue the illegal activities. Furthermore, the terrorists and criminals will
take the charge of the business and consequently, the reputation of Bangladesh
before the international community will come in questions and invoke them to make
measures against the interests of Bangladesh.
Both money laundering and terrorist financing are criminal offences under the Laws
of Bangladesh. According to MLPA, 2012 and ATA, 2009 (including amendment of
2012), aiding, assisting and abetting in such offence is also treated as offences in
various sections. Taking an indifferent attitude or turning a blind eye to a transaction
known or have reasonable grounds to believe that crime proceeds/terrorist funds are
involved, may result in conviction for the above offences.
2.5 What you need to do in short?
Anti-money laundering and counter-terrorist financing is everyone’s responsibility.
However, some sectors face a greater risk of coming across crime proceeds or
terrorist property than others, e.g. accountants, lawyers, real estate developers,
precious metals and precious stones dealers and trust and company service
providers, etc.
In that case one of the first obligations of DNFBPs is to identify, assess and
understand the particular ML and TF risks faced by their business and to act to
address those risks. To do this a DNFBP must carry out a risk assessment.
8
When a DNFBP comes across any property, which are known or suspect to be
crime proceeds or terrorist property, it should submit a Suspicious Transaction
Report (STR) to the Bangladesh Financial Intelligence Unit (BFIU), which will reduce
their ML/TF risks as well.
Reporting of STR is also a legal obligation for DNFBPs under both MLPA, 2012 and
ATA, 2009. A STR should include the following information:
• Personal particulars and contact details of the individuals or entities involvedin the suspicious activity;
• Details of the suspicious activity;
• The suspicious activity indicators observed; and
• Any explanation provided by the subject of the STR when questioned aboutthe transaction or activity.
Failing to report knowledge or suspicion of crime proceeds or terrorist property is a
punishable by the both Laws. If a DNFBP deal with such property knowing or
having reasonable grounds to believe that the property is crime proceeds, then
it may have committed the offence of money laundering.
It should be noted that the crime from which the proceeds were derived does not
need to have taken place in Bangladesh, e.g. if DNFBP comes across certain property
in Bangladesh, which are known or suspect is proceeds of crime in an overseas
country, it should also report its knowledge of suspicion to the BFIU. Again, failure to
report knowledge or suspicion of such property and dealing with such property are
punishable under both Laws.
To prevent DNFBPs from exploitation by money launderers and terrorist financiers,
and protect them from unwittingly committing the money laundering and terrorist
financing related offences described above, in addition to reporting suspicious
transactions, they are required to always conduct Customer Due Diligence (CDD),
maintain proper records of transactions and have in place a proper internal
control system.
9
Besides reporting suspicious transactions, CDD and record keeping are two of the
“core” money laundering and terrorist financing counter-measures adopted by the
international community and have been implemented in the banking, securities,
leasing, NGOs/NPOs, Post Offices, money changers and insurance sectors. BFIU has
been issued this Guideline in consultation with the relevant respective regulators.
CDD means “Know Your Customers and their transactions” and conducting
ongoing monitoring of the business relationship, i.e.:
• know who you are actually dealing with;
• know the beneficiaries of the transactions;
• know the purposes and nature of the transactions; and
• know the sources of the funds involved.
The ways of gathering this information may vary from business to business. For
some businesses, the relevant information about the clients and the transactions
may have been required by applicable laws or established practices. For others,
members of the trade may need to do their own checks. In most cases, asking the
customers for the information skillfully would do, e.g. by tactfully posing questions in
the midst of promoting products or services that may be of interest to the
customers.
Persons engaged in legitimate business activity, generally, will have no objection to,
or hesitation in answering such questions. Persons involved in illegal activity,
however, are more likely to be evasive, to refuse to answer or provide a fabricated
answer. The manner in which a customer answers such questions may be an
indication of the suspicious nature of the transaction or activity.
In order to prevent money laundering and terrorist financing, it is important that
businesses in various sectors should establish and maintain internal policies,
procedures and controls. These policies, procedures and controls, which must be
communicated to employees, should cover CDD, record keeping and suspicious
transaction reporting.
10
At a minimum, businesses should designate an AML/ CFT compliance officer at the
management level, whose responsibilities should include overseeing the
implementation of the above-mentioned internal policies, procedures and controls.
To this end, the compliance officer and other appropriate staff should have timely
access to information/data obtained in the CDD process, transaction records and
other relevant information.
Independent audits should be carried out to test compliance with the internal
policies, procedures and controls.
Induction and on-going employee training programs should be introduced in order to
establish and maintain employees’ vigilance in AML/CFT matters, in particular, CDD,
record keeping and suspicious transaction reporting.
Business should put in place screening procedures to ensure high standards in the
recruitment process.
Though CDD, record keeping, suspicious transaction reporting and internal controls
have been practiced in our banking, leasing, securities and insurance sectors for
several years, they may be new to DNFBP sector and may present challenges to
them to implement AML/CFT policies and procedures. To overcome such challenges
management commitment, capacity building and cultural change in DNFBP sector
and amongst their customers may be required. It may take some time to incorporate
these measures in their daily practice. Most important of all is to start practicing
them now:
• Customer Due Diligence
• Record Keeping
• Suspicious Transaction Reporting
• Internal Control
11
2.6 The Role of the Bangladesh Financial Intelligence Unit (BFIU)
The BFIU is an independent unit of Bangladesh Bank established under section 24 of
MLPA, 2012, while it has established in 2002 (as the name of Anti Money Laundering
Department). BFIU acts as a lead agency for the implementation of MLPA, 2012 and
financing of terrorism related sections of ATA, 2009. It monitors the degree of
compliance done by the various reporting organizations to prevent money laundering
and terrorist financing.
Bangladesh has obligation to implement FATF standards i.e. FATF Forty
Recommendations to prevent money laundering and terrorism financing as a part of
global initiatives. BFIU overseeing the implementation of those FATF
Recommendations that are related to the financial, non-financial sectors and the
non-profit organizations with a view to ensuring that the anti-money laundering and
counterterrorist financing measures taken by those sectors and organizations are in
step with the established international standards.
The core functions of BFIU are to receive STRs from different sources, analyze them
and disseminate the result of analysis to the law enforcement/competent agencies,
namely, the Police, the Anti Corruption Commission for further actions.
2.7 Role of the respective regulators and Self Regulators of DNFBPs
There are some statutory, independent organizations regulating different types of
DNFBPs which are also known as Self Regulatory Organizations (SRO). For example,
REHAB for real estate developers, Bar Council for the legal professions, Institute of
Chartered Accountant Bangladesh (ICAB) for accounting professionals and
Bangladesh Jewelers Association for dealers in precious metal or stones etc. Apart
from those, there are some other agencies acting as policy makers regarding the
DNFBP business like Ministry of Commerce, Ministry of Public Works & Housing,
Ministry of finance, Registrar of Joint Stock Companies & Firms, RAJUK and the
various registration authorities.
Specific requirements for these regulators set out in FATF Recommendations and
International Best Practices. A DNFBP may submit carbon copy of STR to the SRO. In
that case a SROs need to maintain strict confidentiality as delineate in the section 6
12
of MLPA, 2012. Some SROs/regulators issue industry practice paper for their
member institutions on governance or integrity and so on. Money laundering and
terrorist financing issues may be one of the components of such industry practice
paper. In addition to that the SRO may check the compliance of AML/CFT issues
during their regular program and notify BFIU if there is any serious concern. An SRO
and BFIU needs to work hand in hand for the effective implementation of the
provisions laid in MLPA, 2012 and ATA, 2009.
Institute of Chartered Accountants Bangladesh (ICAB)
The ICAB pronounces the International Accounting, Financial Reporting and Auditing
Standards as Bangladesh Accounting Standards (BAS), Bangladesh Financial
Reporting Standards (BFRS) and Bangladesh Standards on Auditing (BSA). A
Chartered Accountant Firm appointed as an auditor reviews the Financial Statements
whether they are prepared in compliance with the requirements of the BFRS.
Compliance of BFRS ensures accountability, transparency and corporate governance
in the enterprise. It requires providing all disclosures as required by any law and
industry best practices including any fraud/forgery, tax evasion, etc.
Auditors mandatorily follow the requirements of all the BSA while conducting an
audit. There is some BSA as follows help understanding and identification of Anti-
Money Laundering/Combating the Financing of Terrorism (AML/CFT) regime:
BSA 240: The Auditors Responsibility Relating to Fraud in an Audit of Financial
Statements
BSA 250: Consideration of Laws and Regulations in an Audit of Financial Statements
BSA 260: Communication with Those Charged with Governance
BSA 265: Communicating deficiencies in Internal Control to Those Charged with
Governance and Management
BSA 330: The Auditors' Responses to Assessed Risk
However, being the regulator of the Accounting Profession of Bangladesh, the
Institute may require its practicing members to follow the above issues through its
13
relevant Committees and Council. Since, the Institute is very highly committed to
adhere the laws of the land; The Institute may organize adequate number of training
programs for its practicing members to understand the requirement of the Money
Laundering Prevention Act 2012 and Anti Terrorism Act 2009 in order to prevent the
Money Laundering and Terrorist Financing.
ICAB should instruct its members to incorporate a separate observation on AML/CFT
issues while they conduct audit into a Bank, Insurance, Leasing Securities companies
etc.
Real Estate and Housing Association of Bangladesh (REHAB)
Real Estate and Housing Association of Bangladesh (REHAB) is one of the SRO;
regulating the real estate sector. REHAB may play vital role by creating bridge
between BFIU and real estate developers. REHAB may-
take necessary initiatives to cover all real estate developers as itsmembers and ensure AML/CFT compliance as well .
direct all the agencies to follow AML/CFT procedures (i.e. KYC, RecordKeeping, CTR, STR etc.) strictly.
check the compliance of the members and impose penalty for lapses.
arrange capacity building (training, workshop, seminar etc.) programfor real estate developers.
may receive STR from its member and forwarded that to BFIUensuring confidentiality as stated in section 06 of MLPA, 2012.
assist BFIU or other law enforcement agencies.
RAJUK also require checking AML/CFT compliance status of the real estate
developers while they act as a regulator for real estate sector. On the other hand
they need ensure the compliance of AML/CFT norms (i.e. KYC, Record Keeping, CTR,
STR etc.) at their own while they are doing business as a real estate agents or
developers.
Jewelers and other Related Association
Jewelers Association of Bangladesh, Bangladesh Bullion Association or other
association related with gold or precious metal or stones the SROs; regulating the
gold or precious metal or stones sector. These associations should play vital role by
14
creating bridge between BFIU and individual business entity or outlet in this sector.
The respective association may-
direct all the agencies to follow AML/CFT procedures (i.e. KYC, Record
Keeping, CTR, STR etc.) strictly.
arrange capacity building (training, workshop, seminar etc.) program
for their members.
check the compliance of the members and impose penalty for lapses.
assist BFIU or other law enforcement agencies.
Bangladesh Bar Council and lawyer Association
Bangladesh Bar Council and different lawyer association are the SROs; regulating the
lawyers and notaries. These associations should play vital role by creating bridge
between BFIU and individual professionals or entity in this sector. The respective
association may oversee following AML/CFT issues-
Bangladesh Bar Council may impose condition to follow the AML/CFT
norms while they issue practicing license.
Bangladesh Bar Council may also direct the every lawyers association
that for following AML/CFT norms (i.e. KYC, Record Keeping, CTR, STR
etc.).
respective lawyer association put an obligation for their member to
comply with MLPA, 2012 and ATA, 2009 (including amendment of
2012)
check the compliance of the members and impose penalty for lapses.
assist BFIU or other law enforcement agencies.
Registrar of Joint Stock Companies and Firms
Registrar of Joint Stock Companies and Firms (RJSC) is a regulator for all sorts of
incorporated businesses and required to play very important role for prevention of
money laundering and combating financing of terrorism. Identifying their importance
FATF has issued 2 specific Recommendations (FATF recommendation 24 and 25) in
relation to them. On the other hand RJSC has identified one of the key agencies
15
under the National Strategy for Prevention of Money Laundering and Financing of
Terrorism (2011-2013) published by Government of People's Republic of Bangladesh
with some specific duties and responsibilities.
Regarding the AML/CFT issues the RJSC should ensures the followings:
Obtain and record basic information (company name, date of
incorporation, legal form or status, addresses, list of directors etc.)
related to formation of legal entities (different forms of companies)
and legal arrangements (eg. trust and similar arrangements).
They also need to keep the beneficial ownership (ownership and
control structure and regulating persons i.e. majority shareholders or
influencing member on decision making) information related legal
entities or legal arrangements.
RJSC should ensure that the recorded basic and beneficial
ownership information are accurate and up to date and accessible by
competent authorities.
RJSC should incorporate such condition that they may cancel license if
any financial institutions and DNFBP fails to comply with the AML/CFT
regime in Bangladesh. They should also take such decision while BFIU
or other competent authority requests them to do so.
RJSC should conduct AML/CFT risk assessment related with particulars
forms of legal entities or legal arrangements.
RJSC should assist BFIU or other law enforcement agencies.
16
Chapter: Three
Suspicious indicators and case examples
3.1 Introduction
In this part, we are going to cover suspicious activity indicators and case examples
specific to individual sectors of DNFBPs which enable to learn them more about
money laundering and terrorist financing risks specific to DNFBP sector. Though the
information is sector specific, you are recommended to go through the case
studies of the other sectors as well. That will certainly enhance your
understanding of money laundering and terrorist financing. Please note that
the suspicious activity indicators listed here are not exhaustive. Suspicious
transactions usually involve a number of indicators. In making assessment,
businesses should not rely on this alone and should consider all pertinent
information.
3.2 Lawyer, notary, other legal professional and accountant
DNFBPs, the lawyer, notary, other legal professional and accountant who prepare foror carry out transactions for their clients concerning the following activities as statedin FATF’s Recommendation 22 are specifically subject to its Recommendations10,11,12,15 and 17:
• Buying and selling of real estate;
• Managing of client money, securities or other assets;
• Management of bank, savings or securities accounts;
• Organization of contributions for the creation, operation or management of
companies;
• Creation, operation or management of legal persons or arrangements, and
buying and selling of business entities.
Accountant and legal professional provides a wide range of services, including
financial and tax advice, auditing, bookkeeping, company formation and
administration, trust, property transactions and introduction to banks, etc. While
17
these activities have their legitimate purposes, they are a very attractive gateway
which criminals/terrorists would want to use for laundering crime proceeds/financing
terrorism. Given the likelihood of being used for money laundering/terrorist financing
purposes, accountants must be vigilant at all times and report anything suspicious to
BFIU.
3.2.1 Suspicious Activity Indicators
The following are some indications of potentially suspicious activities:
(i) Complex corporate structures which obscure the ultimate beneficial
ownership;
(ii) Frequent changes in the legal structure of a client’s company which has no
clear Justifications;
(iii) The level of activities of a client’s company does not match its
volume/frequency of fund flows;
(iv) Over/under invoicing of goods/services;
(v) Payments received from an un-related party without supporting business
activities;
(vi) Clients are “politically exposed persons” (PEPs) or their relatives/friends;
(vii) A dormant client suddenly becomes active; and
(viii) Large/frequent international payments without underlying business
transactions.
(ix) Clients come from jurisdictions which lack appropriate AML/CFT laws,
regulations or other counter-measures;
(x) Clients come from jurisdictions where corruption or other criminal activities
are of significant concern;
18
3.2.2 Some case examples:
Example 1: Business entity misused for money laundering
Mr. X was a drug trafficker who had to dispose of a large amount of cash. He decided
to employ an accountancy firm to set up a company, purportedly for trading
purposes.
Through the introduction of the accountancy firm, company bank accounts were
opened. Cash deposits were made into the bank accounts both by Mr. X and staff of
the accountancy firm.
Some of the money was then used to invest in the local property market while
certain amount was sent overseas for purchase of electronic components which were
then shipped to the local market for sale. By such activities, Mr. X successfully
laundered huge amount of money earned through illegal activities.
Key Message
Professional service of accountants and their professional standing may be seen by
criminals as vehicles to be abused in order to launder crime proceeds.
Example 2: Establishment of company/trust for money laundering terrorist
financing purposes
Mr. J and Mrs. J are citizens of a foreign country. They visited another foreign
country and employed an accountancy firm to establish a limited company so that
they can take advantage of the local property market slow down and purchase luxury
property for long term investment purpose. They presented the firm with a US$50
million issued by ABC bank and requested that amount to be deposited into the
company account to be opened. Additionally, they also requested to the accountancy
firm to set up a trust for charitable purposes. It was intended that 5% of the money
19
would be transferred to the trust. Later on, the firm received instruction from the
couple that they had changed their mind and wanted to invest the money elsewhere.
They requested the money be telegraphic transferred to their bank account in
another country.
As to the money in the trust, Mr. J and Mrs. J requested that US$2 million be split
into four equal amounts and sent to charity organizations for medical relief purposes.
Moreover, an amount of US$5,000 be sent to a country of terrorist concern for
charitable purpose.
Key Message
By abusing the professional service of the accountancy firm and the professional
status of accountants, criminals could easily set up companies/trusts for money
laundering and terrorist financing purposes.
28
Example 3: PEPs abuse accounting service for money laundering purpose
Mr. K was a senior politician and industrialist of country A which has a major
corruption problem. Through his corrupt activities, Mr. K had in his possession a
large amount of cash that he wanted to launder. Mr. K went to Hong Kong and asked
a local accountancy firm to establish a limited company for him. After company bank
accounts were opened, substantial deposits were made for the purchase of shares in
the local stock market. The bank deposits were also used to purchase real estate in
Hong Kong. Through these activities, a total of US$10 million was laundered.
Key Message
Accountants should exercise great care to prevent PEPs from abusing their
professional services for money laundering purposes.
293.3 Real Estate Developer
The purchase of real estate is commonly used as part of the last stage of money
laundering (integration). Large amount of illicit funds can be concealed in such a
20
purchase, which in turn projects an appearance of financial stability for the criminal.
Hence, estate agents should be vigilant in exercising the CDD by obtaining
customer’s information and should comply with the record-keeping requirement and
internal control procedures as stipulated by the Estate Agents Authority.
3.3.1 Suspicious Activity Indicators: Customer Identification
(i) Incommensurate background of property purchaser/seller (e.g. profession
and age versus the value of transaction);
(ii) Property purchaser/seller is a shell company/offshore company (residential
address/ registered in a tax haven e.g. British Virgin Islands); and
(iii) Transactions conducted by a third party (e.g. under a power of attorney).
3.3.2 Suspicious Activity Indicators: (the Transaction)
(i) Cash transactions in large amounts;
(ii) Substantial difference between the transaction price and the market price
without apparent reason;
(iii) Unknown source of funds for purchasing the property;
(iv) Unusually short period for completion of sale and purchase; and
(v) Unreasonably high commission is offered to the estate agent.
3.3.3 Suspicious Activity Indicators: Others
(i) The person who negotiates the transaction and the ultimate purchaser are
not the same person;
(ii) Frequent sale and purchase of properties within related parties; and
(iii) Unusual ownership history of a property.
3.3.4 Some case examples:
Example 1: Use of Shell Company in sale and purchase of property to
conceal crime proceeds
21
A drug trafficker Mr. X purchased a property at US$ 6.5 million. He made a down
payment of US$ 2.5 million in cash and took out a US$ 4 million mortgage. Three
months later, he sold the property to a shell company Y, which he controlled. The
company Y further sold the property to an innocent third party for the original
purchase price in a month. By this means, Mr. X concealed his proceeds of crime in a
shell company Y, and thereby attempted to disguise the origin of the original
purchase funds.
Key Message
This case illustrates that the sale and purchase of property by a shell company could
be used to conceal crime proceeds. The ownership history of a property can be an
indicator of suspicion.
Example 2: Direct purchase of property to launder crime proceeds
A drug trafficker Mr. Z had made several investments in real estate and was planning
to buy a hotel. An assessment of his financial situation did not reveal any legal
source of income. He was subsequently arrested and charged with an offence of
money laundering. Further investigation substantiated the charge that part of the
invested funds were proceeds of his own drug trafficking.
Key Message
This case illustrates that the purchase of real estate is commonly used as part of the
last stage of money laundering (integration). Such a purchase offers the criminal
an investment which gives the appearance of financial stability. The purchase of a
hotel has an added advantage for money laundering as hotel business is often a cash
intensive business.
Example 3: Unusual property transactions between family members of a
drug trafficker via a third party
A drug trafficker Mr. A was arrested. Fearing that his assets would be restrained and
confiscated, he asked his wife to immediately arrange to sell their property to a
friend, who would then sell the property back to his sister-in-law. It is worth noting
22
that these consecutive sale and purchase transactions were arranged through the
same estate agent who just turned a blind eye on the suspicious circumstances of
these property transactions.
Key Message
This case illustrates that unusual property transactions would be an indicator for
money laundering. The estate agent should made a suspicious transaction report to
the BFIU.
Example 4: Direct purchase of property to launder crime proceeds by family
member
Mr. B in Country S was the leading member of a syndicate involving smuggling of
refugees. From 1998 to 2003, Mr. B received 81 money orders for a total amount of
US$ 40 million from 14 different individuals from four foreign countries. This money
was believed to be derived from organizing illegal migration. The main portion of this
money remained in Country S and was used for investment into real estate and was
also distributed among other syndicate members. In 2000 alone, Mr. B’s wife who
did not file an income tax statement for that year used US$ 14 million to buy real
estate. Investigation revealed that Mr. B and Mrs. B had made transactions
representing several times their apparent incomes. They were finally charged and
convicted, in connection with the amount of US$ 40 million, for organizing illegal
migration.
The case showed the following patterns:
(i) Very high fees were paid for the money transfers which could have
been executed at much lower costs; such economically illogical
transactions are, as a rule, highly likely to be connected with money
laundering; and
(ii) The monies spent by Mrs. B to buy real estate amounting to US$ 14
million did not originate from her, but was given to her by Mr. B, who
received it for organizing illegal migration. In the real estate purchase
contract, the buyer was Mrs. B. That was to conceal the source and
the real beneficiary of the dirty money.
23
Key Message
This case illustrates that the purchase of real estate by relatives of criminals is not
uncommon as a practice for money laundering.
3.4 Dealers in Precious Metals or Stones
Precious metals and stones, particularly gold and diamond, offer the advantage of
having a high intrinsic value in a relatively compact form. They can be “cashed”
easily in most areas of the world. Hence, they are vulnerable to be used in money
laundering for their ease to be hidden and transported. Terrorist groups have
engaged in the gemstone trade for a long time. Historically, they engaged
extensively in the profit-making trade in diamond, tanzanite, amethyst, ruby and
sapphire. However, according to recent intelligence, gemstones, diamonds in
particular, are being used as a way of storing terrorist assets outside the formal
financial sector. The aim is no longer only in turning a profit but also acquiring as
many stones as possible with crime proceeds that are being kept out of banks and
businesses.
3.4.1 Suspicious Activity Indicators for retail market
(i) Incommensurate background of buyer (e.g. profession and age of buyer
versus value of transaction and type of precious stones and metals
involved);
(ii) High value transactions conducted in cash but not in other popular and safe
methods of payment (e.g. credit card or cheque);
(iii) Unusual payment method (payment by negotiable instruments in bearer
form, e.g. travelers cheques and payment orders so that the source of fund
cannot be traced);
24
(iv) Unusual buying behavior/pattern (e.g. repeated purchases of luxury
products without apparent reasons);
(v) Unusual behavior of the person or persons conducting the transactions (e.g.
unusual nervousness); and
(vi) Request for over/under-invoicing of purchases.
3.4.2 Suspicious Activity Indicators for wholesale market
(i) Incommensurate background of buyer/seller (e.g. profession and age of
buyers versus value of transaction and type of precious metals and stones
involved);
(ii) Unknown business background of buyer/seller;
(iii) Transactions conducted by third party (e.g. under a power of attorney);
(iv) Transactions conducted by shell company/ offshore company (business
address/ registered in a tax haven e.g. British Virgin Islands);
(v) Unknown source of precious metals/stones;
(vi) Unknown purpose of transactions;
(vii) Buyers/Sellers apparently not having reasonable expertise/experience in the
precious metals/stones sector;
(viii) Abnormally low pricing or with substantial discount in order to speed up
transactions;
(ix) Large amount transaction from an unfamiliar dealer;
(x) Request for over/under-invoicing of purchases;
(xi) Unusual payment method (payment by third party/ payment by negotiable
instruments in bearer form, e.g. travelers cheques and payment orders, so
that the source of fund cannot be traced);
25
(xii) Buyers/Sellers refuse to use other means of payment other than cash, while
cash may be in foreign currencies (or in different foreign currencies) without
apparent reasons; and
(xiii) Unusual business pattern (e.g. business transactions of a particular dealer
are rather frequent when compared to the trading history or to that of other
dealers/a sudden increase in the trading volume without apparent reasons).
3.4.3 Some case examples:
Example 1: Retail gold purchases serve as direct method of laundering
A foreign national bought 265 ingots of gold with a total value of about US$2.5
million and paid in cash in Country X. These transactions took place over a period of
18 months. The buyer, who did not have a bank account, alternated temporary jobs
with periods of unemployment, claimed that he was acting on behalf of a third party,
who was probably involved in organized and serious crimes.
Key Message
This case illustrates the direct purchases of precious metal by a buyer of
incommensurate background to disguise the source of crime proceeds.
Example 2: Direct purchase of precious stones with crime proceeds
A lawyer of Country Y absconded with millions of US dollars from his “client escrow”
account. Investigation revealed that part of these funds was used to purchase loose
diamonds and jewellery from a local jeweler in Country Y.
Key Message
This case illustrates the use of direct purchase of precious stones to launder the
crime proceeds. In particular, it shows the way for an absconder to conceal and
move the proceeds of crime across different countries.
26
Example 3: Diamond trading used as a cover for laundering illicit funds
A company in Country Z, with its registered office in an offshore centre and diverse
businesses, encompassed diamond trading. The account of this company in Country
Z was found to have numerous international funds transfers in foreign currencies
originating from a tax haven. The funds, in very large sums, were then
systematically and immediately withdrawn in cash. These withdrawals were made in
large denominations of foreign currencies by the authorized signatory of the account
who was the director of a number of companies which were also active in diamond
trading. Given the regularity of these systematic fund flows, which were deviated
from the usual practice in the diamond sector, it appeared that this account was only
used as a channeling account with the aim of disguising the origin and ultimate
destination of the funds. Upon investigation, the funds were found to be associated
with illicit activities.
Key Message
This case illustrates that the diamond trading may be used as a smokescreen for the
laundering of crime proceeds.
27
3.5 Trust and Company Service Providers
Trust and corporate entities provide the basis for a range of economic activities in
modern economies. Although they have many legitimate applications (such as
business finance or estate and tax planning), they can be misused by criminals for
illegal purposes such as hiding the ultimate beneficial ownership of assets,
legitimatizing the integration of crime proceeds with the financial system, or
layering of crime proceeds through various forms of investment such as in the
stock market.
Trust and corporate structures may be set up by terrorists and used wholly or partly
for financing of terrorist activities. Trust, for example, may be established for
charitable purposes and subsequently misused to finance terrorist activities.
Trust and company service providers are under AML/CFT regulations– when theyprepare for or carry out transactions for a client concerning the following activities:
acting as a formation agent of legal persons;
acting as (or arranging for another person to act as) a director or secretary ofa company, a partner of a partnership, or a similar position in relation toother legal persons;
providing a registered office, business address or accommodation,correspondence or administrative address for a company, a partnership orany other legal person or arrangement;
acting as (or arranging for another person to act as) a trustee of an expresstrust or performing the equivalent function for another form of legalarrangement;
acting as (or arranging for another person to act as) a nominee shareholderfor another person.
3.5.1 Suspicious Activity Indicators
The following are some indications of potentially suspicious activities:
(i) Multi-jurisdictional and/or complex structure of corporate entities and/or
trusts are established without valid grounds;
28
(ii) Payments (local or foreign) are made or received without a clear connection
to the actual activities of the corporate entity;
(iii) Use of off-shore bank accounts without legitimate economic necessity;
(iv) Customer’s unwillingness or refusal to provide information/documentary
proof on himself/herself or beneficial owner(s) of trusts/ companies;
(v) Sources and/or destinations of funds are unknown;
(vi) Transactions are heavily cash-based which should normally be carried out
through other payment facilities;
(vii) Customer’s background is not commensurate with the value of transactions
carried out by the customer or on behalf of the company;
(viii) A company is established primarily for the purpose of collecting funds from
various sources which are then transferred to local/foreign bank accounts
that have no apparent ties with the company;
(ix) Incorporation of a company by a non-resident with no links or activities in
the jurisdiction where the company is established; and
(x) The money flow generated by a company is not in line with its underlying
business activities.
3.5.2 Some case examples:
Example 1: A structure of trusts misused for fraud
Mr. X was a trust service provider in Jurisdiction A. He established a number of
domestic trusts to carry out a fraud scheme, defrauding over 500 investors of about
US$ 56 million. The scheme involved Mr. X, in the name of the domestic trusts,
wiring large amounts of money to domestic and off-shore bank accounts. The money
came from the 500 odd innocent investors who were convinced to form trust
organizations and to place their savings into these trusts, which were tied to the off-
shore bank accounts. The investors were promised favorable returns and reduced tax
liabilities as the money was deposited into off-shore bank accounts. Once the
29
investors put in their money to the trusts, Mr. X would inform them that the money
would be managed by an international investment agency. In fact, this has never
happened and Mr. X and his associates defrauded the trust owners (investors).
Key Message
The above case illustrates that a structure of trusts together with off-shore bank
accounts can give the appearance of a legitimate purpose, which can then be used to
lure investment from innocent third parties for illegal purpose.
Example 2: Overseas trust to mask the beneficial owner of assets
An overseas resident (Mr. Y) living in Jurisdiction B opened a bank account for the
purpose of receiving a substantial transfer from Jurisdiction C. The transfer
originated from the closure of a bank account of an overseas trust, which has been in
existence for one month and managed by lawyers in Jurisdiction C. As soon as the
money was credited to the newly-opened bank account, Mr. Y requested to withdraw
the amount in cash and close the bank account.
Key Message
The beneficial owner of the substantial sum of money was masked by the overseas
trust. If the lawyers in Jurisdiction C have performed proper “customer due
diligence”, the reasons for forming the trust and its subsequent closure should
trigger suspicion for filing a “Suspicious Transaction Report” with the competent
authority concerned.
Example 3: Corporate vehicle misused to channel bribes
A railway builder (Company Z) in Jurisdiction K has employed a law firm to form a
complex structure of companies so that bribes can be transferred through these
companies’ bank accounts to officials in various other jurisdictions to thank them in
“facilitating” the award of contracts to Company Z. Whilst there was no legitimate
business in these series of companies, the overseas money transfers were
30
substantial. After the bribes were transferred, the companies and their bank
accounts became dormant.
Key Message
Corporate vehicles were used to channel bribe payments so as to veil the connection
between the party which offers bribe and their ultimate recipients.
Example 4: Multi-jurisdictional corporate structure to launder money
Mr. B traveled to Jurisdiction M and went to Notary A to set up a company solely for
the purpose of buying real estate. The shareholders of the company were family
members of Mr. B, who also resided abroad. Shortly after incorporation, Company X
bought a luxury detached house in Jurisdiction M. The property was paid by several
transfers from an overseas Company Y. Despite repeated requests, Mr. B refused to
provide details of Company Y to Notary A.
Key Message
Multi-jurisdictional corporate structures and international movement of funds are
readily available vehicles to conceal the source of money for investment and the
beneficial owner of the assets.
31
Chapter 4
Compliance Programs for DNFBPs
4.1 Introduction
A DNFBP is required to establish a complete compliance programs deterrent to the
AML/CFT and also need to monitor the effective implementation of such compliance
program in line with the local law which illustrates in this Guideline. Such compliance
program devised by the relevant policies, procedures, processes and controls
designed to prevent and detect potential money laundering, terrorist financing and
related crimes. A complete compliance program includes-
Commitment for Compliance Regime;
Risk Assessment;
Customer Due Diligence;
Record keeping;
Training and awareness;
Employee screening;
Detection of unusual and/or suspicious transactions;
Monitoring and Reporting; and
Internal Controls.
4.2 Commitment for AML/CFT Compliance Regime :
A DNFBP should have a strong commitment to comply with the local AML/CFT laws
and regulations. They have to designate a Compliance Officer/Focal Point for
prevention of money laundering and terrorism financing issues. Compliance
Officer/Focal Point will be responsible to implement AML/CFT laws and regulations
within the institutions.
32
4.3 Risk Assessment
A DNFBP should adequately assess its AML/CFT risks in relation to its clients, its
business, products and services, geographical exposures and appropriately define
and document its risk-based approach. It should-
Understand what money laundering and terrorist financing is and the potential
the business to be misused by money launderers and those involved with
financing terrorism.
Identify the risks associated with its business, products and services that are
provided to its clients.
Assess the risks related to such business, products, services and geographic
areas
Understand the general and specific ML and TF risks faced by the business.
Take steps to manage the identified ML and TF risks, including action to
mitigate the risks and apply measures that are commensurate with the risks.
Maintain a record of the nature and scope of the risk assessment and the
management of those risks.
The BFIU will, from time to time issue separate guidance on implementing the ‘risk-
based approach’ for specific business sectors and professions. ML and TF risk
assessment and risk mitigation within your business will also be subject to
compliance inspection under the BFIU compliance and supervision functions of the
BFIU.
4.4 Client Due Diligence (CDD)
A DNFBP required identifying its clients properly and maintaining client identification
records including reliable documentation; which is essential part of Know Your
Customer (KYC). Such client identification records will require to be made available
to BFIU or to any Competent Authority promptly upon request.
33
4. 4.1 Identification of clients
4. 4.1.1 A DNFBP should identify and verify the identity of a Client that is a natural
person, using relevant and reliable independent source documents, data or
information (Identification Data). If the client is not a natural person the
DNFBP should also have to identify and verify the name, address and legal
status of the client by obtaining proof of incorporation issued by the relevant
authority, or similar formal evidence of establishment and existence. A
DNFBP should also need to undertake followings-
o A DNFBP required to verify the identity of any person acts as a client.
This include full details of a customer of DNFBPs irrespective
of individual or entity, one or more photo ID documents or
registration/incorporation certificates, contact details etc.;
o A DNFBP required to verify any person purporting to act on behalf of
the client who is also known as the beneficial owner. A DNFBP
required to take reasonable measures to verify the identity of
the beneficial owner using identification data obtained which
recognizes who the beneficial owner(s) are; and
o A DNFBP recommended to understand the ownership and control
structure of the client;
o Establish and record the purpose and intended nature of the
business relationship; and
o A DNFBP is required to ensure that identification data is kept up-to-
date and may review the records of higher risk customers or
business relationships as appropriate.
4.4.1.2 A DNFBP is required to, at a minimum, collect one piece of formal
identification which have been certified appropriately and one formal
document that will verify the physical address of the client. Where
the client is a legal person, a DNFBP is recommended to require
documentary evidence of the continuing existence of the legal
person (good standing certificate) and a certified copy of acceptable
identification and address documentation to verify the address.
34
4.4.1.3 Regarding various individuals and entities, it is recommended that DNFBP
should know prior to establishing customer relationships-
A.) Who is this person?
B.) What type of activity does he/she want to conduct with my company?
C.) What type of pattern of activity can I expect?
D.) Is he/she representing a third party?
E.) How can I verify the information presented to me?
4.4.2. Timing of CDD
CDD obligations (Know your customer and its business, record keeping)
vary from one to another agency under Reporting Organizations included as
DNFBPs. Some business needs to comply with KYC requirements in every
transaction, where some other needs to comply with KYC after a certain
threshold of transaction. KYC requirements will be applicable for different
organizations under DNFBPs are as follows:
Real Estates Developers: When they are involved in transactions for a client
concerning the buying and selling of real estate, they need to conduct CDD.
Dealers in Precious Metals or Stones: When they engage in any transactions with
any customers equals to or above taka 10 lakhs, they need to conduct CDD.
35
Lawyer, notaries other legal professions: When they prepare for or carry out
transactions for their clients concerning the following activities, need to conduct
CDD:
buying and selling of real estate;
managing of client money, securities or other assets;
management of bank, savings or securities accounts;
organization of contributions for the creation, operation or management of
companies;
creation, operation or management of legal persons or arrangements, andbuying and selling of business entities.
Trust and company service providers: when they prepare for or carry outtransactions for a client concerning the following activities:
acting as a formation agent of legal persons;
acting as (or arranging for another person to act as) a director or secretary ofa company, a partner of a partnership, or a similar position in relation toother legal persons;
providing a registered office, business address or accommodation,correspondence or administrative address for a company, a partnership orany other legal person or arrangement;
acting as (or arranging for another person to act as) a trustee of an expresstrust or performing the equivalent function for another form of legalarrangement;
acting as (or arranging for another person to act as) a nominee shareholderfor another person.
Apart from the above, a DNFBP is required to undertake satisfactory CDD measures
when:
o There is any suspicion of money laundering , terrorist financing; or
o The DNFBP has doubts about the integrity or adequacy of previously
obtained client identification data.
o Updating the CDD information on an annual basis
36
4.4.3 Enhanced Due Diligence (EDD)
A DNFBP should perform enhanced due diligence (EDD) for higher risk categories of
customers, business relationships or transaction.
A DNFBP required to conduct enhanced due diligence (EDD) measures when there is
a suspicion of Money Laundering, Terrorist Financing or Fraud activity, or where high
risk circumstances are identified.
4.4.4 Identifying and Dealing with Politically Exposed Persons (PEPs)
4.4.4.1 As per FATF, PEPs refers
PEPs are individuals who are or have been entrusted with prominent publicfunctions of a foreign country, for example Heads of State or of government,senior politicians, senior government, judicial or military officials, seniorexecutives of state owned corporations, important political party officials.
The definition of PEPs is not intended to cover middle ranking or more juniorindividuals but it also cover the family members and/or close associates of aPEP. Another important thing is that not only client, a PEP but also may be abeneficial of an account.
4.4.4.2PEPs account or transaction must be marked as High Risk and need to
consider Enhanced Due Diligence (EDD) measures for them.
4.4.5 Ongoing Due Diligence
A DNFBP required to conduct ongoing due diligence on the business relationship and
apply scrutiny to transactions undertaken throughout the course of that relationship
to ensure that the transactions being conducted are consistent with the DNFBP’s
knowledge of the particular clients, their business and risk profile, including, where
necessary, the source of funds.
37
4.4.6 Non face –to – face customer
When conducting non-face-to-face business with clients that have not been
physically present; for the purposes of identification and verification, a DNFBP is
advised to have policies, procedures, systems and controls in place to manage
specific risks associated with such non-face to face business, relationships or
transactions.
4.4.7 Reliance of Third Party
A DNFBP may outsource the technical aspects of Compliance process only to qualified
service providers duly regulated and supervised in the country where they are based
and incorporated, as long as such outsourcing allows for:
o The DNFBP to promptly obtain from the Compliance Service Provider
the CDD information; and
o The DNFBP’s ability to obtain copies of Identification Data and other
relevant documentation relating to CDD requirements promptly upon
request.
o In that case ultimate responsibility for client identification and
verification, and any other outsourced function, is that of the DNFBP
regardless of the arrangements entered with any Compliance Service
Provider.
4.4.8 Suspicious transaction/activity monitoring & Reporting
A DNFBP is required to monitor routinely to detect suspicious activity, and is
recommended to, at a minimum; examine the background and purpose of the
following, regardless the amount involved:
Complex or unusually large transactions, which have no apparent visible
economic or lawful purpose.
Transactions outside the usual pattern of the client’s activity as known to the
DNFBP.
38
Transactions that are deemed to be of high risk with regard to a client or
business relationship, or as they relate to high risk geography, products or
services.
Transactions, clients, or business relationships that cause the DNFBP to have
reasonable grounds to suspect money laundering, terrorist financing.
Note that reporting obligation of STR will be only applicable when theDNFBPs are engaged in the specified transaction or activities as mentionedin paragraph 4.4.1.2 of this Guideline.
All reports of suspicious transaction should be filed as per the format in theAnnexure-1 or circulars issued by BFIU from time to time. All reports to be sent tothe address below:
General Manager
Bangladesh Financial Intelligence Unit (11th Floor)
Bangladesh Bank
Head Office, Motijheel
Dhaka-1000
4.4.9 Cash Transaction Report (CTR)
Cash Transaction Reporting (CTR) obligation is only applicable for few
DNFBPs. For example, in Bangladesh, dealers in precious metal and stones
and real estate developers are required to submit Cash Transaction Report
(CTR).
Such reporting is also threshold basis. While any dealers in precious metal
and stones and real estate developers are engaged in cash transaction equal
or over taka 10 lakhs, they need to submit Cash Transaction Report (CTR).
BFIU will supply the reporting format from time to time.
4.4.10 Other issues
4.4.9.1 Ensure it is aware of new or developing technologies that might favor
anonymity and take measures to prevent their use for the purpose of Money
Laundering, Terrorist Financing.
39
4.4.9.2 A DNFBP should in place a screening mechanism whether the nameof the client (individual or entity) listed under United NationsSecurity Council Resolution 1267 and its successors, 1373, 1540,1718, 1737. A DNFBP should also consider such local sanction list asprovided by BFIU or GoB.
4.4.9.3 If a DNFBP identify any name of a prospective client mentioned the aboveparagraph, it should not entertain that relationship and immediately notifythe matter to BFIU. If the persons or entities mentioned in the aboveparagraph are found as a client, a DNFBP should immediately freezethat account without delay, where applicable, without prior noticeand immediately notify BFIU.
4.4.9.4 DNFBP should also respond with any counter measures on any individuals,groups or entities or states, called by FATF or by international competentauthorities.
4.5 Non –Disclosure of Reporting
DNFBPs, their directors, officers and employees (permanent and temporary) arerequired not to disclose to the subject or any person other than one with a legitimateright or need to know, the fact that a STR/SAR or related information has been orwill be reported as per section 6 of MLPA, 2012.
4.6 “Safe Harbor” provisions for reporting
MLPA, 2012 encourage DNFBP to report suspicious transactions/activities byprotecting them and their employees from any criminal and civil suits when theyreport suspicious transactions/activities in good faith to competent authority i.e.BFIU. Section (28) of MLPA, 2012 provides the safe harbor for reporting. However, ifa DNFBP fail to report STR/SAR they will be subject to punishment under section 25(2) of MLPA, 2012.
4.7 Regulatory Cooperation
Where a DNFBP receives a request for information from any Competent Authority
regarding enquiries into potential Money Laundering, Terrorist Financing or related
activity carried on, A DNFBP is required to respond promptly.
40
When a DNFBP receives request for cooperation from competent investigating
authority, it required to provide assistance as law permit.
However, any failure to cooperate with BFIU and/or fail or refuse to provideassistance to the competent law enforcement agencies is punishable under MLPA,2012.
4.8 Staff Awareness and Training:
A DNFBP is required to establish on-going and up-to-date relevant AML/CFT training
for their employee's that appropriately covers their obligations under the laws,
regulations, policy procedures, processes and controls.
DNFBP is required to establish measures to ensure that employees are kept informed
of up-to-date risk vulnerabilities, including information on current AML/CFT
techniques, methods and trends.
A DNFBP is required to conduct training program for its 100% staff and also should
arrange refreshers training after a certain interval (eg.1/2year). Some cases, the
industry specific institutions may arrange training jointly or Self Regulatory
Organization (SRO) for example, Bangladesh Bar Association, Bangladesh Jeweler's
Association, REHAB, ICAB may arrange training for their specific sectors.”
4.9 Record Keeping
A DNFBP is required to maintain all records collect through CDD process and on any
transaction for at least five years (5) years following the establishment of the
relationship or the completion of the transaction, regardless of whether the account
or business relationship is ongoing or has been terminated.
A DNFBP is required to maintain information (including training records and related
reports), correspondence and documentation for client identification and verification,
and associated due diligence for a period of at least five (5) years from the end of
the business relationship with the client or the last transaction conducted.
Annexure -1
Suspicious Transaction Report (STR)(FOR DNFBPs)
A. Reporting Institution :1. Name of the Institutions:
2. Name of the Branch (if applicable):
B. Details of Report:1. Date of sending report:
2. Is this the addition of an earlier report? Yes No
3.If yes, mention the date of previous report
C. Suspect Details :1. Name of the client:
2. Client Code:
3. Nature of relationship:
4. Date of commencing:
5. Address:
6. Profession (in details):
7. Nationality:
8. Other business:
9. Father’s name:
10. Mother’s Name:
11. Date of birth:
12. Contact: Mobile No/Email.13. Bank account details (if known):
14. TIN (if known):
D. Reasons for considering the transaction(s) / activity as unusual/suspicious?(Mention summery of suspicion and consequence of events)
(Use separate sheet if needed)a. Identity of Clients
b. Activity in client
c. Background of Client
d. Multiple/complex transaction
e. Nature of transaction
f. Value of transaction
g. Other reason (Pls. Specify)
E. Name of the associates and volume of transaction
(Mention summery of suspicion and consequence of events)(Use separate sheet if needed)
Signature :(Proprietor/ Authorized officer)Name :Designation :Phone :Date :
*please attached all relevant documents as far as possible.
Annexure-2
†iwR÷vW© bs wW G Ñ1
evsjv‡`k †M‡RUAwZwi³ msL¨v
KZ…©cÿ KZ©©„K cÖKvwkZ
ÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑчmvgevi, †deªæqvix 20, 2012
ÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑÑ
evsjv‡`k RvZxq msm`
ZvwiL, 20 †deªæqvix, 2012/08 dvêyb, 1418
msm` KZ…©K M„nxZ wbgœwjwLZ AvBbwU 20 †deªæqvix, 2012 (08 dvêyb, 1418) Zvwi‡L ivóªcwZi m¤§wZ jvfKwiqv‡Q Ges GZØviv GB AvBbwU me©mvavi‡Yi AeMwZi Rb¨ cÖKvk Kiv hvB‡Z‡Q t-
2012 m‡bi 5 bs AvBb
gvwbjÛvwis cÖwZ‡iva msµvšÍ we`¨gvb AvBb I Aa¨v‡`k iwnZµ‡g GZ &msµvšÍ AvBb cybtcÖYq‡biD‡Ï‡k¨ cÖYxZ AvBb
†h‡nZz gvwbjÛvwis I mswkøó Ab¨vb¨ Aciva cÖwZ‡iva Ges Dnv‡`i kvw Íi weavbmn Avbymw½K welqvw` m¤ú‡K©weavb cÖYq‡bi D‡Ï‡k¨ gvwbjÛvwis cÖwZ‡iva msµvšÍ wea¨gvb AvBb I Aa¨v‡`k iwnZµ‡g GZ &msµvšÍ AvBb cybtcÖYqbKiv mgxPxb I cÖ‡qvRbxq;
†m‡nZz GZ &Øviv wbgœiƒc AvBb Kiv nBj t-
1| mswÿß wk‡ivbvg I cÖeZ©b| ---
(1) GB AvBb gvwbjÛvwis cÖwZ‡iva AvBb, 2012 bv‡g AwfwnZ nB‡e|
(2) GB AvBb 3 gvN, 1418 e½vã/16 Rvbyqvix, 2012 wLª÷vã ZvwiL nB‡Z Kvh©Ki nBqv‡Q ewjqv MY¨ nB‡e|
2| msÁv| --- welq ev cÖms‡Mi cwicš’x †Kvb wKQz bv _vwK‡j, GB AvB‡b---
(K) ÒA_© ev m¤úwË cvPviÓ A_©-
(1) †`‡k we`¨gvb AvB‡bi e¨Z¨q NUvBqv †`‡ki evwn‡i A_© ev m¤úwË †cÖiY ev iÿY; ev
(2) ‡`‡ki evwn‡i †h A_© ev m¤úwˇZ evsjv‡`‡ki ¯v_© iwnqv‡Q hvnv evsjv‡`‡k Avbqb‡hvM¨ wQj Zvnvevsjv‡`‡k Avbvqb nB‡Z weiZ _vKv; ev
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(3) we‡`k nB‡Z cÖK…Z cvIbv †`‡k Avbqb bv Kiv ev we‡`‡k cÖK…Z †`bvi AwZwi³ cwi‡kva Kiv;
(L) ÒA_© g~j¨ ’vbvšÍiKvixÓ A_© Ggb Avw_©K †mev †hLv‡b †mev cÖ vbKvix GK ’v‡b bM` UvKv, †PK, Ab¨vb¨Avw_©K BÝUyª‡g›U (B‡j±ªwbK ev Ab¨wea) MÖnY K‡i Ges Ab¨¯’v‡b myweav‡fvMx‡K bM` UvKv ev Avw_©KBÝUyª‡g›U ev Ab¨ †Kvbfv‡e mgcwigvb g~j¨ cÖ`vb K‡i;
(M) ÒAcivajä AvqÓ A_© cÖZ¨ÿ ev c‡ivÿfv‡e m¤ú„³ Aciva nB‡Z AwR©Z, D™¢zZ m¤úwË ev Kv‡ivAvqËvaxb ev wbqš¿Yvaxb G ai‡bi m¤úwË;
(N) ÒAeiæ×Ó A_© GB AvB‡bi AvIZvq Dchy³ KZ©„cÿ KZ©„K †Kvb m¤úwË A ’vqx wfwˇZ mswkøó KZ…©cÿ evAv`vj‡Zi wbqš¿Y Avbqb Kiv hvnv Av`vjZ KZ©„K ev‡RqvßKi‡Yi PzovšÍ wm×všÍ MÖn‡Yi gva¨‡g wb®úwËKiv nB‡e;
(O) ÒAjvfRbK ms ’v/cÖwZôvb (Non-Profit Organistion)” A_© †Kv¤úvbx AvBb, 1994 (1994 m‡bi18 bs AvBb) Gi aviv 28 Gi Aaxb mb`cÖvß †Kvb cÖwZôvb;
(P) ÒAvw_©K BÝUyª‡g›UÓ A_© mKj Kv¸‡R ev B‡jKUªwbK `wjjvw` hvnvi Avw_©K g~j¨ iwnqv‡Q;
(Q) Ò Avw_©K cÖwZôvbÓ A_© Avw_©K cÖwZôvb AvBb, 1993 (1993 m‡bi 27 bs AvBb) Gi aviv 2(L) GmsÁvwqZ Avw_©K cÖwZôvb;
(R) ÒAv`vjZÓ A_© †¯úkvj RR Gi Av`vjZ;
(S) Ò †µvKÓ A_© GB AvB‡bi AvIZvq Av`vjZ KZ©…K †Kvb m¤úwË A ’vqx wfwˇZ mswkøó KZ…©cÿ evAv`vj‡Zi wR¤§vq Avbqb Kiv hvnv & vjZ KZ©„K PzovšÍ wm×všÍ MÖn‡bi gva¨‡g wb®úwË Kiv nB‡e;
(T) Ò MÖvnKÓ A_© evsjv‡`k e¨vsK KZ©„K mgq mgq msÁvwqZ †Kvb e¨w³ ev e¨w³eM© A_ev mËv ev mËvmg~n;
(U) ÒUªv÷ I †Kv¤úvbx †mev cÖ vbKvixÓ A_© †Kvb e¨w³ ev e¨emv cÖwZôvb hvnv Ab¨ †Kvb AvB‡b msÁvwqZKiv nq bvB Ges †h ev hvnv †Kvb Z…Zxq cÿ‡K wb¤œewY©Z †h †Kv‡bv †mev cÖ vb Kwiqv _v‡K t
(1) ‡Kvb AvBbx mËv cÖwZôvi G‡R›U wnmv‡e `vwqZ¡ cvjb;
(2) ‡Kvb AvBbx mËvi cwiPvjK, mwPe wnmv‡e `vwqZ¡ cvjb ev Ab¨ Kvnv‡KI wb‡qvM Kiv ev Askx`vixe¨emv‡q Askx`vi wnmv‡e `vwqZ¡ cvjb A_ev mgch©v‡qi Ab¨ †Kvb `vwqZ¡ cvjb;
(3) ‡Kvb AvBbx mËvi wbewÜZ G‡R›U wn‡m‡e `vwqZ¡ cvjb;
(4) †Kvb G·‡cÖm Uªv‡÷I Uªvw÷ wn‡m‡e `vwqZ¡ cvjb ev Ab¨ Kvnv‡KI wb‡qvM Kiv;
(5) bwgbx †kqvi‡nvìvi ev Ab¨ †Kvb e¨w³i cwie‡Z© cwiPvjK wnmv‡e `vwqZ¡ cvjb ev Ab¨ †Kvbevw³‡K wb‡qvM cÖ vb Kiv;
(V) Ò Z`šÍKvix ms ’vÓ A_© ybx©wZ `gb Kwgkb AvBb, 2004 (2004 m‡bi 5 bs AvBb) Gi Aax‡b MwVZyb©xwZ `gb Kwgkb; Ges Kgwk‡bi wbKU nB‡Z Z`‡šÍi D‡Ï‡k¨ ÿgZvcÖvß Kwgk‡bi †Kvb Kg©KZ©v ev
Ab¨ AvB‡b hvnv wKQzB _vKzK bv †Kvb, Ab¨ †Kvb Z`šÍKvix ms ’vi Kg©KZ©vI Bnvi AšÍfy©³ nB‡e;
(W) ÒbM` UvKvÓ A_© †Kvb †`‡ki h_vh_ gy ªv wnmv‡e D³ †`k KZ©„K ¯xK…Z †Kvb avZe gy ªv I KvM‡Ri gy ªvI KvM‡Ri Ges Uªv‡fjvm© †PK, †cv÷vj †bvU, gvwb AW©vi, †PK, e¨vsK WªvdU,, weqvivi eÛ, †jUvi Ae†µwWU, wej Ae G·‡PÄ, †µwWU KvW©, †WweU KvW© ev cÖwgRwi †bvUI Dnvi AvšÍf©y³ nB‡e;
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(X) Òwb®úwËÓ A_© ÿq‡hvM¨, ªæZ cPbkxj A_ev wbw ©ó mg‡qi ci e¨envi A‡hvM¨ m¤úwË weµq ev Ab¨†Kvb AvB‡bi Aaxb aŸsm Kwievi Dc‡hvMx m¤úwË aŸsmKiY ev AvBbm¤§Zfv‡e cÖKvk¨ wbjv‡gi gva¨‡gn ÍvšÍi I AšÍf©y³ nB‡e;
(Y) Òev‡RqvßÓ A_© aviv 17 Gi AvIZvq †Kvb Av`vj‡Zi Av‡`‡ki gva¨‡g †Kvb m¤úvwËi ¯Z¡ ¯’vqxfv‡eiv‡óªi AbyKz‡j Avbqb Kiv;
(Z) Òevsjv‡`k e¨vsKÓ A_© Bangladesh Bank Order, 1972 (P.O.No.127 of 1972) Øviv ’vwcZBangladesh Bank;
(_) ÒexgvKvixÓ A_© exgv AvBb,2010 (2010 m‡bi 13 bs AvBb Gi aviv 2(25) G msÁvwqZ exgvKvix;
(`) Ò‡emiKvwi Dbœqb ms ’v (Non-Government Organisation)” A_© Soceties registrationAct, 1860 (Act No.XXI of 1860) Voluntary Social Welfare Agencies(Registration and Control) Ordinance, 1961 (Ordinance No. XLVI of 1961 ,Foreign Donations (Voluntary Activities” Regulation Ordinance, 1974 (OrdinanceNo. XLVI of 1978), Foreign Contributions (Rgulation) Ordinance, 1982(Ordianace No. XXXI of 1982) Ges gvB‡µv‡µwWU ‡i¸‡jUix A_wiwU AvBb, 2006 (2006m‡bi 32 bs AvBb) Gi AvIZvq Aby‡gvw`Z ev wbewÜZ cÖwZôvb hvnviv-
(1) ’vbxq Drm nB‡Z Znwej (FY, Aby`vb, AvgvbZ) MÖnY K‡i ev Ab¨‡K cÖ vb K‡i; Ges/ A_ev
(2) †h †Kvb ai‡bi ˆe‡`wkK mvnvh¨ ev FY ev Aby`vb MÖnY K‡i;
(a) Ò‰e‡`wkK gy ªvÓ A_© Foreign Exchange Regulation Act, 1947 (Act No. VII of 1947)Gi Section 2(d) ‡Z msÁvwqZ Foreing Ecchange.
(b) Òe¨vsK Ó A_© e¨vsK †Kv¤úvbx AvBb, 1991 (1991 m‡bi 14 bs AvBb) Gi aviv 5 (Y) G msÁvwqZe¨vsK †Kv¤úvbx Ges Ab¨ †Kvb AvBb ev AvB‡biAaxb e¨vsK wnmv‡e cÖwZwôZ †h †Kvb cÖwZôvbI BnviAšÍf©y³ nB‡e;
(c) Ògvwb †PÄviÒ A_© Foreign Exchange Regulation Act, 1947 (Act No. VII of 1947) GiSection 3 Gi Aaxb evsjv‡`k e¨vsK KZ©„K Aby‡gvw`Z ˆe‡`wkK gy ªv †jb‡`bKvix e¨w³ ev cÖwZôvb;
(d) Ògvwb jÛvwisÓ A_©Ñ
(A) wb¤œewb©Z D‡Ï‡k¨ Aciv‡ai mv‡_ m¤ú„³ m¤úwË ÁvZmv‡i ’vbvšÍi ev iæcvšÍi ev n ÍvšÍit
(1) Aciv‡ai Av‡qi A‰ea cÖK…wZ, Drm, Ae ’vb, gvwjKvbv I wbqš¿Y †Mvcb ev QÙe„Ë Kiv;A_ev
(2) m¤ú„³ Aciva msNU‡b RwoZ †Kvb e¨w³‡K AvBbMZ e¨e ’v MÖnY nB‡Z iÿvi D‡Ï‡k¨mnvqZv Kiv;
(Av) ˆea ev A‰ea Dcv‡q AwR©Z A_© ev m¤úwË wbqg ewnf©yZfv‡e we‡`‡k cvPvi Kiv;
(B) ÁvZmv‡i Acivajä Av‡hi A‰ea Drm †Mvcb ev Avovj Kwievi D‡Ï‡k¨ Dnvi n ÍvšÍi, we‡`‡k†cÖiY ev we‡`k nB‡Z evsjv‡`‡k †cÖiY ev Avbqb Kiv;
(C) †Kvb Avw_©K †jb‡`b GBiæcfv‡e m¤úbœ Kiv ev m¤úbœ Kwievi †Póv Kiv hvnv‡Z GB AvB‡bi AaxbDnv wi‡cvU© Kwievi cÖ‡qvRb nB‡e bv;
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(D) m¤ú„³ Aciva msNU‡b cÖ‡ivwPZ Kiv ev mnvqZv Kwievi AwfcÖvq †Kvb ‰ea ev A‰ea m¤úwËiiæcvšÍi ev ¯’vbvšÍi ev n ÍvšÍi Kiv;
(E) m¤ú„³ Aciva BB‡Z AwR©Z Rvbv m‡Ë¡I GB ai‡bi m¤úwË MÖnY, `L‡j †bIqv ev †fvM Kiv;
(F) GBiƒc †Kvb Kvh© Kiv hvnvi Øviv Acivajä Av‡qi A‰ea Drm †Mvcb ev Avovj Kiv nq;
(G) Dc‡i ewY©Z †h †Kvb Aciva msNU‡b AskMÖnY, m¤ú„³ _vKv, Aciva msNU‡b lohš¿ Kiv,msNU‡bi cÖ‡Póv A_ev mnvqZv Kiv, cÖ‡ivwPZ Kiv ev civgk© cÖ vb Kiv;
(e) Òwi‡cvU© cÖ vbKvix ms ’vÓ A_©-
(A) e¨vsK,
(Av) Avw_©K cÖwZôvb;
(B) exgvKvix;
(C) gvwb †PÄvi;
(D) A_© A_ev A_©g~j¨ †cÖiYKvix ev ’vbvšÍiKvix †h †Kvb †Kv¤úvbx ev cÖwZôvb;
(E) evsjv‡`k e¨vs‡Ki AbygwZµ‡g e¨emv cwiPvjbvKvix Ab¨ †Kvb cÖwZôvb;
(F) (1) ÷K wWjvi I ÷K †eªvKvi,
(2) †cvU©‡dvwjI g¨v‡bRvi I gv‡P©›U e¨vsKvi,
(3) wmwKDwiwU Kv÷wWqvb,
(4) m¤ú` e¨e ’vcK,
(G) (1) AjvfRbK ms ’v/ cÖwZôvb (Non Profit Organisation);
(2) ‡emiKvix DbœqY ms¯’v (Non Government Organisation);
(3) mgevq mwgwZ;
(H) wi‡qj G‡÷U †W‡fjcvi;
(I) g~jevb avZz ev c_‡ii e¨emv cÖwZôvb;
(J) Uªv÷ I †Kv¤úvbx †mev cÖ`vbKvix;
(AA) AvBbRxex, †bvUvix, Ab¨vb¨ AvBb †ckvRxex Ges GKvD‡›U›U;
(&AAv) miKv‡ii Aby‡gv`bµ‡g evsjv‡`k e¨vsK KZ©„K mg‡q mg‡q, weÁwß Rvixi gva¨‡g †NvwlZ Ab¨†Kvb cÖwZôvb;
(f) Ò wi‡qj G‡÷U †W‡fjcviÓ A_© wi‡qj G‡÷U Dbœqb I e¨e ’vcbv AvBb 2010 (2010 m‡bi 48 bsAvBb) Gi aviv 2(25) G msÁvwqZ †h †Kvb wi‡qj G‡÷U †W‡fjcvi ev Dnvi Kg©KZ©v ev Kg©PvixA_ev G‡R›U hvnviv Rwg, evmv, evwYwR¨K feb Ges d¬ vUmn BZ¨vw`I wbg©vY I µq-weµ‡qi mwnZRwoZ;
(g) Ò mË¡vÓ A_© †Kvb AvBbx cÖwZôvb , mswewae× ms ’v, evwYwR¨K ev AevwYwR¨K cÖwZôvb, Askx`vixKvievi, mgevq mwgwZmn GK ev GKvwaK e¨w³i mgš‡q MwVZ †h †Kvb msMVb;
(h) Ò m‡›`nRbK †jb‡`bÓ A_© GBiæc †jb‡`b-
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(1) hvnv ¯vfvweK ‡jb‡`‡bi aiY nB‡Z wfbœ;
(2) †hB †jb‡`b m¤ú‡K© GBiæc aviYv nq †h,
(K) Bnv †Kvb Aciva nB‡Z AwR©Z m¤ú`,
(L) Bnv †Kvb mš¿vmx Kv‡h©, †Kvb mš¿vmx msMVb‡K ev †Kvb mš¿vmx‡K A_©vqb;
(3) hvnv GB AvB‡biD‡Ïk¨ c~iYK‡í, evsjv‡`k e¨vsK KZ©„K mg‡q mg‡q, RvixK…Z wb‡ ©kbvq ewY©ZAb¨ †Kvb †jb‡`b ev †jb‡`‡bi cÖ‡Póv;
(i) Ò mgevq mwgwZÓ A_© mgevq mwgwZ AvBb, 2001 (2001 Gi 47 bs AvBb) Gi aviv 2(20) GmsÁvwqZ cÖwZôvb hvnv AvgvbZ MÖnY ev FY cÖ vb Kv‡R wb‡qvwRZ;
(j) Ò m¤úwËÓ A_© †`‡k ev †`‡ki evwn‡i Aew ’Z-
(A) †h †Kvb cÖK…wZi, „k¨gvb, A „k¨gvb, ’vei ev A ’vei m¤úwË; ev
(Av) bM` UvKv, B‡jKUªwbK ev wWwRUvjmn Ab¨ †h †Kvb cÖK…wZi `wjj ev BÝUiæ‡g›U hvnv ‡Kvbm¤úwËi gvwjKvbv ¯Z¡ ev gvwjKvbv ¯‡Z¡ †Kvb ¯v_© wb‡ ©k K‡i;
(k) Òm¤ú„³ Aciva (Predicate Offence)” A_© wb‡¤œ DwjøwLZ Aciva, hvnv †`‡k ev †`‡ki evwn‡i msNU‡bigva¨‡g AwR©Z †Kvb A_© ev m¤ú` jÛvwis Kiv ev Kwievi †Póv Kiv, h_vt-
(1) yb©xwZ I Nyl;(2) gy ªv RvjKiY;(3) `wjj ` Ív‡eR RvjKiY;(4) Puv`vevwR;(5) cÖZviYv;(6) RvwjqvwZ;(7) A‰ea A‡ ¿i e¨emv;(8) A‰ea gv`K I †bkv RvZxq ª‡e¨i e¨emv;(9) †PvivB I Ab¨vb¨ ª‡e¨i A‰ea e¨emv;(10) AcniY, A‰eafv‡e AvUKvBqv ivLv I cYe›`x Kiv;(11) Lyb, gvivZ¥K kvixwiK ÿwZ;(12) bvix I wkï cvPvi;(13) †PvivKvievi(14) †`kx I we‡`kx gy ªv cvPvi;(15) Pzwi ev WvKvwZ ev `my¨Zv ev Rj`my¨Zv ev wegvb `my¨Zv;(16) Av`g cvPvi(17) ‡hŠZzK;(18) †PvivPvjvbx I ïé msµvšÍ Aciva(19) Ki msµvšÍ Aciva;(20) ‡gav¯Z¡ jsNb;(21) mš¿vm I mš¿vmx Kv‡h© A_© †hvMvb;(22) ‡fRvj ev ¯Z¡ jsNb K‡i cY¨ Drcv`b(23) cwi‡ekMZ Aciva;(24) †hŠb wbcxob (Sexual Exploitaion);
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(25) cyuwR evRvi m¤úwK©Z g~j ms‡e`bkxj Z_¨ Rbm¤§y‡L cÖKvwkZ nIqvi c~‡e© Zvnv Kv‡R jvMvBqv†kqvi †jb‡`‡bi gva¨‡g evRvi myweav MÖnY I e¨w³MZ ev cÖwZôvwbK myweavi j‡ÿ¨ evRvi wbqš¿‡bicÖ‡Póv Kiv (Insider Trading & Market Manipulation)
(26) msNe× Aciva (Organised Crime) ev msNe× Acivax `‡j AskMÖnY;
(27) fxwZ cÖ k©‡bi gva¨‡g A_© Av`vq; Ges
(28) GB Ava¨v‡`‡ki D‡Ïk¨ c~iYK‡í evsjv‡`k e¨vsK KZ©„K miKv‡ii Aby‡gv`bµ‡g †M‡R‡UcÖÁvc‡bi gva¨‡g †NvwlZ Ab¨ †h †Kvb m¤ú„³ Aciva;
(l) Ò‡¯úkvj RRÓ A_© Criminal Law (Amendment)Act,1958 (Act No.XL of 1958) GiSection 3 Gi Aaxb wbhy³ Special judge.
(m) (1) Ò÷K wWjvi I ÷K †eªvKviÓ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (÷K wWjvi, ÷K †eªvKvi IAby‡gvw`Z cÖwZwbwa) wewagvjv, 2000 Gi h_vµ‡g wewa 2 (&S) I 2 (T) G msÁvwqZ cÖwZôvb;
(2) Ò‡cvU©‡dvwjI g¨v‡bRvi I gv‡P©›U e¨vsKviÓ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (gv‡P©›U e¨vsKvi I†cvU©‡dvwjI g¨vbRvi) wewagvjv, 1996 Gi h_vµ‡g wewa 2(P) I 2(T) G msÁvwqZ cÖwZôvb;
(3) ÒwmwKDwiwU Kv÷wWqvbÓ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (wmwKDwiwU Kv÷wWqvj †mev)wewagvjv, 2003 Gi wewa 2 (T) G msÁvwqZ cÖwZôvb;
(4) Òm¤ú` e¨e ’vcKÓ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (wgDPz¨qvj dvÛ wewagvjv, 2001 Gi wewa 2(a) G msÁvwqZ cwZôvb;
(n) ÒnvB‡KvU© wefvMÓ A_© evsjv‡`k mycÖxg †Kv‡U©i nvB‡KvU© wefvM|
3| AvB‡bi cÖvavb¨|- GB AvB‡biaviv 9 Gi weavb mv‡c‡ÿ AvcvZZt ejer Ab¨ †Kvb AvB‡b hvnv wKQzB _vKzKbv †Kvb GB AvB‡bi weavbvejx Kvh©Ki _vwK‡e|
4| gvwbjÛvwis Aciva I `Ð|- (1) GB AvB‡bi D‡Ïk¨ c~ibK‡í, gvwbjÛvwis GKwU Aciva ewjqv MY¨ nB‡e|
(2) †Kvb e¨w³ gvwbjÛvwis Aciva Kwi‡j ev gvwbjÛvwis Aciva msNU‡bi †Póv, mnvqZv ev lohš¿ Kwi‡j wZwbAb~¨b 4 (Pvi) ermi Ges AbwaK 12 (evi) ermi ch©šÍ Kviv`‡Ð `wÐZ nB‡eb Ges Bnvi AwZwi³ Aciv‡ai mv‡_ mswkøóm¤úwËi wظY g~‡j¨I mgcwigvb ev 10 (`k) jÿ UvKv ch©šÍ, hvnv AwaK, A_© ‡Ð `wÐZ nB‡eb|
(3) Av`vjZ †Kvb A_© Ð ev `‡Ði AwZwi³ wnmv‡e `wÐZ e¨w³i m¤úwË iv‡óªªi AbyK~‡j ev‡Rqvß Kwevi Av‡`kcÖ vb Kwi‡Z cwi‡e hvnv cÖZ¨ÿ ev c‡ivÿfv‡e gvwbjÛvwis ev †Kvb m¤ú„³ Aciv‡ai mv‡_ m¤ú„³ ev mswkøó|
(4) GB avivi Aaxb †Kvb mËv gvwbjÛvwis Aciva Kwi‡j mswkøó m¤úwËi g~‡j¨ Ab~~¨b wظY A_ev 20 (wek) jÿUvKv, hvnv AwaK nq, Rwigvbv Kiv hvB‡e Ges D³ cÖwZôv‡bi wbeÜb evwZj‡hvM¨ nB‡e|
(5) m¤ú„³ Aciv‡a Awfhy³ ev `wÐZ nIqv gvwbjÛvwis Gi Kvi‡Y Awfhy³ ev `Ð cÖ v‡bi c~e©kZ© nB‡e bv|
5| Aeiæ×KiY ev †µvK Av‡`k jsN‡b `Ð|- †Kvb e¨w³ GB AvB‡bi Aaxb †Kvb Aeiæ×KiY ev †µvK Av‡`kjsNb Kwi‡j wZwb AbwaK 3 (wZb) ermi ch©šÍ Kviv`Ð ev Aeiæ×KiY ev †µvK Av‡`kK…Z m¤úwËi g~‡j¨I mgcwigvbA_© Ð ev Dfq `‡Ð `wÐZ nB‡eb|
6| Z_¨ cÖKv‡ki `Ð|- (1) †Kvb e¨w³ Amr D‡Ï‡k¨ Z`šÍ m¤úwK&©Z †Kvb Z_¨ ev cÖvmswMK Ab¨ †Kvb Z_¨ †Kvbe¨w³, ms ’v ev msev` gva¨‡g cÖKvk Kwi‡eb bv|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(2) GB AvB‡bi Aaxb ÿgZvcÖvß †Kvb e¨w³, cÖwZôvb ev G‡R›U KZ©„K PvKzixiZ ev wb‡qvMiZ _vKvAe ’vq wKsev PvKzix ev wb‡qvMRwbZ Pyw³ Aemvq‡bi ci ZrKZ©„K msM„nxZ, cÖvß, AvnwiZ, ÁvZ †KvbZ_¨ GB AvB‡bi D‡Ï‡k¨ c~iY e¨ZxZ Ab¨ †Kvb D‡Ï‡k¨ e¨envi ev cÖKvk Kiv nB‡Z weiZ _vwK‡eb|
(3) †Kvb e¨w³ Dc-aviv (1) I (2) Gi weavb jsNb Kwi‡j wZwb AbwaK 2 ( yB) ermi ch©šÍ Kviv`Ð evAb~aŸ© 50 (cÂvk) nvRvi UvKv ch©šÍ A_© Ð ev Dfq `‡Ð `wÐZ nB‡eb|
7| Z`‡šÍ evav ev Amn‡hvwMZv, cÖwZ‡e`b †cÖi‡Y e¨_©Zv ev Z_¨ mieiv‡n evav †`Iqvi `Ð|- (1) †Kvb e¨w³ GBAvB‡bi AaxbÑ
(K) †Kvb Z`šÍ Kvh©µ‡g Z`šÍKvix Kg©KZ©v‡K evav cÖ vb Kwi‡j ev mn‡hvwMZv cÖ v‡b A¯xK…wZ ÁvcbKwi‡j; ev
(L) hyw³ msMZ KviY e¨wZ‡i‡K hvwPZ †Kvb cÖwZ‡e`b †cÖi‡Y ev Z_¨ mieiv‡n A¯xK…wZ Ávcb Kwi‡j;
wZwb GB AvB‡bi Aaxb Aciva Kwi‡qv‡Qb ewjqv MY¨ nB‡eb|
(2) †Kvb e¨w³ Dc- aviv (1) Gi Aaxb Aciv‡a †`vlx mve¨ Í nB‡j wZwb AbwaK 1 (GK) ermi ch©šÍKviv`Ð ev Ab~aŸ© 25 (cuwPk) nvRvi UvKv ch©šÍ A_© Ð ev Dfq `‡Ð `wÐZ nB‡eb|
8| wg_¨v Z_¨ cÖ`v‡bi `Ð|- (1) †Kvb e¨w³ ÁvZmv‡i A‡_©i Drm ev wbR cwiwPwZ ev wnmve avi‡KicwiwPwZ m¤ú‡K© ev †Kvb wnmv‡ei myweav‡fvMx ev bwgbx m‡¤ú‡K© †Kvbiƒc wg_¨v Z_¨ cÖ vb Kwi‡eb bv|
(2) †Kvb e¨w³ Dc-aviv (1) Gi weavb jsNb Kwi‡j wZwb AbwaK 3 (wZb) ermi ch©šÍ Kviv`Ð evAbyaŸ© 50 (cÂvk) nvRvi UvKv ch©šÍ A_© Ð ev Dfq `‡Ð `wÐZ nB‡eb|
9| Aciv‡ai Z`šÍ I wePvi|- (1) Ab¨ AvB‡b hvnv wKQyB _vKzK bv †Kb GB AvB‡bi Aaxb Acivamg~n ybx©wZ`gb Kwgkb AvBb, 2004 (2004 m‡bi 5 bs AvBb) Gi Aaxb Zdwmjf~³ Aciva M‡Y¨ ~bx©wZ `gbKwgkb ev Kwgkb nB‡Z Z y‡Ï‡k¨ ÿgZvcÖvß Kwgk‡bi †Kvb Kg©KZ©v ev ~bx©wZ `gb Kwgkb nB‡ZÿgZvcÖvß Ab¨ †Kvb Z`šÍKvix ms ’vi Kg©KZv© KZ©„K Z`šÍ‡hvM¨ nB‡e|
(2) GB AvB‡bi Aaxb Acivamg~n Crminal Law (Amendment) Act, 1958 (Act XL of1958)Gi section 3 Gi Aaxb wbhy³ †¯úkvj RR KZ…©K Z`šÍ‡hvM¨ nB‡e|
(3) Awfhy³ e¨w³ m¤úwË AbymÜvb I mbv³Ki‡Yi wbwgË yb©xwZ `gb Kgwkb GB AvB‡bi cvkvcvwk~bx©wZ `gb Kwgkb AvBb, 2004 (2004 m‡bi 5 bs AvBb) G cÖ`Ë ÿgZvI cÖ‡qvM Kwi‡Z cvwi‡e
Ges ~bx©wZ `gb Kwgkb nB‡Z ÿgZvcÖvß Ab¨ †Kvb Z`šÍKvix ms ’vi Kg©KZv© GB AvB‡bi cvkvcvwkAb¨ AvB‡b cÖ`Ë ÿgZvI cÖ‡qvM Kwi‡Z cvwi‡e|
10| †¯úkvj RR Gi we‡kl GLwZqvi|- (1) †¯úkvj RR GB AvB‡bi Aaxb Aciv‡ai Rb¨ wba©vwiZ `ÐAv‡ivc Ges †ÿÎgZ, AwaKZi Z`šÍ m¤úwË Aeiæ×KiY, †µvK, ev‡RqvßKiY Av‡`kmn Avek¨K Ab¨†Kvb Av‡`k cÖ vb Kwi‡Z cvwi‡eb|
(2) †¯úkvj RR GB AvB‡bi Aaxb `v‡qK…KZ †Kvb gvgjvq AwaKZi Z`‡šÍi Av‡`k cÖ vb Kwi‡jD³iƒc Av‡`‡k Z`šÍKvix KZ©KZ©v‡K Z`šÍ cÖwZ‡e`b `vwL‡ji Rb¨ GKwU mgqmxgv wbw ©ó Kwiqv w`‡eb,hvnv 6 (Qq) gv‡mi AwaK nB‡e bv|
11| Aciv‡ai Avgj‡hvM¨Zv, A-Av‡cvl‡hvM¨Zv I A-Rvwgb‡hvM¨Zv|- GB AvB‡biAaxb Acivamg~n Avgj‡hvM¨(cognizable), A-Av‡cvl‡hvM¨ (non-compoundable) Ges A-Rvwgb‡hvM¨ (non-bailable)nB‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
12| ybx©wZ `gb Kwgk‡bi Aby‡gv`‡bi Acwinvh©Zv|- (1) †dŠR`vwi Kvh©wewa ev AvcZZt ejer Ab¨ †KvbAvB‡b hvnv wKQzB _vKzK bv †Kb, ybx©wZ `gb Kwgk‡bi Aby‡gv`b e¨wZ‡i‡K †Kvb Av`vjZ GBAvB‡biAaxb †Kvb Aciva wePviv_© Avg‡j MÖnY (cognizable) Kwi‡eb bv|
(2) GB AvB‡bi Aaxb †Kvb Aciv‡ai Z`šÍ mgvß nBevi ci Z`šÍKvix Kg©KZ©v Av`vj‡Z cÖwZ‡e`b`vwLj Kwievi c~‡e© Kwgk‡bi c~e©vby‡gv`b MÖnY Kwi‡eb Ges Kwgkb KZ…©K cÖ Ë Aby‡gv`b c‡Îi GKwUKwc cÖwZ‡e`‡bi mwnZ Av`vj‡Z `vwLj Kwi‡eb|
13| Rvwgb msµvšÍ weavb|- GB AvB‡bi Aaxb Awfhy³ †Kvb e¨w³‡K Rvwg‡b gyw³ †`Iqv nB‡e bv, hw`---
(K) Zvnv‡K Rvwg‡b gyw³ †`Iqvi Av‡e`‡bi Dci Awf‡hvMKvix cÿ‡K ïbvbxi my‡hvM †`Iqv bv nq;Ges
(L) Zvnvi weiæ‡× AvbxZ Awf‡hv‡M wZwb †`vlx mve¨ Í nIqvi hyw³m½Z KviY iwnqv‡Q g‡g© Av`vjZmš‘ó nb; A_ev
(M) wZwb bvix, wkï ev kvwiixKfv‡e weKjv½ bv nb Ges Zvnv‡K Rvwg‡b gyw³ †`Iqvi Kvi‡Y b¨vq wePviwewNœZ nB‡e bv g‡g© Av`vjZ mš‘ó bv nb|
14| m¤úwËi Aeiæ×KiY (Freezing) ev †µvK (Attachment) Av‡`k| ---(1) Z`šÍKvix ms ’vi wjwLZAv‡e`‡bi wfwˇZ Av`vjZ Awfhy³ e¨w³i †`‡k ev †`‡ki evwn‡i Aew ’Z m¤úwË, hvnv‡Z †`‡kigvby‡li ¯v_© iwnqv‡Q, GBiƒc †ÿ‡Î Aeiæ×KiY ev †µvK Av‡`k cÖ vb Kwi‡Z cvwi‡e|
(2) Dc-aviv (1) Gi Aaxb Z`šÍKvix ms ’v †Kvb m¤úwËi Aeiæ×KiY ev †µvK Av‡`‡ki Rb¨ Av`vj‡ZwjwLZ Av‡e`b `vwL‡ji mgq Dnv‡Z wbgœewY©Z Z_¨vw` D‡jøL Kwi‡e, h_v t---
(K) Aeiæ×KiY ev †µvK Av‡`‡ki wbwgË m¤úwËi c~Y© weeiY;
(L) m¤úwËwU gvwbjÛvwis ev Ab¨ †Kvb Aciv‡ai Rb¨ †µvK‡hvM¨ Gi mc‡ÿ hyw³ I cÖv_wgKcÖgvYvw`;
(M) cÖv_©xZ Av‡e`b †gvZv‡eK Av`vjZ KZ…©K Av‡`k cÖ vb Kiv bv nB‡j gvgjv wb®úwËi c~‡e©Bm¤úwËwU Ab¨Î n ÍvšÍi ev †envZ nBevi AvkvsKv|
(3) Dc-aviv (1) Gi Aaxb †Kvb Aeiæ×KiY ev †µvK Av‡`k cÖ vb Kiv nB‡j Av`vjZ m¤úwËi c~Y©weeiYmn welqwU me©mvavi‡Yi AeMwZi Rb¨ miKvix †M‡R‡U Ges Ab~¨b 2 ( yB)wU eûj cÖPvwiZ RvZxqˆ`wbK cwÎKvq [ 1 (GK) wU evsjv I 1 (GK) wU Bs‡iRx] weÁwß AvKv‡i cÖPvi Kwi‡e|
(4) GB avivi Aaxb Aeiæ×KiY ev †µvK Av‡`‡k Awfhy³ e¨w³i bvg, wcZv-gvZvi bvg, ¯vgx ev ¿xibvg, RvZxqZv, c`ex (hw` _v‡K), †ckv, U¨v· cwiwPwZ b¤i (TIN), eZ©gvb I ¯’vqx wVKvbv Ges Ab¨†Kvb cwiwPwZ, hZ ~i m¤¢e, D‡jøL _vwK‡e; Z‡e GB mKj Z‡_¨I mvgvb¨ ÎæwU-wePz¨wZi Kvi‡Y GBAvB‡bi weavb Kvh©Ki Kiv evavMÖ Í nB‡e bv|
(5) Dc-aviv (6) Gi weavb mv‡c‡ÿ, GB avivi Aaxb †Kvb e¨w³i m¤úwË Aeiæ×KiY ev †µv‡Ki Rb¨Av`vjZ Av‡`k cÖ vb Kwi‡j Av‡`k Kvh©Ki _vKvKvjxb, Av`vjZ KZ…©K wfbœiƒc †Kvb Av‡`k cÖ vb Kivbv nB‡j, D³ m¤úwË †Kvbfv‡e ev cÖKv‡i Ab¨Î n ÍvšÍi, D³ m¤úwË mswkøó †Kvb cÖKvi †jb‡`b ev D³m¤úwˇK †Kvbfv‡e `vqhy³ Kiv hvB‡e bv|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(6) †Kvb e¨w³i e¨vsK GKvD›U Aeiæ×KiY Av‡`k Kvh©Ki _vKv Ae ’vq D³ Av‡`‡k wfbœiƒc D‡jøL bv_vwK‡j, D³ e¨w³ cÖvc¨ nBqv‡Q GBiƒc mgy`q A_© Zvnvi Aeiæ× e¨vsK GKvD‡›U Rgv Kiv hvB‡e|
15| Aeiæ×K…Z ev †µvKK…Z m¤úwË †diZ cÖ`vb|- (1) aviv 14 Gi Aaxb Av`vjZ †Kvb m¤úwË Aeiæ×KiYev †µvK Av‡`k cÖ vb Kwi‡j, Awfhy³ e¨w³ ev mËv e¨ZxZ Ab¨ †Kvb e¨w³ ev mËvi D³ m¤úwˇZ†Kvb ¯v_© _vwK‡j wZwb ev D³ mËv Dnv †diZ cvBevi Rb¨ Aeiæ×KiY ev †µvK Av‡`‡k cÖPv‡ii ZvwiLnB‡Z 30 (wÎk) w`‡bi g‡a¨ Av`vj‡Z Av‡e`b Kwi‡Z cvwi‡eb|
(2) Dc-aviv (1) Gi Aaxb †Kvb e¨w³ Av`vj‡Z Av‡e`b Kwi‡j Av‡e`bc‡Î wbgœewY©Z Z_¨vw` D‡jøLKwi‡Z nB‡e, h_vt---
(K) gvwbjÛvwis ev †Kvb m¤ú„³ Aciv‡ai mwnZ D³ m¤úwËi cÖZ¨ÿ ev c‡ivÿfv‡e †Kvb mswkøóZvbvB;
(L) Av‡e`bKvix cÖZ¨ÿ ev c‡ivÿfv‡e Awfhy³ gvwbjÛvwis ev Ab¨ †Kvb m¤ú„³ Aciv‡ai mv‡_m¤ú„³ bb;
(M) Av‡e`bKvix Awfhy‡³i bwgbx bb ev Awfhy‡³i c‡ÿ †Kvb `vwqZ¡ cvjb Kwi‡Z‡Qb bv;
(N) Aeiæ×KiY ev †µvKK…Z m¤úwˇZ Awfhy³ e¨w³ ev mËvi †Kvb ¯Z¡, ¯v_© ev gvwjKvbv bvB; Ges
(O) Aeiæ×KiY ev †µvKK…Z m¤úwˇZ Av‡e`bKvixi ¯Z¡, ¯v_© I gvwjKvbv iwnqv‡Q|
(3) aviv 14 Gi Dc-aviv (5) G hvnv wKQzB _vKzK bv †Kb, GB avivi Aaxb m¤úwË †diZ cvBevi Rb¨Av`vjZ †Kvb Av‡e`b cÖvß nB‡j Av‡e`bKvix, Z`šÍKvix ms ’v I Awfhy³ e¨w³ ev mËv‡K ïbvbximy‡hvM cÖ vb Kwi‡eb Ges ïbvbx A‡šÍ, cÖ‡qvRbxq KvMRvw` ch©v‡jvPbvµ‡g I ivóª KZ©„K ewY©Z m¤úwˇZcÖZ¨ÿ ev c‡ivÿfv‡e gvwbjÛvwis ev m¤ú„³ Aciv‡ai mv‡_ m¤ú„³Zvi MÖnY‡hvM¨ m‡›`‡ni †Kvb KviYDc ’vcb bv Kwi‡j, Dc-aviv (1) Gi Aaxb `vwLjK…Z Av‡e`bKvixi Av‡e`b m¤ú‡K© Av`vjZ mš‘ónB‡j Aeiæ×KiY ev †µvK Av‡`k evwZjµ‡g m¤úwËwU, Av‡`‡k DwjøwLZ wba©vwiZ mg‡qi g‡a¨,Av‡e`bKvixi AbyK~‡j n ÍvšÍ‡ii Av‡`k cÖ`vb Kwi‡eb|
16| m¤úwËi Aeiæ×KiY ev †µvK Av‡`‡ki weiæ‡× Avcxj|- (1) GB AvB‡bi Aaxb Av`vjZ †Kvb m¤úwËiAeiæ×KiY ev †µvK Av‡`k cÖ vb Kwi‡j D³iƒc Av‡`‡ki weiæ‡× msÿyä e¨w³ 30 (wÎk) w`‡bi g‡a¨nvB‡KvU© wefv‡M Avcxj Kwi‡Z cvwi‡eb|
(2) Dc-aviv (1) Gi Aaxb †Kvb Avcxj `v‡qi Kiv nB‡j Avcxj Av`vjZ cÿe„›`‡K, ïbvbxi Rb¨hyw³m½Z mgq w`qv, ïbvbx A‡šÍ †hBiƒc Dchy³ g‡b Kwi‡e †mBiƒc Av‡`k cÖ vb Kwi‡Z cvwi‡e|
(3) aviv 14 Gi Aaxb †Kvb m¤úwËi wel‡q Av`vjZ KZ©„K cÖ Ë Aeiæ×KiY ev †µvK Av‡`‡ki weiæ‡×†Kvb ms¶zä e¨w³ Avcxj Kwi‡j Ges Avcxj Av`vjZ KZ©„K wfbœiƒc †Kvb Av‡`k cÖ`vb Kiv bv nB‡j,Avcxj wb®úwË bv nIqv ch©šÍ D³iƒc Aeiæ×KiY ev †µvK Av‡`k Kvh©Ki _vwK‡e|
17| m¤úwËi ev‡RqvßKiY| -(1) GB AvB‡bi Aaxb †Kvb e¨w³ ev mËv gvwbjÛvwis Aciv‡a †`vlx mve¨¯ÍnB‡j Av`vjZ Aciv‡ai mwnZ cÖZ¨ÿ ev c‡ivÿfv‡e m¤ú„³ †`‡k ev †`‡ki evwn‡i Aew ’Z †h †Kvbm¤úwË iv‡óªi AbyK~‡j ev‡Rqvß Kwievi Av‡`k cÖ vb Kwi‡Z cvwi‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(2) Dc-aviv (1) G hvnv wKQB _vKzK bv †Kb G& AvB‡bi Aaxb gvwbjÛvwis Aciv‡ai mv‡_ mswkøó†Kvb AbymÜvb I Z`šÍ ev wePvi Kvh©µg PjvKvjxb mswkøó Av`vjZ cÖ‡qvRb‡ev‡a †`‡k ev †`‡ki evwn‡iAew ’Z †h †Kvb m¤úwË iv‡óªi AbyK~‡j ev‡Rqvß Kwievi Av‡`k cÖ vb Kwi‡Z cvwi‡e|
(3) GB AvB‡bi Aaxb gvwbjÛvwis Aciv‡ai Rb¨ †`vlx mve¨ Í †Kvb e¨w³ cjvZK _vwK‡j ev Awf‡hvM`vwL‡ji ci g„Zy¨eiY Kwi‡j Av`vjZ D³ e¨w³i Aciv‡ai mwnZ m¤ú„³ m¤úwËI iv‡óªi AbyK~‡jev‡Rqvß Kwievi Av‡`k cÖ vb Kwi‡Z cvwi‡e|
e¨vL¨v|--- h_vh_ Kvh© e¨e ’v MÖnY Kiv m‡Ë¡I †MÖdZvix c‡ivqvbv Rvixi ZvwiL nB‡Z 6 (Qq) gv‡mig‡a¨ hw` Awfhy³ e¨w³ Av`vj‡Z AvZ¥mgc©Y Kwi‡Z e¨_© nq ev D³ mg‡qi g‡a¨ Zvnv‡K†MÖdZvi Kiv bv hvq Zvnv nB‡j D³ e¨w³ GB avivi D‡Ïk¨ c~iYK‡í cjvZK ewjqv MY¨nB‡eb|
(4) GB avivi Aaxb Av`vjZ KZ©„K †Kvb m¤úwË ev‡Rqvß Kwievi Av‡`k cÖ v‡bi c~‡e© wKsev gvgjv evAwf‡hvM `v‡qi Kwievi c~‡e© hw` †Kvb e¨w³ mËv mij wek¦v‡m Ges Dchy³ g~j¨ cÖ vb mv‡c‡ÿev‡Rqv‡ßi Rb¨ Av‡e`bK…Z m¤úwË µq Kwiqv _v‡Kb Ges Av`vjZ‡K wZwb D³ mËv GB g‡g© mš‘óKwi‡Z mÿg nb †h, wZwb ev D³ mËv D³ m¤úwËwU gvwbjÛvwis Gi mwnZ m¤ú„³ ewjqv ÁvZ wQ‡jb bvGes wZwb mij wek¦v‡m m¤úwËwU µq KwiqvwQ‡jb, Zvnv nB‡j Av`vjZ D³ m¤úwË ev‡Rqvß KwieviAv‡`k cÖ vb bv Kwiqv Dnvi weµqjä A_© ivóªxq †KvlvMv‡i, Av`vjZ KZ©„K wba©vwiZ mgqmxgvi g‡a¨,Rgv †`Iqvi Rb¨ †`vlx mve¨ Í e¨w³ ev mËv‡K wb‡ ©k w`‡Z cvwi‡e|
(5) Av`vjZ hw` gvwbjÛvwis ev m¤ú„³ Aciv‡ai mv‡_ cÖZ¨ÿ ev c‡ivÿfv‡e mswkøó m¤úwËi Ae ’vbwbaviY ev ev‡Rqvß Kwi‡Z bv cv‡ib ev m¤úwË Ab¨ †Kvbfv‡e e¨env‡ii d‡j Aw ÍZ¡ wejyß nq, ZvnvnBj----
(K) Aciv‡ai mv‡_ m¤ú„³ bq Awfhy³ e¨w³i Ggb mgg~‡j¨ m¤úwË ev‡Rqvß Kwievi Av‡`kcÖ vb Kwi‡Z cvwi‡e|
(L) Awfhy³ e¨w³ weiæ‡× †h cwigvY m¤úwË Av`vq Kiv hvB‡e bv Zvnvi mgcwigvY Avw_©K `ÐcÖ vb Kwi‡Z cvwi‡e|
(6) GB avivi Aaxb †Kvb m¤úwË ev‡Rqvß Kiv nB‡j ev‡Rqvß Av‡`‡ki †bvwUk Av`vjZ KZ©„K †h e¨w³ev mËvi wbqš¿‡Y m¤úwËwU iwnqv‡Q †mB e¨w³ ev mËvi me©‡kl ÁvZ wVKvbvq †iwR÷vW© WvK‡hv‡McvVvB‡Z nB‡e Ges m¤úwËi Zdwmjmn mKj weeiY D‡jøLµ‡g miKvix †M‡R‡U Ges Ab~¨b 2 ( yB)wUeûj cÖPvwiZ RvZxq ˆ`wbK cwÎKvq [ 1 (GK) wU evsjv I 1 (GK)wU Bs‡iRx ] weÁwß cÖPvi Kwi‡ZnB‡e|
(7) GB avivi Aaxb Av`vjZ †Kvb m¤úwË ev‡Rqvß Kwievi Av‡`k cÖ vb Kwi‡j D³ m¤úwËi gvwjKvbviv‡óªi Dci b¨ Í nB‡e Ges ev‡Rqvß Kwievi Zvwi‡L m¤úwËwU hvnvi wR¤§vq ev gvwjKvbvq _vwK‡e wZwb,h_vkxNÖ m¤¢e, D³ m¤úwËi `Lj iv‡óªi eive‡i n¯ÍvšÍi Kwi‡eb|
(8) cÖZ¨ÿ ev c‡ivÿfv‡e Aciva jä m¤úwË hw` ˆea Dcv‡q AwR©Z A_© ev m¤úwËi mwnZ mswgwkÖZKiv nBqv _v‡K Zvnv nB‡j DÍ m¤úwˇZ Av`vjZ KZ©„K wba©vwiZ Aciva jä A_© ev m¤úwËi g~‡j¨i DciA_ev Aciva jä ev m¤úwËi g~‡j¨ wba©viY Kiv m¤¢e bv nB‡j AR©‡bi Dci wbwe©‡k‡l mswgwk&ªZ m¤ú~b©A_© ev m¤úwË iv‡óªi AbyK~‡j ev‡Rqvß Av‡`k cÖ vb Kiv hvB‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
18| ev‡RqvßK…Z m¤úwË †diZ cÖ vb|-(1) aviv 17 Gi Aaxb Av`vjZ †Kvb m¤úwË ev‡Rqvß Kwievi Av‡`kcÖ vb Kwi‡j D³ m¤úwˇZ †`vlx e¨w³ ev mËv e¨ZxZ Ab¨ †Kvb e¨w³ ev mËvi †Kvb ¯Z¡, ¯v_© evAwaKvi _vwK‡j wZwb ev D³ mËv Dnv †diZ cvBevi Rb¨ ev‡RqvßKi‡Yi weÁwß cwÎKvq me©‡klcÖPv‡ii ZvwiL nB‡Z 30 (wÎk) w`‡bi g‡a¨ Av`vj‡Z Av‡e`b Kwi‡Z cvwi‡eb|
(2) Dc-aviv (1) Gi Aaxb †Kvb Av‡e`b cÖvß nB‡j Av`vjZ gvgjv `v‡qiKvix, †`vlx e¨w³ GesAv‡e`bKvix‡K, ïbvbxi Rb¨ hyw³m½Z mgq w`qv, ïbvbx A‡šÍ wbgœewY©Z welqmg~n we‡ePbv KwiqvcÖ‡qvRbxq Av‡`k cÖ`vb Kwi‡Z cvwi‡e, h_v t ---
(K) Aciva msNU‡bi mwnZ Av‡e`bKvix ev ev‡RqvßK…Z m¤úwËi †Kvb ms‡køl wQj wK bv;
(L) ev‡Rqvß m¤úwË AR©‡b Av‡e`bKvixi ˆea AwaKvi iwnqv‡Q wK bv;
(M) Aciva msNU‡bi mgqKvj Ges ev‡RqvßK…Z m¤úwË Av‡e`bKvixi gvwjKvbvq Avwmqv‡Q
GBiƒc `vweK…Z mgqKvj; Ges
(N) Av`vj‡Zi wbKU cÖvmw½K we‡ewPZ Ab¨ †h †Kvb Z_¨|
19| ev‡RqvßKiY Av‡`‡ki weiæ‡× Avcxj|--(1)GB AvB‡bi Aaxb Av`vjZ †Kvb m¤úwË ev‡Rqvß KwieviAv‡`k cÖ vb Kwi‡j D³iƒc Av‡`‡ki weiæ‡× ms¶zä cÿ 30 (wÎk) w`‡bi g‡a¨ nvB‡KvU© wefv‡M AvcxjKwi‡Z cvwi‡eb|
(2) Dc-aviv (1) Gi Aaxb †Kvb Avcxj `v‡qi Kiv nB‡j Avcxj Av`vjZ Dfq cÿ‡K, ïbvbxihyw³m½Z my‡hvM cÖ`vb Kwiqv, ïbvbx A‡šÍ †hBiƒc Dchy³ g‡b Kwi‡e †mBiƒc Av‡`k cÖ vb Kwi‡Zcvwi‡e|
20| ev‡RqvßK…Z m¤úwËi wb®úwËKiY cÖwµqv|-(1) GB AvB‡bi Aaxb †Kvb m¤úwË ev‡Rqvß nB‡j, miKvi,Av`vj‡`i AbygwZ mv‡c‡ÿ, †hB m¤úwË Ab¨ †Kvb AvB‡bi Aaxb aŸsm Kwi‡Z nB‡e †mB m¤úwËe¨ZxZ Ab¨vb¨ m¤úwË, cÖKvk¨ wbjv‡g ev evwYwR¨Kfv‡e jvfRbK Ab¨ †Kvb AvBbm¤§Z Dcv‡q weµq evAb¨ †Kvbfv‡e wb®úwË Kwi‡Z cvwi‡e|
(2) Dc-aviv (1) Gi Aaxb m¤úwË weµq ev Ab¨ †Kvbfv‡e wb®úwËi gva¨‡g cÖvß A_© ivóªxq †KvlvMv‡iRgv nB‡e|
21| Aeiæ×K…Z, †µvKK…Z ev ev‡RqvßK…Z m¤úwË iÿYv‡eÿ‡Yi Rb¨ e¨e ’vcK ev ZË¡veavqK wb‡qvM| ---GB AvB‡bi Aaxb †Kvb m¤úwË Aeiæ×, †µvK ev ev‡Rqvß Kiv nB‡j, Z`šÍKvix ms ’v ev Dnvi wbKUnB‡Z ÿgZvcÖvß †Kvb Kg©KZ©vi Av‡e`‡bi †cÖwÿ‡Z D³iƒc m¤úwËi m¤ú~Y© ev AvswkK wbqš¿Y,e¨e ’vcbv, Z`viwK ev Ab¨ †Kvbfv‡e wb®úwËi Rb¨, Av`vjZ, ¯xq we‡ePbvq, †hBiƒc Dchy³ g‡b Kwi‡e†mBiƒc k‡Z© †Kvb AvBb cÖ‡qvMKvix ms ’v‡K D³ m¤úwËi e¨e ’vcK ev ZË¡veavqK wb‡qvM Kwi‡Zcvwi‡e|
22| Avcxj| --- AvcvZZt ejer Ab¨ †Kvb AvB‡b hvnv wKQzB _vKzb bv †Kb, Av`vjZ KZ©„K GB AvB‡biAaxb cÖ Ë †Kvb Av‡`k, ivq, wWwµ ev Av‡ivwcZ `Ð Øviv ms¶zä cÿ, D³iƒc Av‡`k, ivq, wWwµ ev`Ðv‡`k cÖ v‡bi ZvwiL nB‡Z 30 (wÎk) w`‡bi g‡a¨ nvB‡KvU© wefv‡M Avcxj Kwi‡Z cvwi‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
23| gvwbjÛvwis Aciva `gb I cÖwZ‡iv‡a evsjv‡`k e¨vs‡Ki ÿgZv I `vwqZ¡| --(1) GB AvB‡bi D‡Ïk¨c~iYK‡í gvwbjÛvwis Aciva `gb I cÖwZ‡iva Ges D³iƒc Acivag~jK ZrciZv †iva Kwievi D‡Ï‡k¨evsjv‡`k e¨vs‡Ki wbgœiƒc ÿgZv I `vwqZ¡ _vwK‡e, h_v t---
(K) †Kvb wi‡cvU© cÖ vbKvix ms ’v nB‡Z cÖvß bM` †jb‡`b I m‡›`nRbK †jb‡`b m¤úwK©Z Z_¨vw`we‡kølY ev ch©v‡jvPbv I we‡kølY ev ch©v‡jvPbvi D‡Ï‡k¨ AwZwi³ †h †Kvb Z_¨ wi‡cvU©cÖ vbKix ms ’v nB‡Z msMÖn Ges Dnvi WvUv msiÿY Kiv Ges ‡ÿÎgZ mswkøó AvBb cÖ‡qvMKvixms ’v‡K cÖ‡qvRbxq Kvh©µg MÖn‡Yi Rb¨ D³ Z_¨vw` cÖ vb Kiv;
(L) †Kvb †jb‡`b gvwbjÛvwis ev †Kvb m¤ú„³ Aciva Gi mwnZ m¤ú„³ ewjqv aviYv Kwievihyw³msMZ KviY _vwK‡j wi‡cvU© cÖ bKvix ms ’v nB‡Z D³iƒc †jb‡`b m¤úwK©Z †h †Kvb Z_¨ev cÖwZ‡e`b msMÖn Kiv;
(M) †Kvb Aciva msNU‡bi gva¨‡g †Kvb A_© ev m¤úwË †Kvb e¨w³i wnmv‡e Rgv nBqv‡Q g‡g© m‡›`nKwievi hyw³msMZ KviY _vwK‡j †Kvb e¨vsK ev Avw_©K cÖwZôvb‡K AbwaK 30 (wÎk) w`‡biRb¨ †Kvb wnmv‡ei †jb‡`b ’wMZ ev eÜ ivwLevi wb‡ ©k cÖ`vb Kivt
Z‡e kZ© _v‡K †h, D³ wnmv‡ei †jb‡`b m¤úwK©Z mwVK Z_¨ D &NvU‡bi cÖ‡qvRb †`Lv w`‡j†jb‡`b ’wMZ ev Aeiæ× ivwLevi †gqv` AwZwi³ 30 (wÎk) w`b Kwiqv m‡e©v”P 6 (Qq) gvmevwa©Z Kiv hvB‡e,
(N) gvwbjÛvwis cÖwZ‡iva Kwievi D‡Ï‡k¨ wi‡cvU© cÖ`vbKvix ms ’v‡K, mgq mgq, cÖ‡qvRbxq wb‡ ©kbvcÖ vb Kiv;
(O) wi‡cvU© cÖ vbKvix ms ’v evsjv‡`k e¨vsK KZ©„K hvwPZ Z_¨ ev cÖwZ‡e`b mwVKfv‡e †cÖiYKwiqv‡Q wKbv wKsev Z &KZ©„K cÖ Ë wb‡ ©kbv h_vh_fv‡e cÖwZcvjb Kwiqv‡Q wKbv Zvnv Z`viwKKiv Ges, cÖ‡qvR‡b, wi‡cvU© cÖ vbKvix ms ’v KZ©„K m‡iRwg‡b cwi`k©b Kiv;
(P) GB AvB‡bi myôz cÖ‡qvM wbwðZ Kwievi D‡Ï‡k¨ wi‡cvU© cÖ`vbKvix ms ’vmn evsjv‡`k e¨vs‡Kiwe‡ePbvq †h †Kvb ms ’v ev cÖwZôv‡bi Kg©KZ©v I Kg©Pvix‡`i Rb¨ cÖwkÿ‡Yi e¨e ’vmn mfv,†mwgbvi, BZ¨vw`i Av‡qvRb Kiv;
(Q) GB AvB‡bi D‡Ïk¨ c~iYK‡í cÖ‡qvRbxq Ab¨ †h †Kvb Kvh© m¤úv`b Kiv|
(2) gvwbjÛvwis ev m‡›`nRbK †jb‡`b Z`‡šÍ Z`šÍKvix ms ’v †Kvb Z_¨ mieiv‡ni Aby‡iva Kwi‡j, cÖPwjZAvB‡bi AvIZvq ev hw` Ab¨ †Kvb Kvi‡Y eva¨evaKZv bv _v‡K, Zvnv nB‡j evsjv‡`k e¨vsK D³ Z_¨cÖ vb Kwi‡e|
(3) †Kvb wi‡cvU© cÖ vbKvix ms ’v GB avivi Aaxb †Kvb hvwPZ Z_¨ h_vmg‡q mieivn Kwi‡Z e¨_© nB‡jevsjv‡`k ev¨sK D³ ms ’v‡K cÖwZw`b 10 (`k) nvRvi UvKv wnmv‡e m‡e©v”P 5 (cuvP) jÿ UvKv chšÍRwigvbv Kwi‡Z cvwi‡e Ges †Kvb ms ’v ev ms ’vi †Kvb kvLv, mvwf©m †m›Uvi, ey_ ev G‡R‡›Ui evsjv‡`‡kKvh©µg cwiPvjbv iwnZ Kwievi D‡Ï‡k wbeÜb ev jvB‡mÝ ’wMZ Kwi‡Z cvwi‡e ev †ÿÎgZ, wbeÜKvixev jvB‡mÝ cÖ vbKvix KZ©„cÿ‡K D³ ms ’vi weiæ‡× h_vh_ e¨e ’v MÖn‡Yi wbwg‡Ë welqwU AewnZKwi‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(4) †Kvb wi‡cvU© cÖ vbKvix ms ’v GB avivi Aaxb hvwPZ wel‡q †Kvb fyj ev wg_¨v Z_¨ ev weeiYx mieivnKwi‡j evsjv‡`k e¨vsK D³ ms ’v‡K Ab~¨b 20 (wek) nvRvi UvKv I m‡e©v”P 5 (cuvP) jÿ UvKv ch©šÍRwigvbv Kwi‡Z cvwi‡e Ges †Kvb ms ’v 1 (GK) A_© erm‡i 3 (wZb) ev‡ii AwaK Rwigvbv Kwi‡Zcvwi‡e Ges †Kvb ms ’v 1 (GK) A_© erm‡i 3 (wZb) ev‡ii AwaK Rwigvbvi m¤§yLxb nB‡j evsjv‡`ke¨vsK D³ ms ’v ev ms ’vi †Kvb kvLv, mvwf©m †m›Uvi, ey_ ev G‡R‡›Ui evsjv‡`k Kvh©µg cwiPvjbv iwnZKwievi D‡Ï‡k¨ wbeÜb ev jvB‡mÝ ’wMZ Kwi‡Z cvwi‡e ev †ÿÎgZ, wbeÜbKvix ev jvB‡mÝ cÖ vbKvixKZ©„cÿ‡K D³ ms¯’vi weiæ‡× h_vh_ e¨e ’v MÖn‡Yi wbwg‡Ë welqwU AewnZ Kwi‡e|
(5) †Kvb wi‡cvU© cÖv`vbKvix ms ’v evsjv‡`k e¨vsK KZ©„K GB AvB‡bi AvIZvq RvixK…Z †Kvb wb‡ ©kbvcwicvj‡b e¨_© nB‡j evsjv‡`k e¨vsK D³ ms¯’v‡K cÖwZw`b 10 (`k) nvRvi UvKv wnmv‡e m‡e©v”P 5(cuvP) jÿ UvKv ch©šÍ cÖwZwU Acwicvjbxq wel‡qi Rb¨ Rwigvbv Kwi‡Z cvwi‡e Ges †Kvb ms ’v 1 (GK)A_© erm‡i 3 (wZb) ev‡ii AwaK Rwigvbvi m¤§~Lxb nB‡j evsj‡`k e¨vsK D³ ms ’v ev ms ’vi ‡KvbkvLv, mvwf©m †m›Uvi, ey_ ev G‡R›U evsjv‡`k Kvh©µg cwiPvjbv iwnZ Kwievi D‡Ï‡k¨ wbeÜb evjvB‡mÝ ’wMZ Kwi‡Z cvwi‡e ev †ÿÎgZ, wbeÜbKvix ev jvB‡mÝ cÖ vbKvix KZ©„cÿ‡K D³ ms ’viweiæ‡× h_vh_ e¨e ’v MÖn‡Yi wbwgË welqwU AewnZ Kwi‡e|
(6) †Kvb wi‡cvU© cÖ vbKvix ms ’v Dc-aviv (1) `dv (M) Gi AvIZvq evsjv‡`k e¨vsK KZ©„K wb‡ ©wkZ †KvbAeiæ× ev ’wMZ Av‡`k cwicvj‡b e¨_© nB‡j evsjv‡`k e¨vsK D³ wi‡cvU© cÖ vbKvix ms ’v‡K Ab~¨b D³e¨vsK wnmv‡e w ’wZi mgcwigvY Rwigvbv Kwi‡Z cvwi‡e hvnv wb‡`©kbv Rvixi Zvwi‡L wnmv‡e w ’wZiwظ‡Yi AwaK nB‡e bv|
(7) GB AvB‡bi aviv 23 I 25 Abyhvqx evsjv‡`k e¨vsK KZ©„K Av‡ivwcZ Rwigvbv †Kvb e¨w³ ev mËv evwi‡cvU© cÖ vbKvix ms ’v cÖ v‡b e¨_© nB‡j evsjv‡`k e¨vsK mswkøó e¨w³ ev mËv ev wi‡cvU© cÖ vbKvix ms ’vwbR bv‡g †h †Kvb e¨vsK ev Avw_©K cÖwZôvb ev evsjv‡`k e¨vs‡K cwiPvwjZ wnmve weKjbc~e©K Av`vqKwi‡Z cvwi‡e Ges G‡ÿ‡Î Rwigvbvi †Kvb Ask Abv`vqx _vwK‡j Zvnv Av`v‡q cÖ‡qvR‡b evsjv‡`ke¨vsK Av`vj‡Z Av‡e`b Kwi‡Z cvwi‡e Ges Av`vjZ †hBiƒc Dchy³ we‡ePbv Kwi‡e †mBiƒc Av‡`kcÖ vb Kwi‡e|
(8) Dc-aviv (3), (4), (5) I (6) Abyhvqx †Kvb wi‡cvU© cÖ vbKvix ms ’v‡K Rwigvbv Kiv nB‡j GB Rb¨`vqx D³ ms ’vi gvwjK, cwiPvjK, Kg©KZ©v-Kg©Pvix ev Pzw³wfwËK wb‡qvwRZ e¨w³M‡Yi weiæ‡×Ievsjv‡`k e¨vsK Ab~¨b 10 (`k) nvRvi UvKv I m‡e©v”P 5 (cuvP) jÿ UvKv ch©šÍ Rwigvbv Kwi‡Z cvwi‡eGes cÖ‡qvR‡b mswkøó ms ’v‡K cÖ‡qvRbxq cÖkvmbxK e¨e ’v MÖn‡Yi Rb¨ wb‡`©kbv cÖ vb Kwi‡Z cvwi‡e|
24| dvBb¨vwÝqvj Bb&‡Uwj‡RÝ BDwbU (FIU) cÖwZôv| ---(1) GB AvB‡bi aviv 23 G evsjv‡`k e¨vs‡KiDc Awc©Z ÿgZv I `vwqZ¡ cwicvj‡bi j‡ÿ¨ evsjv‡`k e¨vsK evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝBDwbU ev (BFIU) bv‡g GKwU ¯Zš¿ BDwbU _vwK‡e|
(2) GB AvB‡bi D‡Ïk¨ c~iYK‡í miKvix, Avav-miKvix, ¯vqËkvwmZ ms ’vmg~n ev Ab¨ †Kvb mswkøócÖwZôvb ev ms ’v Z &KZ©„K msiwÿZ ev msM„nxZ Z_¨vw` evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU¯cÖ‡bvw`Zfv‡e ev Aby‡iv‡ai m~‡Î mieivn Kwi‡e|
(3) evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU Ab¨vb¨ AvBb cÖ‡qvMKvix ms ’v‡K gvwb jÛvwis I mš¿vmxKv‡h© A_© †hvMvb mswkøó Z_¨vw` cÖ‡qvR‡b ¯-D‡`¨v‡M mieivn Kwi‡Z cvwi‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(4) GB AvB‡bi weavb Abyhvqx Ab¨ †Kvb †`‡ki mwnZ m¤úvw`Z †Kvb Pzw³ ev e¨e ’vi Aaxb mswkøó†`‡ki dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU‡K gvwbjÛvwis ev mš¿vmx Kv‡h© A_©vqb ev †Kvb m‡›`nRbK†jb‡`b m¤úwK©Z Z_¨vw` mieivn Kwi‡e Ges Ab¨ †Kvb †`‡ki wbKU nB‡Z Abyiƒc Z_¨ Pvwn‡Zcvwi‡e|
(5) Dc- aviv (4) ewY©Z Pzw³ ev e¨e ’v QvovI evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU †ÿÎgZ,¯cÖ‡Yvw`Zfv‡e Ab¨ †`‡ki dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwb‡K Z_¨ mieivn Kwi‡Z cvwi‡e|
25| gvwbjÛvwis Aciva cÖwZ‡iv‡a wi‡cvU© cÖ vbKvix ms ’vi `vq-`vwqZ¡| -(1) gvwb jÛvwis Aciva cÖwZ‡iv‡awi‡cvU© cÖ vbKvix ms ’vi wbgœiƒc `vq-`vwqZ¡ _vwK‡e, h_v t---
(K) Dnvi MÖvn‡Ki wnmve cwiPvjbvKv‡j MÖvn‡Ki cwiwPwZi mwVK I c~Y©v½ Z_¨ msiÿY Kiv;
(L) †Kvb MÖvn‡Ki wnmve eÜ nB‡j eÜ nIqvi ZvwiL nB‡Z Ab~¨b 5 (cuvP) ermi ch©šÍ D³ wnmv‡ei†jb‡`b msµvšÍ Z_¨ msiÿY Kiv;
(M) `dv (K) I (L) Gi Aaxb msiwÿZ Z_¨vw` evsjv‡`k e¨vs‡Ki Pvwn`v †gvZv‡eK, mgq mgq,mieivn Kiv;
(N) aviv 2 (h) G msÁvwqZ †Kvb m‡›`nRbK †jb‡`b ev †jb‡`‡bi cÖ‡Póv cwijwÿZ nB‡j ¯-D‡`¨v‡M Awej‡¤ evsjv‡`k e¨vs‡K Ôm‡›`nRbK †jb‡`b wi‡cvU©Õ Kiv|
(2)†Kvb wi‡cvU© cÖ vbKvix ms ’v Dc-aviv (1) Gi weavb jsNb Kwi‡j evsjv‡`k e¨vsK ---
(K) D³ ms ’v‡K Ab~¨b 50 (cÂvk) nvRvi UvKv Ges Ab~aŸ© 25(cuwPk) jÿ UvKv ch©šÍ RwigvbvKwi‡Z cvwi‡e; Ges
(L) `dv (K) Gi Aaxb Av‡ivwcZ Rwigvbvi AwZwi³ D³ ms ’vi ev ms ’vi †Kvb kvLv, mvwf©m†m›Uvi, ey_ ev G‡R‡›Ui e¨emvwqK Kvh©µ‡gi AbygwZ ev jvB‡mÝ evwZj Kwi‡Z cvwi‡e ev†ÿÎgZ, wbeÜbKvix ev jvB‡mÝ cÖ vbKvix KZ©„cÿ‡K D³ ms ’vi weiæ‡× h_vh_ e¨e ’v MÖn‡Yiwbwg‡Ë welqwU AewnZ Kwi‡e|
(3) Dc-aviv (2) Gi Aaxb Av‡ivwcZ Rwigvbvi A_© evsjv‡`k e¨vsK ZrKZ…©K wba©vwiZ c×wZ‡Z Av`vqKwi‡e Ges Av`vqK…Z A_© ivóªxq †KvlvMv‡i Rgv Kwi‡e|
26| we‡`kx iv‡óªi mwnZ Pzw³| - (1) GB AvB‡bi D‡Ïk¨ c~iYK‡í miKvi wØ-cvwÿK ev eû cvwÿK Pzw³,Kb‡fbkb ev AvšÍR©vwZK AvB‡b ¯xK…wZ Ab¨ †Kvbfv‡e †Kvb we‡`kx iv‡óªi mwnZ Pzw³ Kwi‡Z cvwi‡e|
(2) GB avivi Aaxb miKvi †Kvb we‡`kx iv‡óªi mwnZ Pzw³e× nB‡j gvwbjÛvwis Aciva cÖwZ‡iv‡a miKvi-
(K) D³ we‡`kx ivóª ev ms ’vi wbKU cÖ‡qvRbxq Z_¨vw` Pvwn‡Z cvwi‡e; Ges
(L) D³ we‡`kx ivóª Ges ms ’v KZ…©K hvwPZ Z_¨vw`, RvZxq wbivcËvi cÖwZ ûgwK bv nB‡j, mieivnKwi‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
(3) GB AvB‡bi D‡Ïk¨ c~iYK‡í, evsjv‡`k dvBb¨wÝqvj B‡›Uwj‡RÝ BDwbU (weGdAvBBD) we‡`kxdvBb¨wÝqvj B‡›Uwj‡RÝ BDwbU A_ev Ab¨vb¨ mswkøó ms ’vi mv‡_ mg‡SvZv ¯§viK ¯vÿi Kwi‡Z cvwi‡eGes ¯vÿwiZ mg‡SvZv ¯§vi‡Ki AIZvq weGdAvBBD-
(K)D³ we‡`kx dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU ev ms ’vi wbKU cÖ‡qvRbxq Z_¨vw` Pvwn‡Z cvwi‡e; Ges
(L) D³ we‡`kx dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU Ges ms ’v KZ©„K hvwPZ Z_¨vw`, RvZxq wbivcËvi cÖwZûgwK bv nB‡j, mieivn Kwi‡e|
(4) GB AvB‡biD‡Ïk¨ c~iYK‡í †Kvb Pzw³i Aaxb †Kvb we‡`kx iv‡óªi Av`vj‡Zi †Kvb Av‡`k Kvh©KiKwievi Rb¨ evsjv‡`‡k Aew ’Z †Kvb m¤úwË ev‡Rqvß Kwievi ev †diZ †`Iqvi cÖ‡qvRb nB‡j GUb©x†Rbv‡i‡ji Awd‡mi Av‡e`bµ‡g Av`vjZ †hBiƒc Dchy³ g‡b Kwi‡e †mBiƒc Av‡`k cÖ vb Kwi‡Zcvwi‡e; GKBfv‡e evsjv‡`‡k Av`j‡Zi ev‡RqvßKiY Av‡`k ev D³ m¤úwË †diZ Avbq‡bi Av‡`kev Íevq‡bi Rb¨ Pzw³ ev mg‡SvZv ¯§vi‡Ki Aaxb ’ ivóª‡K GUbx© †Rbv‡i‡ji Awdm Aby‡iva Kwi‡Zcvwi‡e|
(5) Ab¨ †Kvb AvB‡b hvnv wKQzB _vKzK bv †Kb GB AvB‡biD‡Ï‡k¨ c~iYK‡í cvi¯úwiK AvBbMZmn‡hvwMZvi AvIZvq †Kvb we‡`kx iv‡óªi Dchy³ KZ©„c‡ÿi wbKU nB‡Z cÖvß `wjjvw` mswkøó wePvwiKAv`vj‡Z mvÿ¨ wnmv‡e MÖnYxq nB‡e|
27| mËv KZ©„K Aciva msNUb|- GB Aa¨v‡`‡k Aaxb †Kvb Aciva ‡Kvb mËv KZ©„K msNwUZ nBqv _vwK‡jD³iƒc Aciv‡ai mwnZ cÖZ¨ÿ mswkøóZv iwnqv‡Q GBiƒc mËvi cÖ‡Z¨K gvwjK, cwiPvjK g¨v‡bRvi,mwPe ev Ab¨ †Kvb Kg©KZ©v ev Kg©Pvix ev cÖwZwbwa D³ Aciva msNUb Kwiqv‡Qb ewjqv MY¨ nB‡eb, hw`bv wZwb cÖgvY Kwi‡Z mÿg nb †h, D³ Aciva Zvnvi AÁvZmv‡i msNwUZ nBqv‡Q A_ev D³ Aciva†iva Kwievi Rb¨ wZwb h_vmva¨ †Póv Kwiqv‡Qb|
e¨vL¨v|- GB avivq ÒcwiPvjKÓ ewj‡Z mËvi †Kvb Askx`vi ev cwiPvjbv †evW©, †h bv‡gB AwfwnZ nDK,Gi m`m¨‡KI eySvB‡e|
28| mij wek¦v‡m K…Z Kvh© iÿY| --- GB AvBb ev wewai Aax‡b mij wek¦v‡m K…Z †Kvb Kv‡Ri d‡j †Kvbe¨w³ ÿwZMÖ ’ nB‡j ev ÿwZMÖ ’ nBevi m¤¢vebv _vwK‡j, †mBRb¨ miKvi ev miKv‡ii †Kvb Kg©KZ©v-Kg©Pvix ev evsjv‡`k e¨vsK ev evsjv‡`k e¨vs‡Ki †Kvb Kg©KZ©v- Kg©Pvix ev yb©xwZ `gb Kwgk‡bi †KvbKg©KZ©v-Kg©Pvix ev †Kvb wi‡cvU© cÖ vbKvix ms ’v ev Dnvi cwiPvjbv cl©` ev Dnvi ‡Kvb Kg©KvZ©v-Kg©Pvixi weiæ‡× †Kvb †`Iqvbx ev †dŠR`vix ev cÖkvmwbK ev Ab¨ †Kvb AvBbMZ Kvh©aviv `v‡qi KivhvB‡e bv|
29| wewa cÖYq‡bi ÿgZv|- miKvi, miKvix †M‡R‡U cÖÁvcb Øviv, GB AvB‡bi D‡Ïk¨ c~iYK‡í wewa cÖYqbKwi‡Z cvwi‡e|
30| AvB‡bi Bs‡iRx Abyev` cÖKvk|- (1)GB AvBb cÖeZ©‡bi ci miKvi, h_vkxNÖ m¤¢e, miKvix †M‡R‡UcÖÁvcb Øviv, GB AvB‡bi evsjv cv‡Vi Bs‡iRx‡Z Ab~w`Z GKwU wbf©i‡hvM¨ cvV (Authentic EnglishText) cÖKvk Kwi‡e|
(2) evsjv cvV Ges Bs‡iRx cv‡Vi g‡a¨ we‡iv‡ai †ÿ‡Î evsjv cvV cÖvavb¨ cvB‡e|
gvwbjÛvwis cÖwZ‡iva AvBb, 2012
31| iwnZKiY I †ndvRZ| - (1) gvwb jÛvwis cÖwZ‡iva Aa¨v‡`k, 2009 (2009 m‡bi 8 bs AvBb) IgvwbjÛvwis cÖwZ‡iva Aa¨v‡`k, 2012 (2012 m‡bi 2bs Aa¨v‡`k), AZtci D³ AvBb I Aa¨v‡`kewjqv DwjøwLZ, GZ &Øviv iwnZ Kiv nBj|
(2) D³iƒc iwnZ nIqv m‡Ë¡I D³ AvBb I Aa¨v‡`‡ki Aaxb M„nxZ †Kvb Kvh©µg, `v‡qiK…Z †Kvbgvgjv ev M„nxZ †Kvb Kvh©aviv Awb®úbœ _vwK‡j Dnv GBiƒ‡c wb®úbœ nB‡e †hb Dnv GB AvB‡bi Aaxb`v‡qiK…Z ev M„nxZ nBqv‡Q|
(3) D³iƒc iwnZ nIqv m‡Ë¡I Foreign Exchange Regulation Act, 1947 (Act No. VII of1947) Ges D³ AvBb I Aa¨v‡`‡ki AvIZvaxb †Kvb Aciva msMwVZ nB‡j ev Z`šÍvaxb ev wePvivaxb_vwK‡j D³ Acivamg~n GB AvB‡bi weavb Abyhvqx GBiƒ‡c wb®úbœ nB‡e †hb Dnv GB AvB‡bi Aaxb`v‡qiK…Z ev M„nxZ nBqv‡Q|
†gvt gvndzRyi ingvbfvicÖvß mwPe|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
†iwR÷vW© bs wW G-1
evsjv‡`k †M‡RU
AwZwi³ msL¨vKZ…©cÿ KZ…©K cÖKvwkZ
g½jevi, †deªæqvix 24, 2009
evsjv‡`k RvZxq msm`
XvKv, 24†k †deªæqvix, 2009/12B dvêyb, 1415
msm` KZ…©K M„nxZ wbgœwjwLZ AvBbwU 24†k †deªæqvix, 2009 (12B dvêyb, 1415) Zvwi‡L ivóªcwZim¤§wZ jvf Kwiqv‡Q Ges GZØviv GB AvBbwU me©mvavi‡Yi AeMwZi Rb¨ cÖKvk Kiv hvB‡Z‡Qt-
2009 m‡bi 16 bs AvBb
KwZcq mš¿vmx Kvh© cÖwZ‡iva Ges Dnv‡`i Kvh©Ki kvw Íi weavbmn Avbylw½K welqvw`m¤ú‡K© weavb cÖYqbK‡í cÖYxZ AvBb
†h‡nZz KwZcq mš¿vmx Kvh© cÖwZ‡iva Ges Dnv‡`i Kvh©Ki kvw¯Íi weavbmn Avbylw½K welqvw` m¤ú‡K©weavb cÖYqb Kiv mgxPxb I cÖ‡qvRbxq;
†m‡nZz wbgœiƒc AvBb Kiv nBj tÑ
cÖ_g Aa¨vq
cÖviw¤¢K1| mswÿß wk‡ivbvg, e¨vwß I cÖeZ©b|Ñ (1) GB AvBb mš¿vm we‡ivax AvBb, 2009 bv‡g AwfwnZ
nB‡e|
(2) mgMÖ evsjv‡`‡k Bnvi cÖ‡qvM nB‡e|
(3) Bnv 11 Ryb 2008 Zvwi‡L Kvh©Ki nBqv‡Q ewjqv MY¨ nB‡e|
2| msÁv|Ñ welq ev cÖm‡½i cwicš’x †Kvb wKQz bv _vwK‡j, GB Aa¨v‡`‡k,Ñ
(1) ÒAcivaÓ A_© GB AvB‡bi Aaxb `Ûbxq †Kvb Aciva;
(2) ÔA ¿Õ A ¿ AvBb, 1878 (1878 m‡bi 11 bs AvBb) Gi aviv 4 G ewY©Z A ¿k ¿ Ges †h †Kvbai‡bi cvigvYweK, ivmqwbK I Rxevby A ¿I Dnvi AšÍf©y³ nB‡e;
(3) ÒAv`vjZÓ A_© `vqiv RR Gi ev, †ÿÎgZ, AwZwi³ `vqiv RR Gi Av`vjZ;
(4) ÒKviv`ÛÓ A_© `Ûwewai aviv 53 †Z DwjøwLZ †h †Kvb eY©bvi Kviv`Û;
(5) Ò†dŠR`vix Kvh©wewaÓ ev ÒKvh©wewaÓ A_© Code of Criminal Procedure, 1898 (Act V of1898);
(6) ÒZdwmjÓ A_© GB AvB‡bi Zdwmj;
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(7) Ò`ÛwewaÓ A_© Penal Code, 1860 (Act XLV of 1860);
(8) Ò`vn¨ c`v_©Ó A_© Ggb †Kvb c`v_© hvnv‡Z Av¸b aivBevi ev Av¸b ZxeªZi Kwievi evQovBevi ¯vfvweK D”P cÖeYZv iwnqv‡Q, †hgbÑ AK‡Ub, †c‡Uªvj, wW‡Rj, iƒcvšÍwiZ cÖvK…wZKM¨vm (wm.Gb.wR), Mvb cvDWvi, Ges Ab¨ †h †Kvb `vn¨ c`v_©I Dnvi AšÍf©y³ nB‡e;
(9) Òevsjv‡`k e¨vsKÓ A_© Bangladesh Bank Order, 1972 (P.O. No. 127 of 1972) GiAaxb cÖwZwôZ evsjv‡`k e¨vsK;
(10) Ôe¨vsKÕ A_© e¨vsK †Kv¤úvwb AvBb, 1991 (1991 m‡bi 14 bs AvBb) Gi aviv 5 (Y) GmsÁvwqZ e¨vsK †Kv¤úvwb Ges Ab¨ †Kvb AvBb ev Aa¨v‡`‡ki Aaxb e¨vsK wnmv‡e cÖwZwôZ†h †Kvb cÖwZôvbI Dnvi AšÍf~©³ nB‡e;
(11) ÒwePviKÓ A_© `vqiv RR, AwZwi³ `vqiv RR ev, †ÿÎgZ, mš¿vm we‡ivax we‡kl UªvBey¨bvjGi wePviK;
(12) Òwe‡kl UªvBey¨bvjÓ A_© aviv 28 Gi Aaxb MwVZ †Kvb mš¿vm we‡ivax we‡kl UªvBey¨bvj;
(13) Òwe‡ùviK `ªe¨Ó A_©Ñ
(K) MvbcvDWvi, bvB‡Uªv-wMømvwib, wWbvgvBU, Mvb-KUb, eøvmwUs cvDWvi, duy‡m DVv(fulminate) cvi` ev Ab¨ †Kvb avZz, iw½b Av¸b (colored fire) Ges we‡ùvi‡Yigva¨‡g Kvh©Ki cÖfve, ev AvZmevwRi cÖfve m„wói j‡ÿ¨ e¨eüZ ev Drcvw`Z Ab¨ †h†Kvb ªe¨ hvnv Dcwi-DwjøwLZ c`v_©mg~‡ni m „k nDK ev bv nDK; Ges
(L) we‡ùviK mvgMÖx ˆZixi †h †Kvb c`v_© I †Kvb we‡ùviK c`v‡_©i gva¨‡g ev mn‡hv‡Mwe‡ùviY m„wó, ev e¨env‡ii AwfcÖv‡q iƒcvšÍwiZ Kwievi, ev mnvqZvi Rb¨ e¨eüZ, †Kvbhš¿, nvwZqvi, hš¿cvwZ ev e ‘mn Abyiƒc hš¿, hš¿cvwZ ev nvwZqv‡ii †Kvb Ask GeswdDR, i‡KU, cviKvkb K¨vcm, †W‡Uv‡bUi, KvwUª©R I †h †Kvb ai‡Yi †Mvjveviæ`IBnvi AšÍf©y³ nB‡e;
(14) Ôm¤úwËÕ A_© †`‡k ev †`‡ki evwn‡i Aew¯’Z-
(A) e ‘MZ ev Ae ‘MZ, ’vei ev A ’vei, „k¨gvb ev A „k¨gvb †h K‡bv ai‡bi m¤úwË ID³ m¤úwË nB‡Z D™~¢Z jvf Ges †Kvb A_© ev A‡_© iæcvšÍi‡hvM¨ wewbgq `wjjI(Negotiable intrument) Bnvi AšÍf©~³ nB‡e;
(Av) bM` UvKv, B‡jKUªwbK wWwRUvjmn Ab¨ †h ‡Kvb cÖK…wZi `wjj ev BÝUª‡g›U hvnv †Kvbm¤úwËi gvwjKvbv ¯Ë ev gvwjKvbv ¯‡Z¡ †Kvb ¯v_© wb‡`©k Ki‡e|
(15) Òmvÿ¨ AvBbÓ A_© Evidence Act, 1872 (Act I of 1872)|
(16) m‡›`nRbK †jb‡`b A_© GBiƒc †jb‡`b-
(1) hvnv ¯vfvweK †jb‡`‡bi aib nB‡Z wfbœ;
(2) †hB †jb‡`b m¤ú‡K© GBiƒc avibv nq †h,
(K) Bnv †Kvb Aciva nB‡Z AwR©Z m¤ú`,
(L) Bnv †Kvb mš¿vmx Kv‡h©, †Kvb mš¿vmx msNUb‡K ev †Kvb mš¿vmx‡K A_©vqb;
(3) hvnv GB AvB‡bi D‡Ïk¨ c~iYK‡í, evsjv‡`k e¨vsK KZ©„K mg‡q mg‡q, RvwiK…Zwb‡`©kbvq ewY©Z Ab¨ †Kvb †jb‡`b ev †jb‡`‡bi cÖ‡Póv;
(17) ÔmËvÕ A_© †Kvb AvBbx cÖwZôvb mswewae× msÁv evwYwR¨K ev AevwYwR¨K cÖwZôvb, †Mvôx,Aswk`vix Kvievi, mgevq mwgwZmn GK ev GKvwaK e¨w³i mgš‡q MwVZ h †Kvb msMVb;
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(18) Ô Avw_©K cÖwZôvbÕ A_© Avw_©K cÖwZôvb AvBb, 1993 (1993 m‡bi 27 bs AvBb) Gi aviv 2(L) G msÁvwqZ Avw_©K cÖwZôvb;
(19) ÔexgvKvixÕ A_© exgv AvBb, 2010 (2010 m‡bi 13 bs AvBb) Gi aviv 2 (25) G msÁvwqZexgvKvix;
(20) wi‡cvU© cÖ vbKvix ms ’v A_©-
(A) e¨vsK
(Av) Avw_©K cÖwZôvb;
(B) exgvKvix
(&C) gvwb †PÄvi;
(D) A_© A_ev A_©g~j¨ †cÖiYKvix ev ’vbvšÍiKvix †h †Kvb †Kv¤úvwb ev cÖwZôvb;
(E) evsjv‡`k e¨vs‡Ki AbygwZµ‡g e¨emv cwiPvjbvKvix Ab¨ †Kvb cÖwZôvb;
(F) (1) ÷K wWjvi I ÷K †eªvKvi
(2) †cvU©‡dvwjI g¨v‡bRvi I gv‡P©›U e¨vsKvi
(3) wmwKDwiwUR Kv÷wWqvb
(4) m¤ú` e¨e ’vcK
(G) (1) A-jvfRbK ms ’v/ cÖwZôvb (Non Profit Organisation),
(2) ‡emiKvix Dbœqb ms ’v (Non Government Organisation) I
(3) mgevq mwgwZ;
(H) wi‡qj G‡÷U †W‡fjcvi;
(I) g~j¨evb avZz ev cv_‡ii e¨emvqx
(J) Uªv÷ I †Kv¤úvwb †mev cÖ vbKvix;
(AA) AvBbRxex, †bvUvix, Ab¨vb¨ AvBb, †ckvRxex Ges GKvD‡›U›U;
(AAv) miKv‡ii Aby‡gv`bµ‡g evsjv‡`k e¨vsK KZ©„K, mg‡q mg‡q, weÁwß Rvixi gva¨‡g†NvwlZ Ab¨ †Kvb cÖwZôvb;
(21)Ôgvwb †PÄviÕ A_© Foreign Exchange regulation Act, 1947 (Act No. VII of1947) Gi section 3 Gi Aaxb evsjv‡`k e¨vsK KZ©„K Aby‡gvw`Z ˆe‡`wkK gy`ªv †jb‡`bKvix e¨w³ev cÖwZôvb;
(22) (A) Ô÷K wWjvi I ÷K †eªvKviÕ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (÷K wWjvi, ÷K†eªvKvi I Aby‡gvw`Z cÖwZwbwa) wewagvjv, 2000 Gi h_vµ‡g wewa 2 (S) I 2 (T)msÁvwqZ cÖwZôvb;
(Av) Ô †cvU© †dvwjI g¨v‡bRvi I gv‡P©›U e¨vsKÕ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (gv‡P©›Ue¨vsKvi I †cvU©‡dvwjI g¨v‡bRvi) wewagvjv, 1996 &I h_vµ‡g wewa 2 (P) I 2 (T) G
msÁvwqZ cÖwZôvb;
(B) ÔwmwKDwiwU Kv÷wWqvbÕ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (wmwKDwiwU Kv÷wWqvb †mev)wewagvjv, 2003 Gi wewa 2 (T) G msÁvwqZ cÖwZôvb;
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(C) Ôm¤ú` e¨e ’vcKÕ A_© wmwKDwiwUR I G·‡PÄ Kwgkb (wgDPz¨qvj dvÛ wewagvjv, 2001Gi wewa 2 (a) G msÁvwqZ cÖwZôvb;
(23) Ô AÑ jvfRbK ms ’v/cÖwZôvb (Non Profit Organisation)’ A_© †Kv¤úvwb AvBb(evsjv‡`k), 1994 (1994 m‡bi 18 bs AvBb) Gi aviv 28 Gi Aaxb mb`cÖvß †KvbcÖwZôvb;
(24) Ô †emiKvix Dbœqb ms ’v (Non Government Organisation) A_© SocietiesRegistration Act, 1860 (Act No. XXi of 1860) Voluntary Social WelfareAgencies (Registration and Control) Ordinance (Ordinance No. XLVI of1961), Foreign Donations (Voluntary Activities) Regulation Ordinance,1978 (Ordinance No. Xlvi of 1978), Foreign Contributions (Regulation )Ordinance, 1982 (Ordinance No. XXXI of 1982), mgevq mwgwZ AvBb, 2001(2001 m‡bi 47 bs AvBb) Ges gvB‡µv‡µwWU †i¸‡jUix A_wiwU AvBb, 2006 (2006m‡bi 32 bs AvBb) Gi AvIZvq Aby‡gvw`Z ev wbewÜZ cÖwZôvb hvnv-
(K) ’vbxq Drm nB‡Z Znwej (FY, Aby`vb, AvgvbZ) MÖnY K‡i ev Ab¨‡K cÖ vb K‡i ;Ges/A_ev
(L) †h †Kvb ai‡bi ˆe‡`wkK mvnvh¨ ev FY ev Aby`vb MÖnY K‡i;
(25) Ôevsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU (BFIU)Õ A_© gvwbjÛvwis cÖwZ‡iva AvBb,2009 Gi aviv 24 (1) Gi weavb Abyhqx cÖwZwôZ evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU;
(26) Ô e ÍMZ mnvqZ (material support)’ A_© †Kvb ew³ ev mËv KZ…©K Ab¨ †Kvb e¨w³ evmËv‡K A_©, †mev ev Ab¨ †Kvb m¤úwË mieivn Kiv ev Ab¨ †Kvb mnvqZv Kiv hvnv Øviv GBAvB‡bi AvIZvq ewY©Z mš¿vmx Kg©KvÛ m¤úvw`Z nBqv‡Q ev m¤úvw`Z nB‡Z cv‡i;
(27) ÔnvB‡KvU© wefvMÕ A_© evsjv‡`k mycÖxg †Kv‡U©i nvB‡KvU© wefvM;
(28) Ôwi‡qj G‡÷U †W‡fjcviÕ A_© wi‡qj G‡÷U Dbœqb I e¨e ’vcbv AvBb, 2010 (2010m‡bi 48 bs AvBb) Gi aviv 2(15) G msÁvwqZ †h †Kvb wi‡qj G‡÷U †W‡fjcvi ev DnviKg©KZv© ev Kg©Pvix A_ev G‡R›U hvnviv Rwg, evmv ev evwo, evwYwR¨K feb Ges d¬ vUmnBZ¨vw` wbg©vY I µq-weµ‡qi mwnZ RwoZ;
(29) ÔUªv÷ I †Kv¤úvbx †mev cÖ vbKvixÕ A_© †Kvb e¨w³ ev e¨emv cÖwZôvb hvnv Ab¨ †Kvb AvB‡bmsÁvwqZ Kiv nq bvB Ges †h ev hvnv †Kvb Z…Zxq cÿ‡K wb¤œiƒc †mevmg~n cÖ vb Kwiqv_v‡K t
(1) †Kvb AvBbx mËv cÖwZôvb G‡R›U wnmv‡e `vwqZ¡ cvjb;
(2) †Kvb AvBbx mËvi cwiPvjK, mwPe wn‡m‡e `vwqZ¡ cvjb ev Ab¨ Kvnv‡KI wb‡qvM Kiv evAskx`vix e¨emvq Askx`vi wnmv‡e `vwqZ¡ cvjb A_ev mgch©v‡qi Ab¨ †Kvb `vwqZ¡ cvjb;
(3) †Kvb AvBbx mËvi wbewÜZ G‡R›U wnmv‡e `vwqZ¡ cvjb;
(4) †Kvb G·‡cÖm Uªv‡÷I Uªvw÷ wnmv‡e `vwqZ¡ cvjb ev Ab¨ Kvnv‡K wb‡qvM Kiv;
(5) bwgwb ‡kqvi †nvìvi ev Ab¨ †Kvb e¨w³i cwie‡Z© cwiPvjK wnmv‡e `vwqZ¡ cvjb ev Ab¨e¨w³i cwie‡Z© cwiPvjK wnmv‡e `vwqZ¡ cvjb ev Ab¨ e¨w³‡K wb‡qvM cÖ vb;
(30) ÔRbwbivcËvÕ A_©© †h †Kvb e¨w³ ev †Mvôxi Rxeb I m¤ú‡`i wbivcËv weavb|Ó|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
3| Ab¨vb¨ kã I Awfe¨w³i cÖ‡hvR¨Zv|Ñ (1) GB Aa¨v‡`‡k e¨eüZ †h mKj kã ev Awfe¨w³imsÁv GB Aa¨v‡`‡k †`Iqv nq bvB, †mB mKj kã ev Awfe¨w³ †dŠR`vix Kvh©wewa ÔgvwbjÛvwis cÖwZ‡ivamsµvšÍ we`¨gvb AvBbÕ ev, †ÿÎgZ, `Ûwewa‡Z †h A‡_© e¨eüZ nBqv‡Q †mB A‡_© cÖ‡hvR¨ nB‡e|
(2) Aciva I kvw Íi `vq `vwqZ¡ msµvšÍ `Ûwewai mvaviY weavbvejx, hZ ~i m¤¢e, GB AvB‡biAb¨vb¨ weav‡bi mwnZ Am½wZc~Y© bv nB‡j, GB AvB‡bi Aaxb Acivamg~‡ni †ÿ‡Î cÖ‡hvR¨ nB‡e|
4| AvB‡bi cÖvavb¨|Ñ †dŠR`vix Kvh©wewa ev AvcvZZt ejer Ab¨ †Kvb AvB‡b hvnv wKQzB _vKzK bv†Kb, GB AvB‡bi weavbvejx Kvh©Ki _vwK‡e|
5| AwZivwóªK cÖ‡qvM|-1| hw` †Kvb e¨w³ ev mËv evsjv‡`‡ki evwni nB‡Z evsjv‡`‡ki Af¨šÍ‡i†Kvb Aciva msNUb K‡i hvnv D³ e¨w³ ev mËv KZ©„K evsjv‡`‡ki Af¨šÍi nB‡Z msNwUZ nB‡j GB AvB‡biAaxb kvw ͇hvM¨ nB‡Z, Zvnv nB‡j D³ Aciva evsjv‡`‡k msNwUZ nB‡q‡Q ewjqv MY¨ nB‡e Ges D&³e¨w³ev mËv I Aciv‡ai †ÿ‡Î GB AvB‡bi weavbejx cÖ‡hvR¨ nB‡e|
(2) hw` †Kvb e¨w³ ev mËv evsjv‡`‡ki evwn‡I †Kvb Aciva msNUb K‡I, hvnv evsjv‡`‡k msNwUZ nB‡j GBAvB‡bi Aaxb kvw ͇hvM¨ nB‡Z Zvnv nB‡j D³ Aciva evsjv‡`‡k msNwUZ nBqv‡Q ewjqv MY¨ nB‡e GesD³ e¨w³ ev mËv I Aciv‡ai †ÿ‡Î GB AvB‡bi weavbvejx cÖ‡hvR¨ nB‡e|Ó
wØZxq Aa¨vq
Aciva I `Û
6| mš¿vmx Kvh©|Ñ (1) (K) †Kvb e¨w³ ev mËv evsjv‡`‡ki AvLÛZv, msnwZ, RbwbiæcËv ev mve©‡fŠgZ¡ wecbœKwievi Rb¨ RbmvaviY ev Rbmvavi‡Yi †Kvb As‡ki gv‡a¨ AvZ¼ m„wói gva¨‡g miKvi ev K‡bv mËv ev †Kvbe¨w³‡K †Kvb Kvh©Kwi‡Z ev Kiv nB‡Z weiZ ivwL‡Z eva¨ Kwievi D‡Ï‡k¨Ñ
(A) †Kvb e¨w³‡K nZ¨v, ¸iæZi AvNvZ, AvUK, AcniY Kwi‡j ev GB Kv‡R mnqZv Kwi‡j , ev†Kvb e¨w³ ev mËv ev iv‡óªi †Kvb m¤úwËi ÿwZmvab Kwi‡j ev ÿwZmvab Kwi‡Z mnqZvKwi‡j;
(Av) †Kvb e¨w³‡K nZ¨v, ¸iæZi AvNvZ, AvUK, AcniY Kivi Rb¨ cÖ‡ivwPZ Kwi‡j, ev cÖ‡PóvMÖnY Kwi‡j, ev ‡Kvb e¨w³ ev mËv ev iv‡óªi †Kvb m¤úwËi ÿwZ mvab Kwievi Kv‡h© cÖ‡ivwPZKwi‡j ev cÖ‡Póv MÖnY Kwi‡j; A_ev
(B) Dc `dv (A) I (Av) Gi D‡Ïk¨ mvabK‡í ‡Kvb we‡ùviK `ªe¨ `vn¨ c`v_© I †Kvb A ¿e¨envi Kwi‡j ev wbR `L‡j ivwL‡j;
(L) †Kvb e¨w³ ev mËv evsj‡`‡ki Af¨šÍi nB‡Z Ab¨ †Kvb iv‡óªi wbivcËv wewNœZ Kwievi j‡ÿ¨ †KvbAciva msNUb Kwi‡j ev Aciva msNU‡bi cÖ‡Póv MÖnY Kwi‡j ev cÖ‡ivwPZ Kwi‡j ev mnqZv Kwi‡jA_ev Ab¨ †Kvb iv‡óªi †Kvb m¤úwËi ÿwZmvabK‡í †Kvb e¨w³ ev mËvi Avw_©K ms‡køl _vwK‡j ev D³Aciva Kv‡h© wjß nB‡j ev cÖ‡Póv MÖnY Kwi‡j ev cÖ‡ivwPZ Kwi‡j ev mnvqZv cÖ vb Kwi‡j;
(M) †Kvb e¨w³ ev mËv ÁvZmv‡i mš¿vmx Kvh© nB‡Z D™¢zZ ev †Kvb mš¿vmx ev mš¿vmx †Mvôx KZ©„K cÖ Ë ‡KvbA_© ev m¤ú` †fvM Kwi‡j ev `L‡j ivwL‡j;
(N) †Kvb we‡`kx bvMwiK evsjv‡`‡ki Af¨šÍ‡i `dv (K), (L) I (M) Gi Aax‡b †Kvb Aciva Kwi‡j
--- wZwb Òmš¿mx Kvh©Ó msNU‡bi Aciva Kwi‡eb|
(2) †Kvb e¨w³ ev mËv mš¿vmx Kvh© msNUb Kwiqv _vwK‡j wZwb ev D³ mËvi mswkøó e¨w³ ev e¨w³eM©wZwb ev Zvnviv †h bv‡gB cwiwPZ nDK bv †Kb g„Zz¨`Ð ev hve¾xeb Kviv`Û ev Ab~aŸ© wek ermi Ges Ab~¨bPvi ermi ch©šÍ †h †Kvb †gqv‡` mkÖg Kviv`‡Ð `wÛZ nB‡eb, Ges Bnvi AwZwi³ A_© ÛI Av‡ivc KivhvB‡e|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
7| mš¿vmx Kv‡h© A_© †hvMvb msµvšÍ Aciva|Ñ |-(1) hw` †Kvb e¨w³ ev mËv ÁvZmv‡i Ab¨ †Kvb e¨w³ evmËv‡K A_©, †mev e ‘MZ mnvqZv (material support), ev Ab¨ †Kvb m¤úwË mieivn K‡ib ev mieiv‡niAwfcÖvq cÖKvk K‡ib hvnv‡Z Bnv wek¦m Kwievi hyw³m½Z KviY _v‡K †h, Dnv m¤ú~b© ev AvswkKfv‡e †Kvbmš¿vmx e¨w³ ev mËv ev †Mvôx ev msMVb KZ©„K †h †Kvb D‡Ï‡k¨ e¨envi Kiv nBqv‡Q ev nB‡Z cv‡i, ZvnvnB‡j wZwb ev D³ mËv mš¿vmx Kv‡h© A_©vq‡bi Aciva msMVb Kwiqv‡Qb ewjqv MY¨ nB‡eb|
(2) hw` †Kvb e¨w³ ev mËv ÁvZmv‡i Ab¨ †Kvb e¨w³ ev mËvi wbKU nB‡Z A_©, †mev, e ‘MZ mnqZv(Material Support), ev Ab¨ †Kvb m¤úwË MÖnY K‡ib hvnv‡Z Bnv wek¦vm Kwievi hyw³m½Z KviY _v‡K †h,Dnv m¤ú~Y© ev AvswkKfv‡e †Kvb mš¿vmx e¨w³ ev mËv ev †Mvôx ev msMVb KZ©„K †h †Kvb D‡Ï‡k¨ e¨envi KivnBqv‡Q ev nB‡Z cv‡i Zvnv nB‡j wZwb ev D³ mËv mš¿vmx Kv‡h© A_©vq‡bi Aciva msNwUZ Kwiqv‡Qb ewjqvMY¨ nB‡eb|
(3) hw` †Kvb e¨w³ ev mËv ÁvZmv‡i Ab¨ †Kvb e¨w³ ev mËvi Rb¨ A_©, †mev e ‘MZ mnvqZv (materialsupport), Ab¨ ‡Kvb m¤úwËi e¨e ’v K‡ib hvnv‡Z Bnv wek¦vm Kwievi hyw³m½Z KviY _v‡K †h, Dnv m¤ú~Y©ev AvswkKfv‡e †Kvb mš¿vmx e¨w³ ev mËv ev †Mvôx ev msMVb KZ©„K †h †Kvb D‡Ï‡k¨ e¨envi Kiv nBqv‡Q evnB‡Z cv‡i, Zvnv nB‡j wZwb ev D³ mËv mš¿vmx Kv‡h© A_©vq‡bi Aciva msNUb Kwiqv‡Qb ewjqv MY¨ nB‡eb|
(4) hw` †Kvb e¨w³ ev mËv ÁvZmv‡i Ab¨ †Kvb e¨w³ ev mËv‡K A_©, †mev, e ‘MZ mnvqZv (materialsupport), ev Ab¨ †Kvb m¤úwË mieivn ev MÖnY ev e¨e ’v Kwievi †ÿ‡Î Ggbfv‡e cÖ‡ivwPZ K‡ib hvnv‡ZBnv wek¦vm Kwievi hyw³msMZ KviY _v‡K †h, Dnv m¤ú~Y© ev AvswkKfv‡e †Kvb mš¿vmx e¨w³ ev mËv ev †Mvôxev msMVb KZ©„K †h †Kvb D‡Ï‡k¨ e¨envi Kiv nBqv‡Q ev nB‡Z cv‡i, Zvnv nB‡j wZwb ev D³ mËv mš¿vmxKv‡h© A_©vq‡bi Aciva msNUb Kwiqv‡Qb ewjqv MY¨ nB‡eb|
(5) Dc-aviv (1) nB‡Z (4) G ewY©Z Aciv‡a †Kvb e¨w³ †`vlx mve¨ Í nB‡j, D³ e¨w³ AbwaK wek ermi IAb~¨b Pvi ermi ch©šÍ †h †Kvb †ghv‡` Kviv`‡Ð `wÐZ nB‡eb, Ges Bnvi AwZwi³ Aciv‡ai mwnZ mswkøóm¤úwËi wظY g~‡j¨I mgcwigvY ev 10 (`k) jÿ UvKv, hvnv AwaK, †mB cwigvY A_© ÐI Av‡ivc KivhvB‡e|
(6) (K) Dc-aviv (1) nB‡Z (4) G ewY©Z Aciv‡a †Kvb mËv †`vlx mve¨ Í nB‡j aviv 18 Gi weavb Abyhvqxe¨e ’v MÖnY Kiv hvB‡e Ges Bnvi AwZwi³ Aciv‡ai mwnZ mswkøó m¤úwËi wZb¸b g~‡j¨ mgcwigvY ev 50(cÂvk) jÿ UvKv, hvnv AwaK, †mB cwigvY A_© ÐI Av‡ivc Kiv hvB‡e; Ges
(6) (L) D³ mËvi cÖavb, Zvnv‡K †Pqvig¨vb, e¨e ’vcbv cwiPvjK, cÖavb wbe©vnx ev Ab¨ †h †Kvb bv‡g WvKvnDK bv †Kb, wZwb AbwaK wek ermi I Ab~¨b Pvi ermi ch©šÍ †h ‡Kvb †gqv‡` Kviv`‡Ð `wÐZ nB‡eb, GesBnvi AwZwi³ Aciv‡ai mwnZ mswkøó m¤úwËi wظY g~‡j¨i mgcwigvY ev 20 (wek) jÿ UvKv, hvnv AwaK,†mB cwigvb A_© ‡ÐI `wÐZ nB‡eb hw` bv wZwb cÖgvY Kwi‡Z mÿg nb †h, D³ Aciva Zvnvi AÁvZmv‡imsNwUZ nBqv‡Q A_ev D³ Aciva †iva Kwievi Rb¨ wZwb h_vmva¨ †Póv Kwiqv‡Qb|
8| wbwl× msMV‡bi m`m¨c`|Ñ hw` †Kvb e¨w³ aviv 18 Gi Aaxb †Kvb wbwl× msMV‡bi m`m¨ nbev m`m¨ ewjqv `vex K‡ib, Zvnv nB‡j wZwb Aciva msNUb Kwi‡eb Ges D³iƒc Aciva msNU‡bi Rb¨ wZwbAbwaK Qq gvm ch©šÍ †h †Kvb †gqv‡`i Kviv`Û, A_ev A_© Û, A_ev Dfq `‡Û `wÛZ nB‡eb|
9| wbwl× msMV‡bi mg_©b|Ñ (1) hw` †Kvb e¨w³ aviv 18 Gi Aaxb †Kvb wbwl× msMVb‡K mg_©bKwievi D‡Ï‡k¨ Kvnv‡KI Aby‡iva ev AvnŸvb K‡ib, A_ev wbwl× msMVb‡K mg_©b ev Dnvi Kg©KvÛ‡KMwZkxj I DrmvwnZ Kwievi D‡Ï‡k¨ †Kvb mfv Av‡qvRb, cwiPvjbv ev cwiPvjbvq mnvqZv K‡ib, A_eve³…Zv cÖ vb K‡ib, Zvnv nB‡j wZwb Aciva msNUb Kwi‡eb|
(2) hw` †Kvb e¨w³ †Kvb wbwl× msMV‡bi Rb¨ mg_©b Pvwnqv A_ev Dnvi Kg©KvÛ‡K mwµq KwieviD‡Ï‡k¨ †Kvb mfvq e³…Zv K‡ib A_ev †iwWI, †Uwjwfkb A_ev †Kvb gy ªY ev B‡jKUªwbK gva¨‡g †Kvb Z_¨m¤úªPvi K‡ib, Zvnv nB‡j wZwb Aciva msNUb Kwi‡eb|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(3) hw` †Kvb e¨w³ Dc-aviv (1) A_ev (2) Gi Aaxb †Kvb Aciv‡a †`vlx mve¨ Í nb, Zvnv nB‡jwZwb AbwaK mvZ ermi I Ab~¨b yB ermi ch©šÍ †h †Kvb †gqv‡`i Kviv`‡Û `wÛZ nB‡eb Ges Bnvi AwZwi³A_© ÛI Av‡ivc Kiv hvB‡e|
10| Aciva msNU‡bi loh‡š¿i (criminal conspiracy) kvw Í|Ñhw` †Kvb e¨w³ GB AvB‡biAaxb Aciva msNU‡bi lohš¿ K‡ib, Zvnv nB‡j wZwb D³ Aciv‡ai Rb¨ wba©vwiZ m‡e©v”P kvw Íi `yBZ…Zxqvsk †gqv‡`i †h †Kvb Kviv`‡Û, A_ev A_© ‡Û, A_ev Dfq `‡Û `wÛZ nB‡eb; Ges hw` D³ Aciv‡aiRb¨ wba©vwiZ kvw Í g„Zz¨`Û nq, Zvnv nB‡j Aciv‡ai kvw Í hve¾xeb Kviv`Û A_ev Ab~aŸ© †PŠÏ erm‡iiKviv`Û nB‡e, wKš‘ Dnv cuvP erm‡ii Kg nB‡e bv|
11| Aciva msNU‡bi cÖ‡Póvi (attempt) kvw Í|Ñ hw` †Kvb e¨w³ GB AvB‡bi Aaxb AcivamsNU‡bi †Póv K‡ib, Zvnv nB‡j wZwb D³ Aciv‡ai Rb¨ wba©vwiZ m‡e©v”P kvw Íi `yB Z…Zxqvsk †gqv‡`i †h†Kvb Kviv`‡Û, A_ev A_© ‡Û, A_ev Dfq `‡Û `wÛZ nB‡eb; Ges hw` D³ Aciv‡ai Rb¨ wba©vwiZ kvw Íg„Zz¨`Û nq, Zvnv nB‡j Aciv‡ai kvw Í hve¾xeb Kviv`Û A_ev Ab~aŸ© †PŠÏ erm‡ii Kviv`Û nB‡e, wKš‘ DnvcuvP erm‡ii Kg nB‡e bv|
12| Aciv‡a mnvqZvi (abetment) kvw Í|Ñ hw` †Kvb e¨w³ GB AvB‡bi Aaxb kvw ͇hvM¨ †KvbAciva msMV‡bi mnvqZv K‡ib, Zvnv nB‡j wZwb D³ Aciv‡ai Rb¨ wba©vwiZ `‡Û `wÛZ nB‡eb|
13| mš¿vmx Kg©KvÛ cÖ‡ivwPZ (instigation) Kwievi kvw Í|Ñ hw` †Kvb e¨w³ Zvnvi Kg©KvÛ A_evAsk MÖn‡Yi gva¨‡g †Kvb `wjj cÖ ‘Z ev weZiY K‡ib, A_ev †Kvb gy ªY ev B‡jKUªwbK Ôev Ab¨ †h †Kvbgva¨‡g †Kvb Z_¨ m¤úªPvi Kwiqv, A_ev †Kvb miÄvg, mnvqZv ev cÖhyw³ ev cÖwkÿY cÖ`v‡bi gva¨‡g †Kvbe¨w³ ev msMVb‡K GBiƒc AeMZ _vwKqv mnvqZv cÖ vb K‡ib †h, D³ `wjj, miÄvg, mnvqZv ev cÖhyw³ evcÖwkÿY GB AvB‡bi Aaxb †Kvb Aciva msNU‡bi Kv‡R e¨eüZ nB‡e ev D³ e¨w³ ev msMVb Dnv‡`i AbyiƒcAciva msMV‡bi cÖ‡Póvq e¨envi Kwi‡e, Zvnv nB‡j wZwb mš¿vmx Kg©KvÛ cÖ‡ivwPZ Kwiqv‡Qb ewjqv MY¨nB‡eb; Ges mswkøó Aciv‡ai Rb¨ wba©vwiZ m‡e©v”P kvw Íi yB Z…Zxqvsk †gqv‡`i Kviv`‡Û, A_ev A_© ‡Û,A_ev Dfq `‡Û Zvnv‡K `wÛZ Kiv hvB‡e; Ges hw` D³ Aciv‡ai Rb¨ wba©vwiZ kvw Í g„Zz¨`Û nq, ZvnvnB‡j Aciv‡ai kvw Í hve¾xeb Kviv`Û A_ev Ab~aŸ© †PŠÏ erm‡ii Kviv`Û nB‡e, wKš‘ Dnv cuvP erm‡ii KgnB‡e bv|
14| Acivax‡K AvkªqcÖ vb|Ñ (1) hw` †Kvb e¨w³, Ab¨ †Kvb e¨w³ GB AvB‡bi Aaxb AcivamsNUb Kwiqv‡Qb RvwbqvI ev D³ e¨w³ Acivax Bnv wek¦vm Kwievi hyw³m½Z KviY _vKv m‡Ë¡I, kvw Í nB‡Ziÿv Kwievi AwfcÖv‡q D³ e¨w³‡K Avkªq`vb K‡ib ev jyKvBqv iv‡Lb Zvnv nB‡j wZwbÑ
(K) D³ Aciv‡ai kvw Í g„Zy¨`Û nB‡j AbwaK cuvP erm‡ii Kviv`‡Û `wÛZ nB‡eb, Ges BnviAwZwi³ A_© ÛI Av‡ivc Kiv hvB‡e; A_ev
(L) D³ Aciv‡ai kvw Í hve¾xeb Kiv`Û ev †h †Kvb †gqv‡`i Kviv`Û nB‡j, AbwaK wZberm‡ii Kviv`‡Û `wÛZ nB‡eb; Ges Bnvi AwZwi³ A_© ÛI Av‡ivc Kiv hvB‡e|
(2) Dc-aviv (1) Gi Aaxb Avkªq`vb ev jyKvBqv ivwLevi Aciva ¯vgx, ¿x, cyÎ, Kb¨v, wcZv ev gvZvKZ…©K nB‡j, GB avivi weavb cÖ‡hvR¨ nB‡e bv|
Z…Zxq Aa¨vq
evsjv‡`k e¨vs‡Ki ÿgZv15| evsjv‡`k e¨vs‡Ki ÿgZv|Ñ (1) GB AvB‡bi Aaxb †Kvb Aciva msNU‡bi D‡Ï‡k¨ †Kvb wi‡cvU©cÖ vbKvix ms ’vi gva¨‡g †jb‡`b cÖwZ‡iva I mbv³ Kwi‡Z evsjv‡`k e¨vsK cÖ‡qvRbxq c`‡ÿc MÖnY Kwi‡Zcvwi‡e Ges GZ y‡Ï‡k¨ Dnvi wb¤œewY©Z ÿgZv I KZ©„Z¡ _vwK‡e, h_vt-
(K) †Kvb wi‡cvU© cÖ vbKvix ms ’v nB‡Z m‡›`nRbK †jb‡`b m¤úwK©Z cÖwZ‡e`b Zje Kiv;
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(L) Dc-`dv (K) Abyhvqx cÖvß cÖwZ‡e`b mswkøó AvBb cÖ‡qvMKvix ms ’v‡K cÖ‡qvRbxq Kvh©µg MÖn‡YiRb¨ cÖ vb Kiv ev †ÿÎgZ, ‰e‡`wkK AvBb cÖ‡qvMKvix ms ’vi Aby‡iv‡ai †cÖwÿ‡Z D³ ms ’v‡K cÖ vbKiv ev D³ cÖwZ‡e`b wel‡q Z_¨ wewbgq Kiv;
(M) mKj cwimsL¨vb I †iKW© msKjb I msiÿY Kiv;
(N) mKj m‡›`nRbK †jb‡`b m¤úwK©Z wi‡cv‡U©i WvUv-‡eR m„wó I iÿYv‡eÿY Kiv;
(O) m‡›`nRbK †jb‡`b m¤úwK©Z cÖwZ‡e`b we‡kølY Kiv;
(P) †Kvb †jb‡`b mš¿vmx Kv‡h©i mwnZ m¤ú„³ g‡g© m‡›`n Kwievi hyw³m½Z KviY _vwK‡j mswkøówi‡cvU© cÖ vbKvix ms ’v‡K D³ †jb‡`‡bi wnmve AbwaK 30 (wÎk) w`‡bi Rb¨ ’wMZ ev Aeiæ×ivwLevi D‡Ïk¨ wjwLZ Av‡`k Rvix Kiv Ges GBiƒ‡c D³ wnmv‡ei †jb‡`b m¤úwK©Z mwVK Z_¨D˜NU‡bi cÖ‡qvRb †`Lv w`‡j †jb‡`b ’wMZ ev Aeiæ× ivwLevi †gqv` AwZwi³ 30 (wÎk) w`b Kwiqvm‡e©v”P 6 (Qq) gvm ewa©Z Kiv;
(Q) wi‡cvU© cÖ vbKix ms ’vi Kvh©vejx cwiexÿY I Z`viK Kiv;
(R) mš¿vmx Kv‡h© A_© †hvMvb cÖwZnZ Kwievi D‡Ï‡k¨ cÖwZ‡ivagyjK c`‡ÿc MÖn‡Y wi‡cvU© cÖ vbKvixms ’vmg~n‡K wb‡`©k cÖ vb Kiv;
(S) mš¿vmx Kv‡h© A_©vq‡bi mwnZ RwoZ m‡›`nRbK †jb‡`b mbv‡³i D‡Ï‡k¨ wi‡cvU© cÖv`bKvixms ’vmg~n cwi`k©b Kiv; Ges
(T) mš¿vmx Kv‡h© A_© †hvMv‡bi mwnZ RwoZ m‡›`nRbK †jb‡`b mbv³ I cÖwZ‡iv‡ai D‡Ï‡k¨wi‡cvU© cÖ vbKvix ms ’vmg~‡ni Kg©KZv© I Kg©PvixMY‡K cÖwkÿY cÖ vb Kiv|
(2) evsjv‡`k e¨vsK, mš¿vmx Kv‡h© A_© †hvMv‡bi mwnZ RwoZ m‡›`nRbK †Kvb †jb‡`‡bi welq ‡Kvbwi‡cvU©© cÖ vbKvix ms ’v ev Bnvi MÖvnK‡K mbv³ Kwievi m‡½ m‡½, Dnv h_vh_ AvBb cÖ‡qvMKvixms ’v‡K AewnZ Kwi‡e Ges AbymÜvb I Z`šÍ Kv‡h© D³ AvBb cÖ‡qvMKvix ms ’v‡K cÖ‡qvRbxq mKjcÖKvi mn‡hvwMZv cÖ vb Kvwi‡e|
(3) Ab¨ †`‡k msNwUZ wePvivaxb Aciv‡ai †ÿ‡Î evsjv‡`k e¨vsK miKvi KZ©„K M„nxZ †Kvb AvšÍR©vwZK,AvÂwjK ev wØ-cvwÿK Pzw³, RvwZms‡Ni Kb‡fbkvb ev RvwZms‡Ni wbivcËv cwil` KZ©„K M„nxZmswkøó †iRy‡jk‡bi AvIZvq †Kvb e¨w³ ev mËvi wnmve Rã Kivi D‡`¨vM MÖnY Kwi‡e|
(4) Dc-aviv (3) Gi AvIZvq RãK…Z A_© mswkøó Pzw³, Kb‡fbk‡b ev RvwZms‡Ni wbivcËv cwil`KZ©„K M„nxZ mswkøó †iRy‡jk‡bi Av‡jv‡K mswkøó Av`vjZ KZ©„K wb®úwˇhvM¨ nB‡e|
(5) Dc-aviv (1) nB‡Z (3) G ewY©Z `vwqZ¡ m¤úv`‡bi ¯v‡_© miKvwi, Avav-miKvix, ¯vqËkvwmZ ms¯’vevsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU‡K Z`&KZ©„K hvwPZ Z_¨vw` mieivn Kwi‡e, ev †ÿÎgZ,¯cÖ‡Yvw`Z nBqv Z_¨vw` mieivn Kwi‡e|
(6) evsjv‡`k dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU Pvwn`v Abyhvqx ev †ÿÎgZ, ¯cÖ‡Yvw`Zfv‡e mš¿vmx Kvh©ev mš¿vmx Kv‡h© A_v©qb m¤ú„³ Z_¨vw` Ab¨ †`‡ki dvBb¨vwÝqvj B‡›Uwj‡RÝ BDwbU‡K mieivnKwi‡Z cvwi‡e|
(7) mš¿vmx Kv‡h© A_©vq‡bi wel‡q Z`‡šÍi ¯v‡_© †Kvb AvBb cÖ‡qvMKvix ms ’v KZ©„K †Kvb e¨vs‡Ki `wjjev †Kvb bw_‡Z wb¤œewY©Z k‡Z© cÖ‡ekvwaKvi _vwK‡e, h_vt-
(K) Dchy³ Av`vjZ ev UªvBe¨ybv‡ji Av‡`kµ‡g; A_ev
(L) evsjv‡`k e¨vs‡Ki Aby‡gv`bµ‡g|Ó
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
16| wi‡cvU© cÖ vbKvix ms ’vi `vwqZ¡|Ñ (1) †Kvb wi‡cvU© cÖ vbKvix ms ’vi gva¨‡g GB AvB‡bi Aaxb †KvbAciv‡ai mwnZ RwoZ A_© †jb‡`b cÖwZ‡iva I mbv³ Kwievi j‡ÿ¨ cÖ‡Z¨K wi‡cvU© cÖ`vbKvix ms ’v h_vh_mZK©Zv I `vwqZ¡kxjZvi mwnZ cÖ‡qvRbxq e¨e ’v MÖnY Kwi‡e Ges †Kvb m‡›`nRbK †jb‡`b wPwýZ nB‡j¯cÖ‡Yvw`Z nBqv †Kvb cÖKvi wej¤ e¨wZ‡i‡K evsjv‡`k e¨vsK‡K wi‡cvU© Kwi‡e|
(2) cÖ‡Z¨K wi‡cvU© cÖ vbKvix ms ’vi cwiPvjbv cwil` ( Bord of Directors) ev cwiPvjbv cwil‡`iAbycw ’wZ‡Z cÖavb wbe©vnx, ev Ab¨ †h bv‡g WvKv nDK bv †Kb, Dnvi Kg©KZ©v‡`i `vwqZ¡ m¤úwK©Zwb‡`©kbv Aby‡gv`b I Rvix Kwi‡e, Ges aviv 15 Gi Aaxb evsjv‡`k e¨vsK KZ©„K RvixK…Z wb‡ ©kbv,hvnv wi‡cvU© cÖ vbKvix ms ’vmg~‡ni Rb¨ cÖ‡hvR¨, cÖwZcvjb Kiv nB‡Z‡Q wKbv Dnv wbwðZ Kwi‡e|
(3) †Kvb wi‡cvU© cv`vbKvix ms ’v aviv 15 Gi Aaxb evsjv‡`k e¨vsK KZ©„K cÖ Ë †h †Kvb wb‡ ©kbv cvjbKwi‡Z e¨_© nB‡j ev ÁvZmv‡i †Kvb f~j Z_¨ mieivn A_ev wg_¨v Z_¨ ev weeiYx mieivn Kwi‡j,D³ wi‡cvU© cÖ vbKvix ms ’v evsjv‡`k e¨vsK KZ©„K wba©vwiZ I wb‡© wkZ AbwaK 10 (`k) jÿ UvKvRwigvbv cwi‡kva Kwi‡Z eva¨ _vwK‡e Ges evsjv‡`k e¨vsK D³ ms ’v ev ms ’vi †Kvb kvLv, mvwf©m†m›Uvi, ey_ ev G‡R‡›Ui evsjv‡`k Kvh©µg cwiPvjbv iwnZ Kwievi D‡Ïk¨ wbeÜb ev jvB‡mÝ ’wMZKwi‡Z cvwi‡e ev †ÿÎgZ, wbeÜbKvix ev jvB‡mÝ cÖ vbKvix KZ©„cÿ‡K D³ ms ’vi weiæ‡× h_vh_e¨e ’v MÖn‡Yi wbwg‡Ë welqwU AewnZ Kwi‡e|
(4) Dc-aviv(3) †gvZv‡eK evsjv‡`k e¨vsK KZ©„K Av‡ivwcZ Rwigvbv †Kvb wi‡cvU©©© cÖ vbKvix ms ’vcwi‡kva Kwi‡Z e¨_© nB‡j ev cwi‡kva bv Kwi‡j evsjv‡`k e¨vsK mswkøó wi‡cvU© cÖ vbKvix ms ’viwbR bv‡g †h †Kvb e¨vsK ev Avw_©K cÖwZôvb ev evsjv‡`k e¨vs‡K cwiPvwjZ wnmve weKjbc~e©K Av`vqKwi‡Z cvwi‡e Ges D³ Rwigvbvi †Kvb Ask Abv`vqx _vwK‡j Dnv Av`v‡q, cÖ‡qvR‡b, evsjv‡`ke¨vsK mswkøó Av`vj‡Z Av‡e`b Kwi‡Z cvwi‡e|Ó
PZz_© Aa¨vq
mš¿vmx msMVb
17| mš¿vmx Kv‡h©i mwnZ RwoZ msMVb|Ñ GB AvB‡bi D‡Ïk¨ c~iYK‡í, †Kvb msMVb mš¿vmx Kv‡h©imwnZ RwoZ ewjqv MY¨ nB‡e, hw` DnvÑ
(K) mš¿vmx Kvh© msNwUZ K‡i ev D³ Kv‡h© Ask MÖnY K‡i;(L) mš¿vmx Kv‡h©i Rb¨ cÖ ‘wZ MÖnY K‡i;(M) mš¿vmx Kvh© msNU‡b mvnvh¨ K‡i ev Drmvn cÖ vb K‡i;(N) mš¿vmx Kv‡h©i mwnZ RwoZ †Kvb msMVb‡K mg_©b Ges mnvqZv cÖ vb K‡i;(O) RvwZms‡Ni ‡iRy‡jkb b¤i 1267 I 1373 mn evsjv‡`k KZ©„„K Abymgw_©Z Ab¨vb¨
†iRy‡jkbmg~‡ni AšÍf©~³ msMVb nq; A_ev
(P) Ab¨ †Kvb fv‡e mš¿vmx Kv‡h©i mwnZ RwoZ _v‡K|
18| msMVb wbwl×KiY|Ñ (1) GB AvB‡bi D‡Ïk¨ c~iYK‡í, miKvi †Kvb msMVb‡K mš¿vmx Kv‡h©imwnZ RwoZ iwnqv‡Q g‡g© hyw³m½Z Kvi‡Yi wfwˇZ, Av‡`k Øviv, Zdwm‡j ZvwjKvfz³ Kwiqv, wbwl× Kwi‡Zcvwi‡e|
(2) miKvi, Av‡`k Øviv, †h †Kvb msMVb‡K Zdwm‡j ms‡hvRb ev Zdwmj nB‡Z ev` w`‡Z A_evAb¨ †Kvbfv‡e Zdwmj ms‡kvab Kwi‡Z cvwi‡e|
19| cybtcixÿv (Review)|Ñ (1) aviv 18 Gi Aaxb miKvi KZ…©K cÖ Ë Av‡`k Øviv msÿzämsMVb, Av‡`k cÖ v‡bi ZvwiL nB‡Z wÎk w`‡bi g‡a¨, Dnvi weiæ‡× wjwLZfv‡e, hyw³ Dc ’vcbc~e©K,miKv‡ii wbKU cybtwbixÿvi Rb¨ Av‡e`b Kwi‡Z cvwi‡e Ges miKvi, Av‡e`bKvixi ïbvbx MÖnYc~e©K, ÔGBAvB‡bi Aaxb cÖYxZ wewa †gvZv‡eK Av‡e`b cÖvwßi ZvwiL nB‡Z beŸB w`e‡mi g‡a¨ Dnv wb®úbœ Kwi‡e|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(2) Dc-aviv (1) Gi Aaxb cybtwbixÿvi Av‡e`b bvgÄyi Kiv nB‡j, D³ msÿzä msMVb Av‡e`bbvgÄyi nBevi ZvwiL nB‡Z wÎk w`‡bi g‡a¨ nvB‡KvU© wefv‡M Avcxj `v‡qi Kwi‡Z cvwi‡e|
(3) miKvi, miKvix †M‡R‡U cÖÁvcb Øviv, Dc-aviv (1) Gi Aaxb `v‡qiK…Z cybtwbixÿvi`iLv Ímg~n wb¯úwËi Rb¨ GKwU wZb m`m¨ wewkó cybtwbixÿv KwgwU (Review Committee) MVb Kwi‡e|
20| wbwl× msMV‡bi weiæ‡× e¨e ’v MÖnY|Ñ (1) †Kvb msMVb‡K wbwl× Kiv nB‡j miKvi, GBAa¨v‡`‡k ewY©Z Ab¨vb¨ e¨e ’v MÖnY QvovI, ÔGB AvB‡bi Aaxb cÖYxZ wewa †gvZv‡eK wbgœewY©Z c`‡ÿc MÖnYKwi‡e, h_v tÑ
(K) Dnvi Kvh©vjq, hw` _v‡K, eÜ Kwiqv w`‡e;
L) Dnvi e¨vsK I Ab¨vb¨ wnmve hw` _v‡K, Aeiƒ× (Freeze) Kwi‡e Ges Dnvi mKj m¤úwË AvUKKwi‡e;
(M) mKj cÖKv‡ii cÖPvicÎ, †cv÷vi, e¨vbvi, A_ev gyw`ªZ, B‡jKUªwbK, wWwRUvj ev Ab¨vb¨ DcKiYev‡Rqvß Kwi‡e; Ges
(N) wbwl× msMVb ev Dnvi c‡ÿ ev mg_©‡b †h †Kvb †cÖm wee„wZi cÖKvkbv, gy`ªY ev cÖPviYv, msev`m‡¤§jb ev Rbm¤§y‡L e³…Zv cÖ vb wbwl× Kwi‡e|
(2) wbwl× msMVb Dnvi Avq I e¨‡qi wnmve †ck Kwi‡e Ges GZ y‡Ï‡k¨ miKvi KZ…©K g‡bvbxZ Dchy³KZ…©c‡ÿi wbKU Av‡qi mKj Drm cÖKvk Kwi‡e|
(3) hw` †`Lv hvq †h wbwl× msMV‡bi Znwej Ges cwim¤ú` (asset) A‰eafv‡e AwR©Z nBqv‡Q A_evGB AvB‡bi Aaxb †Kvb Aciva msNU‡b e¨eüZ nBqv‡Q, Zvnv nB‡j D³ Znwej Ges cwim¤ú`iv‡óªi AbyK‚‡j ev‡Rqvß nB‡e|
cÂg Aa¨vq
Aciv‡ai Z`šÍ21| cywjk KZ©„K mvÿx‡K cixÿv m¤úwK©Z we‡kl weavb|-- (1) hw` †Kvb cywjk Kg©KZ©v GB AvB‡bi
Aax‡b †Kvb gvgjvi Z`šÍKv‡j NUbv Ges cwiw ’wZ m¤ú‡K© AewnZ GBiƒc †Kvb e¨w³‡K wRÁvmvev` KwievicÖ‡qvRb g‡b K‡ib Ges, hw` D³ e¨w³ NUbvi weeiY wjwLZfv‡e cÖ vb Kwi‡Z h‡_ó mÿg g‡g© cywjkKg©KZ©vi Rvbv _v‡K ev wek¦vm Kwievi KviY _v‡K, Zvnv nB‡j D³ cywjk Kg©KZ©v, D³ e¨w³i m¤§wZ‡Z,NUbvi weeiY D³ e¨w³i wbKU nB‡Z wjwLZfv‡e MÖnY Kwi‡Z cvwi‡eb|
(2) D³ e¨w³ Zvnvi e³e¨ ev NUbvi weeiY ¯n‡ Í Kjg Øviv wjwce× I ¯vÿi Kwi‡eb|
22| g¨vwR‡÷ªU KZ©„K mvÿxi wee„wZ †iKW© m¤úwK©Z we‡kl weavb|-- †h †Kvb †g‡UªvcwjUb g¨vwR‡÷ªU,RywWwkqvj g¨vwR‡÷ªU, A_ev GZ y‡Ï‡k¨ we‡klfv‡e ÿgZvcÖvß wØZxq †kªYxi g¨vwR‡÷ªU hw` AeMZ _v‡Kb evZvnvi wek¦vm Kwievi hyw³ msMZ KviY _v‡K †h, gvgjvi NUbv I cwiw ’wZ m¤ú‡K© AewnZ †Kvb e¨w³ Zvnviwee„wZ wjwLZfv‡e cÖ vb Kwi‡Z h‡_ó mg_©, Zvnv nB‡j wZwb D³ e¨w³‡K Zvnvi wee„wZ Kjg Øviv ¯n‡ ÍwjwLZfv‡e cÖ vb Kwi‡Z wb‡`©k cÖ vb Kwi‡Z cvwi‡eb|
23| Awfhy³ e¨w³i ¯xKv‡ivw³ †iKW© m¤úwK©Z we‡kl weavb|-- †h †Kvb †g‡UªvcwjUb g¨vwR‡÷ªU,RywWwkqvj g¨vwR‡÷ªU, A_ev GZ y‡Ï‡k¨ we‡klfv‡e ÿgZvcÖvß wØZxq †kªYxi g¨vwR‡÷ªU Awfhy³ e¨w³ KZ©„K¯xKv‡ivw³g~jK †Kvb e³e¨ †iKW©Kv‡j, hw` D³ e¨w³ NUbv m¤ú‡K© wjwLZfv‡e wee„wZ cÖ vb Kwi‡Z mÿg IAvMÖnx nb, Zvnv nB‡j D³ e¨w³‡K Zvnvi ¯xKv‡ivw³g~jK e³e¨ ¯n‡ Í Kjg Øviv wjwce× Kwi‡Z AbygwZcÖ vb Kwi‡eb|
24| Z`‡šÍi mgqmxgv|-- (1) †Kvb cywjk Kg©KZ©v GB AvB‡bi Aaxb †Kvb gvgjvi Z`šÍ Kvh©wewai aviv154 Gi Aaxb Z_¨ cÖvwß A_ev wjwce× Kwievi ZvwiL nB‡Z lvU w`‡bi g‡a¨ m¤úbœ Kwi‡eb|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(2) hw` †Kvb cywjk Kg©KZ©v Dc-aviv (1) G DwjøwLZ mg‡qi g‡a¨ Z`šÍ m¤úbœ Kwi‡Z bv cv‡ib, ZvnvnB‡j, gvgjvi Wvqix‡Z wjwLZfv‡e KviY wjwce× Kwiqv AbwaK wÎk w`b mgq e„w× Kwi‡Z cvwi‡eb|
(3) hw` D³ cywjk Kg©KZ©v Dc-aviv (2) G DwjøwLZ mg‡qi g‡a¨ Z`šÍ m¤úbœ Kwi‡Z bv cv‡ib, ZvnvnB‡j D³ Z`šÍKvix Kg©KZ©v mswkøó †Rjvi cywjk mycvwib‡Ub‡W‡›Ui A_ev, †ÿÎgZ, †g‡UªvcwjUb GjvKvqmswkøó †WcywU cywjk Kwgkbv‡ii wjwLZ Aby‡gv`bµ‡g, AwZwi³ AbwaK wÎkw`b mgq e„w× Kwi‡Z cvwi‡e;
Z‡e kZ© _v‡K †h, gvgjvi Z`‡šÍi cÖ‡qvR‡b evsjv‡`‡ki evwn‡i Ab¨ †Kvb †`k nB‡Z mvÿ¨ cÖgvb msMÖnKwievi cÖ‡qvRb nB‡j Dc-aviv(1) nB‡Z (3) G ewY©Z Z`‡šÍi mgqmxgv cÖ‡hvR¨ nB‡e bv|
(4) hw` D³ cywjk Kg©KZ©v Dc-aviv (3) G DwjøwLZ AwZwi³ ewa©Z mg‡qi g‡a¨ Z`šÍ m¤úbœ Kwi‡Z bvcv‡ib, Zvnv nB‡j wZwb Awej‡¤ KviY D‡jøLc~e©K mswkøó †Rjvi cywjk mycvwib‡Ub‡W›U‡K A_ev, †ÿÎgZ,†g‡UªvcwjUb GjvKvq mswkøó †WcywU cywjk Kwgkbvi‡K KviY D‡jøLc~e©K NUbv m¤ú‡K© AewnZ Kwi‡eb, GesDwjøwLZ KviY m‡šÍvlRbK bv nB‡j Z`šÍKvix Kg©KZ©v Zvnvi Dci Awc©Z `vwqZ¡ cvj‡b Ae‡njvi Awf‡hv‡MAwfhy³ nB‡eb|
25| KwZcq gvgjvi Z`‡šÍi †ÿ‡Î mgqmxgv e„w×|-- (1) Ôaviv 24Gi Dc-aviv (3) G wba©vwiZ AwZwi³mgqmxgvi g‡a¨ GRvnvi (FIR) G DwjøwLZ Acivaxi cwiPq Aby`NvwUZ _vKvq Ges D³ Acivax‡Kmbv³Ki‡Yi Amg_©Zvi Kvi‡Y ‡Kvb cywjk Kg©KZ©v Z`šÍKvh© m¤úbœ Kwi‡Z e¨_© nB‡j, Ôaviv 24G DwjøwLZAwZwi³ ewa©Z mgqmxgvi cieZx©‡Z †h †Kvb mgq †Kvb cywjk wi‡cvU© A_ev b~Zbfv‡e cywjk wi‡cvU© A_evAwZwi³ cywjk wi‡cvU© cÖ v‡bi †ÿ‡Î Dnv evav ewjqv MY¨ nB‡e bv|
(2) hw` †Kvb cywjk Kg©KZ©v Aciva mswkøó mvÿ¨ ev †Kvb wi‡cvU© mieivn Kwievi Rb¨ Ôaviv 24Gi Dc-aviv (3) Gi Aaxb AwZwi³ ewa©Z mgq mxgvi g‡a¨ †gwW‡Kj, d‡ibwmK, Av½y‡ji Qvc, ivmvqwbK ev Ab¨†Kvb we‡klÁ mvÿxi, hvnvi Dci Zvnvi wbqš¿Y bvB Ges hvnv e¨ZxZ gvgjv m¤ú‡K© †Kvb Kvh©Ki wi‡cvU©ˆZwi Kiv m¤¢e nq bv, Amg_©Zvi Kvi‡Y Z`šÍKvh© m¤úbœ Kwi‡Z e¨_© nb, Zvnv Bn‡j D³ DwjøwLZ AwZwi³ewa©Z mgqmxgvi cieZx© †h †Kvb mgq cywjk wi‡cvU© †ck Kwi‡Z Dnv evav ewjqv MY¨ nB‡e bv|
26| cybtmgc©Y (Remand)|Ñ(1) †h‡ÿ‡Î †Kvb e¨w³‡K †MÖßvi Kiv nq Ges Z`‡šÍi Rb¨ AvUK ivLvnq, †mB‡ÿ‡Î Z`šÍ Kg©KZ©v Awfhy³ e¨w³‡K cywj‡ki †ndvR‡Z cybtmgc©‡Yi Rb¨ Dchy³ g¨vwR‡÷ª‡Ui wbKUAv‡e`b Kwi‡Z cvwi‡eb|
(2) Dc-aviv (1) Gi Aaxb Av‡e`b we‡ePbvµ‡g g¨vwR‡÷ªU Awfhy³‡K cywj‡ki ‡ndvR‡Z cybtmgc©YKwi‡Z cvwi‡eb, Ges GBiƒc cybtmgc©‡Yi †gqv` GKvw`µ‡g ev me©‡gvU `k w`‡bi AwaK nB‡e bv t
Z‡e kZ© _v‡K †h, hw` Z`šÍKvix Kg©KZ©v g¨vwR‡÷‡Ui wbKU Bnv m‡šÍvlRbKfv‡e cÖgvY Kwi‡Z mg_© nb†h, Awfhy³ e¨w³‡K AwaKZi †gqv‡`i Rb¨ cybtmgc©Y Kiv nB‡j AwZwi³ mvÿ¨ cvIqv hvB‡Z cv‡i, ZvnvnB‡j g¨vwR‡÷ªU AbwaK cuvP w`b ch©šÍ cybtmgc©‡Yi †gqv` e„w× Kwi‡Z cvwi‡eb|
lô Aa¨vq
`vqiv RR KZ©„K wePvi27| `vqiv RR ev AwZwi³ `vqiv RR KZ©„K Aciv‡ai wePvi m¤úwK©Z weavb|-- (1) †dŠR`vix Kvh©wewa
A_ev AvcvZZt ejer Ab¨ †Kvb AvB‡b hvnv wKQzB _vKzK bv †Kb, GZ y‡Ï‡k¨ we‡kl UªvBey¨bvj MwVZ bvnIqv ch©šÍ GB AvB‡bi Aaxb Acivamg~n `vqiv RR KZ©„K ev, `vqiv RR KZ©„K AwZwi³ `vqiv R‡Ri wbKU’vbvšÍwiZ nBevi †ÿ‡Î, AwZwi³ `vqiv RR KZ©„K, wePvh© nB‡e|
(2) `vqiv RR ev AwZwi³ `vqiv RR GB AvB‡bi Aaxb Aciva wePv‡ii mgq `vqiv Av`vj‡Z wePv‡ii†ÿ‡Î cÖ‡hvR¨ †dŠR`vix Kvh©wewai Aa¨vq 23 G ewY©Z c×wZ AbymiY Kwi‡eb|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(3) GB Aa¨v‡qi D‡Ïk¨ c~iYK‡í, GB AvB‡bi Aaxb Acivamg~n `vqiv Av`vjZ KZ©„K wePvh© ewjqv MY¨nB‡e, Ges †h `vqiv wWwfk‡bi Awa‡ÿ‡Î D³ Aciva ev Dnvi Askwe‡kl msNwUZ nBqv‡Q, D³ Awa‡ÿ‡Îi`vqiv R‡Ri wbKU Aciv‡ai Kvh©aviv iæRy Kiv hvB‡e|
mßg Aa¨vqwe‡kl UªvBey¨bvj KZ©„K wePvi
28| mš¿vm we‡ivax we‡kl UªvBey¨bvj MVb|-- (1) miKvi, miKvwi †M‡R‡U cÖÁvcb Øviv, GB AvB‡biAaxb msNwUZ Aciv‡ai ªæZ I Kvh©Ki wePv‡ii D‡Ï‡k¨, GK ev GKvwaK mš¿vm we‡ivax we‡kl UªvBey¨bvj MVbKwi‡Z cvwi‡e|
(2) Dc-aviv (1) Gi Aaxb MwVZ we‡kl UªvBey¨bvj, mycÖxg †Kv‡U©i mwnZ civgk©µ‡g miKvi KZ©„K wbhy³GKRb `vqiv RR A_ev GKRb AwZwi³ `vqiv R‡Ri mgš‡q MwVZ nB‡e; Ges Abyiƒcfv‡e wbhy³ GKRbwePviK ÔÔwePviK, mš¿vm we‡ivax we‡kl UªvBey¨bvjÓ bv‡g AwfwnZ nB‡eb|
(3) GB avivi Aaxb MwVZ †Kvb we‡kl UªvBey¨bvj‡K mgMÖ evsjv‡`‡ki ’vbxq Awa‡ÿÎ A_ev GK evGKvwaK `vqiv wWwfk‡bi Awa‡ÿÎ cÖ vb Kiv hvB‡Z cv‡i; Ges D³ UªvBey¨bvj †Kej GB AvB‡bi AaxbAciv‡ai gvgjvi wePvi Kwi‡e, hvnv D³ UªvBey¨bv‡j `v‡qi ev ’vbvšÍwiZ nB‡e|
(4) miKvi KZ©„K †Kvb we‡kl UªvBey¨bvj‡K mgMÖ evsjv‡`‡ki A_ev GK ev GKvwaK `vqiv wWwfk‡bimgš‡q MwVZ Dnvi Ask we‡k‡li, ’vbxq Awa‡ÿÎ b¨ Í Kwievi Kvi‡Y GKRb `vqiv RR ev AwZwi³ `vqivRR KZ©„K GB AvB‡bi Aaxb Aciv‡ai wePv‡ii GLwZqvi ¶zYœ nB‡e bv, Ges miKvi KZ©„K, miKvwi †M‡R‡UcÖÁvcb Øviv, Abyiƒc †Kvb Av‡`k cÖ vb bv Kiv nB‡j `vqiv Av`vj‡Z wb®úbœvaxb GB AvB‡bi AaxbAciv‡ai †Kvb gvgjv we‡kl ’vbxq Awa‡ÿÎ m¤úbœ we‡kl UªvBey¨bv‡j e`jx nB‡e bv|
(5) †Kvb we‡kl UªvBey¨bvj, wfbœiƒc wm×všÍ MÖnY bv Kwi‡j, †h mvÿxi mvÿ¨ MÖnY Kiv nBqv‡Q D³ mvÿximvÿ¨ cybtMÖnY, ev cybtïbvbx MÖnY Kwi‡Z, A_ev Dc-aviv (4) Gi Aaxb M„nxZ Kvh©aviv cybivq Avi¤¢ Kwi‡Zevav _vwK‡e bv, Z‡e B‡Zvg‡a¨ †h mvÿ¨ MÖnY ev Dc ’vcb Kiv nBqv‡Q D³ mv‡ÿ¨i wfwˇZ Kvh© Kwi‡Z Gesgvgjv †h ch©v‡q wQj †mB ch©vq nB‡Z wePviKvh© Ae¨vnZ ivwL‡Z cvwi‡e|
(6) miKvi, Av‡`k Øviv, †h ’vb ev mgq wba©viY Kwi‡e †mB ’vb ev mg‡q we‡kl UªvBey¨bvj Avmb MÖnYKwi‡Z cvwi‡e Ges Dnvi Kvh©µg cwiPvjbv Kwi‡Z cvwi‡e|
29| we‡kl UªvBey¨bv‡ji c×wZ|--(1) mve-B݇c±i c`gh©v`vi wb‡gœ b‡nb Giƒc †Kvb cywjk Kg©KZ©viwjwLZ wi‡cvU© e¨ZxZ we‡kl UªvBey¨bvj †Kvb Aciva wePviv_© MÖnY Kwi‡e bv|
(2) we‡kl UªvBey¨bvj GB AvB‡bi Aaxb Aciv‡ai wePviKv‡j `vqiv Av`vj‡Z wePv‡ii Rb¨, †dŠR`vixKvh©wewai Aa¨vq 23 G ewY©Z c×wZ, GB AvB‡bi we‡kl weavbvejxi mwnZ AmsMwZc~Y© bv nIqv mv‡c‡ÿ,AbymiY Kwi‡e|
(3) †Kvb we‡kl UªvBey¨bvj, b¨vq wePv‡ii ¯v‡_© cÖ‡qvRbxq bv n‡j, Ges KviY wjwLZfv‡e wjwce× bvKwiqv, †Kvb gvgjvi wePviKvh© ’wMZ Kwi‡Z cvwi‡eb bv|
(4) †h‡ÿ‡Î we‡kl UªvBey¨bv‡ji wek¦vm Kwievi KviY _v‡K †h, Awfhy³ e¨w³ cjvZK iwnqv‡Qb evAvZ¥‡Mvcb Kwiqv‡Qb †h Kvi‡Y Zvnv‡K †MÖßvi Kwiqv wePv‡ii Rb¨ Dcw ’Z Kiv m¤¢e b‡n Ges Zvnv‡KAwej‡¤ †MÖßv‡ii AeKvk bvB, †m‡ÿ‡Î D³ UªvBey¨bvj, Av‡`k Øviv, eûj cÖPvwiZ Aby¨b yBwU evsjv ‰`wbKmsev`c‡Î, Abyiƒc e¨w³‡K Av‡`‡k DwjøwLZ mg‡qi g‡a¨ nvwRi nBevi wb‡ ©k cÖ vb Kwi‡Z cvwi‡e, Ges D³e¨w³ Abyiƒc wb‡ ©k cvjb Kwi‡Z e¨_© nB‡j Zvnvi Abycw ’wZ‡ZB wePvi Kiv nB‡e|
(5) we‡kl UªvBey¨bv‡ji mvg‡b Awfhy³ e¨w³ Dcw ’Z nBevi ev Rvwg‡b gyw³ cvBevi ci cjvZK nB‡jA_ev Dnvi m¤§y‡L Dcw ’Z nB‡Z e¨_© nB‡j, Dc-aviv (4) G DwjøwLZ c×wZ cÖ‡hvR¨ nB‡e bv, Ges D³UªvBey¨bvj Dnvi wm×všÍ wjwce× Kwiqv Abyiƒc e¨w³i Abycw ’wZ‡ZB wePvi Kwi‡e|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
(6) †Kvb we‡kl UªvBey¨bvj, Dnvi wbKU †ckK…Z Av‡e`‡bi wfwˇZ, ev Dnvi wbR D‡`¨v‡M, †Kvb cywjkKg©KZ©v‡K GB AvB‡bi Aaxb msNwUZ Aciva mswkøó †h †Kvb gvgjv AwaKZi Z`šÍ Ges Z`KZ©„K wba©vwiZmg‡qi g‡a¨ wi‡cvU© cÖ v‡bi wb‡ ©k cÖ vb Kwi‡Z cvwi‡e|
30| we‡kl UªvBey¨bv‡ji Kvh©µ‡g Kvh©wewai cÖ‡qvM|-- (1) †dŠR`vix Kvh©wewai weavbvejx, hZ ~i m¤¢e,GB AvB‡bi weavbvejxi mwnZ AmswMZc~Y© bv nIqv mv‡c‡ÿ, we‡kl UªvBey¨bv‡ji Kvh©µ‡g cÖ‡hvR¨ nB‡e, GesAvw` GLwZqvi cÖ‡qvMKvix `vqiv Av`vj‡Zi mKj ÿgZv D³ we‡kl UªvBey¨bv‡ji _vwK‡e|
(2) we‡kl UªvBey¨bv‡j miKvi c‡ÿ gvgjv cwiPvjbvKvix e¨w³ cvewjK cÖwmwKDUi ewjqv MY¨ nB‡eb|
31| Avcxj Ges g„Zy¨`Û Aby‡gv`b|-- (1) we‡kl UªvBey¨bvj KZ©„K cÖ Ë †Kvb Av‡`k, ivq A_ev `ÛcÖ v‡bi ZvwiL nB‡Z wÎk w`‡bi g‡a¨ Dnvi weiæ‡× nvB‡KvU© wefv‡M Avcxj `v‡qi Kiv hvB‡e|
(2) GB AvB‡bi Aaxb ‡Kvb we‡kl UªvBey¨bvj g„Zz¨`Û cÖ vb Kwi‡j, Awej‡¤ Kvh©avivwU nvB‡KvU© wefv‡MAby‡gv`‡bi Rb¨ †cÖiY Kwi‡Z nB‡e Ges D³ wefvM KZ©„K Aby‡gvw`Z bv nIqv ch©šÍ g„Zz¨`Û Kvh©Ki KivhvB‡e bv|
32| Rvwgb msµvšÍ weavb|-- GB AvB‡bi Aaxb kvw ͇hvM¨ †Kvb Aciv‡a Awfhy³ e¨w³‡K g¨vwR‡÷ªU evwePviK Rvwg‡b gyw³ cÖ vb Kwi‡eb bv, hw` bv --
(K) ivóªcÿ‡K Abyiƒc Rvwg‡bi Av‡`‡ki Dci ïbvbxi my‡hvM cÖ vb Kiv nq; Ges
(L) g¨vwR‡÷ªU ev wePviK mš‘ó nb †h Awfhy³ e¨w³ wePv‡i †`vlx mve¨ Í bvI nB‡Z cv‡ib g‡g©wek¦vm Kwievi hyw³m½Z KviY iwnqv‡Q Ges wZwb Abyiƒc mš‘wói KviYmg~n wjwLZfv‡ewjwce× K‡ib|
33| we‡kl UªvBey¨bvj KZ©„K gvgjv wb®úwËi wba©vwiZ mgqmxgv|-- (1) we‡kl UªvBey¨bv‡ji wePviKgvgjvi Awf‡hvM MVb (Charge Frame)Gi ZvwiL nB‡Z Qq gv‡mi g‡a¨ gvgjvi wePvi Kvh© mgvßKwi‡eb|
(2) wePviK Dc-aviv (1) Gi Aaxb wba©vwiZ mg‡qi g‡a¨ †Kvb gvgjv mgvß Kwi‡Z e¨_© nB‡j, wZwbDnvi KviY wjwLZfv‡e wjwce× Kwiqv AbwaK wZb gvm mgqmxgv e„w× Kwi‡Z cvwi‡eb|
(3) wePviK Dc-aviv (2) G wba©vwiZ ewa©Z mg‡qi g‡a¨ wePvi Kvh© mgvß Kwi‡Z e¨_© nB‡j, wZwb,Abyiƒc e¨_©Zvi KviY wjwLZfv‡e D‡jøL Kwiqv nvB‡KvU© wefvM Ges miKvi‡K AewnZ Kwiqv, cybivq AbwaKwZb gvm mgqmxgv e„w× Kwi‡Z cvwi‡eb|
Aóg Aa¨vqmš¿vmx Kg©KvÛ nB‡Z D™¢~Z m¤ú`
34| mš¿vmx Kg©KvÛ-jä m¤ú‡`i `Lj|-- (1) †Kvb mš¿vmx ev Ab¨ †Kvb e¨vw³, †Mvwô, mËv, cÖwZôvb ev ms ’vmš¿vmx Kg©KvÐ nB‡Z D™¢zZ, ev †Kvb mš¿vmx ev mš¿vmx †Mvôx KZ©„K cÖ Ë †Kvb A_© ev m¤ú` †fvM Kwi‡Z ev`L‡j ivwL‡Z cvwi‡e bv|(2) GB AvB‡bi Aaxb `ÐcÖvß nDK ev bv nDK, GBiƒc †Kvb mš¿vmx ev Ab¨ †Kvb e¨w³ ev †Mvwô ev ms ’v evcÖwZôv‡bi `L‡j _vKv mš¿vmx Kg©KvÐ-jä m¤ú` miKv‡ii AbyK~‡j ev‡Rqv߇hvM¨ nB‡e|
e¨vL¨v|-- mš¿vmx Kg©KvÐ-jä m¤ú` A_© GB AvB‡bi Aaxb Aciva msNU‡bi gva¨‡g AwR©Z ev jä †Kvb A_©,m¤úwË ev m¤ú`|
(3) GB AvB‡bi AvIZvq †Kvb Aciv‡ai mv‡_ mswkøó †Kvb e¨w³ ev mËvi †Kvb m¤úwË, †Kvb we‡`kx ivóª evms ’vi Aby‡iv‡ai †cÖwÿ‡Z miKvi KZ©„K Rã‡hvM¨ nB‡e Ges mswkøó †`‡ki mv‡_ cvi¯úwiK AvBbMZmn‡hvwMZvi AvIZvq ev †ÿÎgZ, miKvi KZ©„K wb®úwˇhvM¨ nB‡e|
(4) miKvi KZ©„K M„nxZ †Kvb AvšÍR©vwZK , AvÂwjK ev wØ-cvwÿK Pzw³, RvwZms‡Ni Kb‡fbkb ev RvwZms‡NiwbivcËv cwil` KZ©„K M„wnZ mswkøó †iRy‡jk‡bi AvIZvq †Kvb e¨w³ ev mËvi m¤ú` Rã‡hvM¨ nB‡e|
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
35| mš¿vmx Kg©KvÛ-jä m¤ú` ev‡Rqvß|-- (1) †h‡ÿ‡Î wePviK GB g‡g© mš‘ó nb †h, †Kvb mš¿vmx Kvh©nB‡Z D™¢zZ nBevi Kvi‡Y †Kvb m¤úwË Rã ev †µvK Kiv nBqv‡Q, †mB‡ÿ‡Î wZwb D³ m¤úwË ev‡RqvßKwievi Av‡`k cÖ vb Kwi‡Z cvwi‡eb|
(2) Dc-aviv (1) Gi Aax‡b †Kvb mš¿vmx Kvh© nB‡Z D™¢zZ †Kvb m¤úwË ev‡Rqvß Kiv nB‡j, †h mËvi wbKUnB‡Z D³ m¤úwË ev‡Rqvß nB‡e, †mB mËvi weiæ‡× GB AvB‡bi aviv 18 I 20 G ewY©Z AvBbvbyM e¨e ’vmiKvi KZ…©K MÖnY Kiv hvB‡e|
(3) GBAvB‡bi aviv 34 Gi Dc-aviv(4) Abyhvqx RãK…Z m¤ú` mswkøó Pzw³, Kb‡fbkb ev RvwZms‡NiwbivcËv cwil` KZ©„K M„wnZ mswkøó †iRy‡jk‡bi Av‡jv‡K mswkøó Av`vjZ KZ…©K ev‡Rqv߇hvM¨ I wb®úwˇhvM¨nB‡e|
(4) ev‡RqvßK…Z m¤ú‡` †`vlx e¨w³ ev mËv e¨ZxZ Ab¨ †Kvb e¨w³ ev mËvi ¯Z¡ ¯v_© ev AwaKvi _vwK‡j Dnvmswkøó Av`vjZ KZ©„K †diZ‡hvM¨ nB‡e|Ó|
36| mš¿vmx Kg©KvÛ-jä m¤ú` ev‡RqvßKi‡Yi c~‡e© KviY `k©vBevi †bvwUk Rvix|-- (1) mš¿vmx Kg©KvÛ-jäev‡Rqvß Kwievi Av‡`k cÖ v‡bi c~‡e©, †h e¨w³i wbqš¿Y A_ev `L‡j D³ m¤ú` _v‡K, D³ e¨w³‡K ‡dŠR`vwiKvh©wewai weavb AbymiYc~e©K KviY `vk©v‡bvi †bvwUk Rvix Kwi‡Z nB‡e Ges ‡bvwU‡k cÖ Ë mgqmxgvi g‡a¨wjwLZ Reve cÖ v‡bi my‡hvM Ges ïbvbxi hyw³m½Z mgq cÖ vb e¨wZ‡i‡K †Kvb mš¿vmx Kg©KvÛ-jä m¤ú`ev‡Rqvß Kwievi Av‡`k cÖ vb Kiv hvB‡e bv|
(2) Dc-aviv (1) Gi Aaxb ‡Kvb ev‡Rqv‡ßi Av‡`k cÖ vb Kiv hvB‡ebv, hw` D³ e¨w³ cÖgvb Kwi‡Zmÿg nb †h, D³ m¤ú` mš¿vmx Kg©Kv‡Û-jä m¤ú` wQj Zvnv wZwb AeMZ wQ‡jb bv Ges Dchy³ g~†j¨iwewbg‡q wZwb Zvnv Lwi` Kwiqv‡Qb|
37| Avcxj|-- (1) aviv 35 Gi Aaxb cÖ Ë ev‡RqvßKiY Av‡`k Øviv ms¶zä †Kvb e¨w³ D³ Av‡`kcÖvwßi ZvwiL nB‡Z GK gv‡mi g‡a¨ nvB‡KvU© wefv‡M Avcxj Kwi‡Z cvwi‡eb|
(2) nvB‡KvU© wefvM KZ©„K aviv 35 Gi Aaxb cÖ Ë †Kvb Av‡`k ms‡kvwaZ ev evwZj Kiv nB‡j A_ev GBAvB‡bi †Kvb weavb jsNbc~e©K †Kvb gvgjv `v‡qi Kiv nB‡j, †h e¨w³i weiæ‡× aviv 35 Gi Aaxbev‡Rqvwßi Av‡`k cÖ vb Kiv nBqv‡Q, D³ e¨w³ LvjvmcÖvß nB‡j D³ ev‡RqvßK…Z m¤úwË †diZ cÖ vb KivnB‡e Ges hw` D³ ew³i wbKU ev‡RqvßK…Z m¤úwË †di cÖ vb m¤¢e bv nq, Zvnv nB‡j D³ e¨w³‡K D³m¤úwË miKv‡ii wbKU weµq nBqv‡Qb M‡Y¨, m¤úwË R‡ãi w`b nB‡Z hyw³m½Z my` MYbvc~e©K Geshyw³m½Zfv‡e g~j¨ wba©viYc~e©K Dnvi g~j¨ cwi‡kva Kwi‡Z nB‡e|
beg Aa¨vq
cvi¯úwiK AvBbMZ mnvqZv38| cvi¯úwiK AvBbMZ mnvqZv|-- (1) hLb †Kvb mš¿vmxKvh© GBiƒ‡c msNwUZ nq ev Dnvi msNU‡b
GBiƒ‡c mnvqZv, †Póv, lohš¿ ev A_©vqb Kiv nq hvnv‡Z †Kvb we‡`kx iv‡óªi f‚LÛ mswkøó _v‡K, A_ev †Kvbmš¿vmxKvh© ev Dnvi msNU‡b mnvqZv, †Póv, lohš¿ ev A_©vqb †Kvb we‡`kx mve©‡fŠg iv‡óªi f‚LÛ nB‡Zevsjv‡`‡ki Af¨šÍ‡i A_ev evsjv‡`‡ki Af¨šÍi nB‡Z Ab¨ †Kvb mve©‡fŠg iv‡óªi f‚L‡Û msNwUZ nBqv _v‡K,Zvnv nB‡j D³ we‡`kx ivóª Aby‡iva Kwi‡j evsjv‡`k miKvi, mš‘ó nB‡j, GB avivi cieZ©x weavbvejxmv‡c‡ÿ, ‡dŠR`vix Z`šÍ, wePviKvh© ev ewntmgc©b m¤úwK©Z Pzw³ †gvZv‡eK mKj cÖ‡qvRbxq wel‡q D³we‡`kx ivóª‡K AvBbMZ mnvqZv cÖ vb Kwi‡e|
(2) Aby‡ivaKvix ivóª Ges Aby‡ivacÖvß iv‡óªi g‡a¨ cvi¯úwiK gZ wewbg‡qi gva¨‡g m¤úvw`Z AvbyôvwbKPzw³ wKsev cÎ wewbg‡qi wfwˇZ AvBbMZ mn‡hvwMZvi kZ©vw` wba©viY Kiv nB‡e|
(3) AvšÍtivwóªK cvi¯úwiK m¤§wZ e¨vwZ‡i‡K †Kvb Aciv‡ai Awf‡hv‡M wePv‡ii Rb¨ evsjv‡`‡ki †KvbbvMwiK‡K GB avivi Aax‡b †Kvb we‡`kx iv‡óªi wbKU mgc©b Kiv hvB‡e bv;
Annexure-3mš¿vm we‡ivax AvBb, 2009 (2012 mv‡ji ms‡kvabxmn)
Z‡e evsjv‡`‡ki ‡Kvb Av`vj‡Z GKB Aciv‡ai Awf‡hv‡M wePvi Pjgvb _vwK‡j evsjv‡`‡ki †KvbbvMwi‡Ki ewntmgc©Y Kvh©Ki Kiv nB‡e bv|
(4) GB avivi Aaxb cvi¯úwiK AvBbMZ mnvqZvi D‡Ï‡k¨ evsjv‡`‡ki †Kvb bvMwiK‡K, Zvnvi m¤§wZmv‡c‡ÿ, mswkøó †dŠR`vix gvgjv ev Z`šÍ Kv‡h© mvÿx wn‡m‡e mnvqZv cÖ vb Kwievi Rb¨ †Kvb we‡`‡kx iv‡óªiwbKU mgc©b Kiv hvB‡e|
(5) hw` miKv‡ii wbKU wek¦vm Kwievi gZ h‡_ó KviY _v‡K †h, †Kvb e¨w³‡K †Kvb gvgjvq ïaygvÎZvnvi †MvÎ, ag©, RvZxqZv ev ivR‰bwZK gZv`‡k©i Kvi‡Y wePvi Kwievi ev kvw Í cÖ v‡bi j‡ÿ¨ GB aviviAaxb AvBbMZ mnvqZvi Rb¨ Aby‡iva Kiv nBqv‡Q, Zvnv nB‡j Aby‡ivacÖvß ivóª wn‡m‡e evsjv‡`k Abyiƒc†Kvb wbw`©ó gvgjvi †ÿ‡Î ewnt mgc©b ev cvi¯úwiK AvBbMZ mnvqZvi Aby‡iva cÖZ¨vLvb Kwi‡Z cvwi‡e|
`kg Aa¨vqmvaviY weavbejx
39| Aciv‡ai Avgj‡hvM¨Zv I Rvwgb A‡hvM¨Zv| -- (1) GB AvB‡bi Aaxb mKj Aciva Avgj‡hvM¨(cognizable) nB‡e|
(2) GB AvB‡bi Aaxb mKj Aciva Rvwgb A‡hvM¨ (Non-bailable) nB‡e|
40| Z`šÍ I wePvi wel‡q c~e©vby‡gv`‡bi Acwinvh©Zv|-- (1) †Rjv g¨vRw‡÷ª‡Ui c~e©vby‡gv`b e¨wZ‡i‡K†Kvb cywjk Kg©KZ©v GB AvB‡bi Aaxb †Kvb Aciv‡ai Z`šÍ Kwi‡Z cvwi‡eb bv|
(2) miKv‡ii c~e©vby‡gv`b (sanction) e¨wZ‡i‡K †Kvb Av`vjZ GB AvB‡bi Aaxb †Kvb Aciva wePviv_©Avg‡j MÖnY (cognizance) Kwi‡e bv|
41| we‡kl UªvBey¨bvj Ges we‡kl UªvBey¨bvj nB‡Z gvgjv ’vbvšÍi|-- miKvi, mvÿ¨ mgvwßi c~‡e© wePv‡ii†h †Kvb ch©v‡q, hyw³m½Z Kvi‡Y, GB AvB‡bi Aaxb †Kvb Aciva msµvšÍ gvgjv ev gvgjvmg~n †Kvb `vqivAv`vjZ nB‡Z †Kvb we‡kl UªvBey¨bv‡j ev †Kvb we‡kl UªvBey¨bvj nB‡Z †Kvb `vqiv Av`vj‡Z ’vbvšÍi Kwi‡Zcvwi‡e|
42| Zdwmj ms‡kva‡bi ÿgZv|-- miKvi , miKvix †M‡R‡U cÖÁvwcZ Av‡`k Øviv, GB AvB‡bi Zdwmjms‡kvab Kwi‡Z cvwi‡e|
43| wewa cÖYq‡bi ÿgZv|-- miKvi, miKvix †M‡R‡U cÖÁvcb Øviv, GB AvB‡bi D‡Ï‡k¨ c~iYK‡í, wewacÖYqb Kwi‡Z cvwi‡e|
44| g~j cvV Ges Bs‡iRx cvV|-- GB AvB‡bi g~j cvV evsjv‡Z nB‡e Ges Bs‡iRx‡Z Ab~w`Z DnviGKwU wbf©i‡hvM¨ cvV _vwK‡e t
Z‡e kZ© _v‡K †h, evsjv I Bs‡iRx cv‡Vi g‡a¨ we‡iv‡ai †ÿ‡Î evsjv cvV cÖvavb¨ cvB‡e|
45| iwnZKiY I †ndvRZ|Ñ (1) mš¿vm we‡ivax Aa¨v‡`k, 2008 (2008 m‡bi 28 bs Aa¨v‡`k)GZØviv iwnZ Kiv nBj|
(2) D³iƒc iwnZKiY m‡Ë¡I, iwnZ Aa¨v‡`‡ki Aaxb K…Z KvRKg© ev M„nxZ e¨e ’v GB AvB‡bi AaxbK…Z ev M„nxZ nBqv‡Q ewjqv MY¨ nB‡e|
Zdwmj (aviv-18 `ªóe¨)
1 2 3 4 5µwgK bs msMV‡bi bvg msMV‡bi wVKvbv wbwl×Ki‡Yi ZvwiL gšÍe¨
AvkdvK nvwg`mwPe|