SlideShare a Scribd company logo
1 of 26
Cyber Laws in Pakistan
Presented By:
Arfan Afzal
Saad Khatri
Azra Sayani
Muhammad Sajeel Hameed
Information To Share
1. Cyber Crime
o Emergence of Cyber Crime
o Dispute in the Cyber World
o Types of Cyber Crime
o Targets of Cyber Crime
2. Cyber Law
3. International Aspect of Cyber Law
4. Role of Pakistan in Cyber World
5. Conventions
o Electronic Transaction Ordinance - 2002
o Electronic Crime Bill - 2007
o Electronic Crime Act - 2015
Cyber Crime
 Activity in which computers or networks are a tool, a target, or a place of criminal
activity.
 Cyber crime also stated as any use of a computer as an instrument to further
illegal ends, such as
 Committing fraud
 Stealing identities
 Violating privacy
 It is also include traditional crimes in which computers or networks are used to
enable the illicit activity.
 As the computer has become central to commerce, entertainment, and
government.
 Cyber crime has grown in importance.
Cyber Crime
Emergence of Cyber Crime
 The first recorded cyber crime took place in the year 1820! That is not surprising
considering the fact that the abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.C. in India, Japan and China. The era of
modern computers, however, began with the analytical engine of Charles
Babbage.
 In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the
loom. This device allowed the repetition of a series of steps in the weaving of
special fabrics. This resulted in a fear amongst Jacquard's employees that their
traditional employment and livelihood were being threatened. They committed acts
of sabotage to discourage Jacquard from further use of the new technology. This is
the first recorded cyber crime.
Cyber Crime
Disputes in the Cyber World
 Disputes relating to on-line transactions and culture are extensively different in
their nature, scope and treatment.
 Pervasive societal dependence on networks. A new network paradigm is emerging.
 For example, commercial organizations are integrating operations with
business units, suppliers, and customers through large-scale networks that
enhance communication and services. This new paradigm represents a shift
from bounded networks with central control to unbounded networks.
 Extremely important feature of today's unbounded networks is the emergence of
tremendous disputes, differences, fights and dispute.
Cyber Crime
Types of Cyber Crimes
Types Example
Financial crimes Cheating, credit card frauds, money laundering etc.
Cyber pornography Pornographic websites etc
Sale of illegal articles Sale of narcotics, weapons and wildlife etc
Online gambling Online gambling, money laundering etc
Email spoofing Sending e-mails that appear to originate from one source
but actually has been sent from another source.
Forgery Counterfeit currency notes, postage and revenue stamps
and mark sheet etc
Cyber Defamation Publishing/distributing defamatory matter of someone
Cyber stalking Victimizing someone online
Cyber Crime
Targets of Cyber Crime
 Cyber crimes are targeted and have an impact at three levels:
 (i) Individuals (ii) Organizations (iii) Society at large
Individual Property Organization Society at large
Computer vandalism Unauthorized
control/access over
computer system
Pornography (basically
child pornography)
Intellectual Property
crimes
Possession of
unauthorized information
Polluting the youth through
indecent way
Unauthorized
control/access over
computer system
Cyber terrorism against the
government organization
Financial crimes
Transmitting virus Pirated software Dist. Sale of illegal articles
Cyber Law
 Cyber law or Internet law is a term that encapsulates the legal issues related to
use of the Internet. The legal issues related to use of communications technology,
particularly "cyberspace", i.e. the Internet.
 It is an intersection of many legal fields, like:
 Intellectual property OR Contract Law
 Privacy
 Cyber laws is an attempt to apply laws designed for the physical world to human
activity on the Internet .
International Aspect of Cyber Law
Information and communications flow more easily around the world. Borders
are no longer boundaries to this flow. This causes difficulty, as the internet
based society has no physical boundaries and thus much traffic escapes
national supremacy. Criminals are increasingly located in places other than
where their acts produce their effects.
o Over the past thirty years, developed nations transit from the industrial era
to the new information age has enabled them to develop the Nascent
Technology and produce ever greater quality in standards and value.
Between 2000 and 2005, the average internet user growth rate was of 183.4%.
o The highest rate being in the Middle East with 454.2%.
o Africa with 423.9%
o Latin America and the Caribbean collectively with 342.5%14.
Int’l Aspect of Cyber Law Continue …
 It is clear from these statistics that these regions, in which most developing
countries are eager to implement and exploit the advantages of ICTs and the
internet superhighway.
 The European Union, on the other hand, has enabled harmonized implementation
of regulation on electronic commerce through directives in almost all European
countries, with non-member countries aligning themselves with the EU movement.
 The United State has both important knowledge and experience in the legal field of
cyber security, with significant influence in the area.
Int’l Aspect of Cyber Law Continue …
 European Union
 The Council of Europe Convention on Cyber Crime in 2001 was the first
international initiative on computer crime. It has been signed by 37 States and
entered into force in July 2004. This Convention helps to foster international
cooperation by criminalizing the basic cyber crimes.
 United State
 The United State Resolutions on Combating the Criminal Misuse of Information
Technology tried to address the problem of safe havens for those who
criminally misuse information technology by requesting that States put into
place laws to eliminate such havens.
Role of Pakistan in the Cyber World
 The Pakistan market has now grown manifolds with the largest majority of internet
users in Karachi and then Lahore and Islamabad. These three cities jointly
provide over 90% of the customer base and expansion in activity is also likely to
remain primarily confined to these cities because of the concentration of economic
activity in these cities.
 Pakistan also is not free from the cyber space dilemma. The availability of
computers and Internet connections provides unprecedented opportunities to
communicate and learn in Pakistan. However, certain individuals do exploit the
power of the Internet for criminal purposes as well.
Pakistan Cyber Law Conventions
 While the government of Pakistan focuses on fighting terrorism and extremism
under the National Action Plan (NAP), another threat seems to be looming on the
horizon, i.e. cyber warfare.
 Cyber-crime rises rapidly in Pakistan. There are about 30 million internet users
with 15 million mobile subscribers in Pakistan.
 According to Cyber Crime Unit (CCU), a branch of Federal Investigation
Agency, only 62 cases were reported to the unit in 2007, 287 cases in 2008,
ratio dropped in 2009 but in 2010, more than 312 cases were registered.
PAK Cyber Law Con. Continue …
 There are different law are promulgated in Pakistan. These laws not only deal with
crime of Internet, which deal with all dimensions related to computer & networks.
 Three of them are most important as below:
o Electronic Transaction Ordinance - 2002
o Electronic Crime Bill - 2007
o Electronic Crime Act - 2015
Electronic Transaction Ordinance-2002
 The Electronic Transaction Ordinance 2002 was passed by Pakistan Government
with the objective to recognize and facilitate documents, records, information,
communications and transactions in electronic form, and to provide for the
accreditation of certification service providers.
 The Electronic Transaction Ordinance is an essential prerequisite for e-
commerce growth and termed as "a landmark decision for the IT
development of the country.
ETO – 2002 Continue …
The Ordinance aimed to achieve:
 Great economic impact.
 E-commerce and projecting Pakistan’s products such as textile, leather goods,
sports goods and surgical items to the world.
 Increased e-transactions.
 Major benefits for the small and medium business enterprises as the cost of
transactions are greatly reduced electronically.
 Legal and safe trading to take place as the necessary laws to protect the
interests of both the buyers and the sellers in the process of electronic sales
and purchases.
ETO – 2002 Continue …
 Important Sections of ETO – 2002
1. 36. Violation of privacy information
 For acquiring the information.
 Gain Knowledge.
2. 37. Damage to information system, etc.
 alter, modify, delete, remove, generate, transmit or store information.
3. 38. Offences to be non bail-able, compoundable and cognizable
 All offences under this Ordinance shall be non bail-able, compoundable and
cognizable.
4. 39. Prosecution and trial of offences.
 No Court inferior to the Court of Sessions shall try any offence under this
Ordinance.
Cyber Crime Bill - 2007
 Electronic Crimes Ordinance – 2007. It is in forced.
 The Federal Cabinet approved the adoption of The Prevention of Electronic
Crimes Bill 2007 on 17 January 2007.
 The bill deals with the electronic crimes included:
o Cyber terrorism
o Data damage
o Electronic fraud
o Electronic forgery
o Unauthorized access to code
o Cyber stalking
o Cyber Spamming
Cyber Crime Bill – 2007 Continue …
Characteristics of Bill - 2007
 It offers penalties ranging from six months imprisonment to capital punishment for
17 types of cyber crimes
 It will apply to every person who commits an offence, irrespective of his nationality
or citizenship.
 It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate
and charge cases against such crimes.
Cyber Crime Bill – 2007 Continue …
 OFFENCES AND PUNISHMENTS
 Under this law there are defined punishment for the offence.
 Every respective offence under this law has its distinctive
punishment which can be imprisonment or fine.
O/P Next Slide
Offence Imprisonment (years) Fine
Criminal Access 3 3 Lac
Criminal Data Access 3 3 Lac
Data Damage 3 3 Lac
System Damage 3 3 Lac
Electronic Fraud 7 7 Lac
Electronic Forgery 7 7 Lac
Misuse of Device 3 3 Lac
Unauthorized access to code 3 3 Lac
Malicious code 5 5 Lac
Defamation 5 5 Lac
Cyber stalking 3 3 Lac
Cyber Spamming 6 months 50,000
Spoofing 3 3 Lac
Pornography 10 -----
Cyber terrorism Life 10 Million
Cyber Crime Act - 2015
 On September 17, 2015, the National Assembly’s Standing Committee on
Information Technology and Telecommunications approved the government’s
proposed “Prevention of Electronic Crimes Bill 2015”, for a second time. An
earlier version was approved in April 16, 2015. Both versions were approved
despite reservations expressed by members of opposition part of the National
Assembly (NA) Standing Committee on IT.
 The proposed bill does not distinguish between innocent people and criminals.
In turn, it prescribes heavy penalties in the form of jail terms and fines.
Cyber Crime Act – 2015 Continue …
 There are 5 main points from summary of this new bill:
1. It will be a crime to send text messages or photos to anyone’s email address
or phone without the recipient’s consent.
2. The police or FIA or any other agency won’t need a warrant to search, seize or
make arrests.
3. Under sections 17 and 18 of the new bill, the political criticism and political
expression in the form of analysis, commentary, blogs, cartoons, caricatures
and memes has been criminalized. Authorities will decide what is moral and
what is immoral.
4. Under section 31, government can block or remove access to any website or
online source if it deems it inappropriate.
5. Under section 26, the ISPs, restaurants, malls, hotels, offices, airports bus
stations and anywhere with Internet facility will be required to hold data record
for 3 months.
Cyber Crime Act – 2015 Continue …
 OFFENCES AND PUNISHMENTS
Unauthorized access to information system or data:
 Unauthorized access to any information system or data then imprisonment for
a six months or with fine which may extend to one hundred thousand
rupees or with both.
Unauthorized copying or transmission of data:
 Imprisonment for a six months or with fine which may extend to one hundred
thousand rupees or with both.
Cyber terrorism
 Imprisonment fourteen year (14) and fine 5 million or both.
Electronic fraud
 Imprisonment two (02) year and fine 10 million or both.
Cyber Crime Act – 2015 Continue …
Identity crime
 Whoever obtains, sells, possesses or transmits another person’s identity
information, without lawful justification shall be punished with imprisonment for
a term which may extend to three months or with fine which may extend to
fifty thousand rupees, or with both.
Unauthorized issuance of SIM cards
 SIM to be used in cellular mobile or wireless phone for transmitting without
verification in the mode and manner approved by the Authority shall be
punished with imprisonment for a term which may extend to three years or
with fine which may extend to five hundred thousand rupees or both.
Cyber laws in pakistan

More Related Content

What's hot (20)

Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Controversial morning show of geo tv and blasphemy
Controversial morning show of geo tv and blasphemyControversial morning show of geo tv and blasphemy
Controversial morning show of geo tv and blasphemyAysha Bhutta
 
Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...
Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...
Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...Background Check Group
 
Cyber marketing seminar by muhammad talha
Cyber marketing seminar by muhammad talhaCyber marketing seminar by muhammad talha
Cyber marketing seminar by muhammad talhaMuhammad Talha
 
Presentation on samsung
Presentation on samsungPresentation on samsung
Presentation on samsungMd Chand Alam
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And SecurityShaheda Afreen
 
Samsung STPD & 4 P's
Samsung STPD & 4 P'sSamsung STPD & 4 P's
Samsung STPD & 4 P'sHari Thirumal
 
Presentation on International Marketing (samsung company)
Presentation on International Marketing (samsung company)Presentation on International Marketing (samsung company)
Presentation on International Marketing (samsung company)Md. Sourav Hossain
 
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre SarcanThe 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre SarcanEmre Sarcan
 
Samsung Galaxy Presentation
Samsung Galaxy PresentationSamsung Galaxy Presentation
Samsung Galaxy PresentationJessica Walsh
 

Viewers also liked (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Controversial morning show of geo tv and blasphemy
Controversial morning show of geo tv and blasphemyControversial morning show of geo tv and blasphemy
Controversial morning show of geo tv and blasphemy
 
Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...
Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...
Updated 27 Jan - FIA Complaint for Cyber Crime and Evidence Dossier against S...
 
Cyber marketing seminar by muhammad talha
Cyber marketing seminar by muhammad talhaCyber marketing seminar by muhammad talha
Cyber marketing seminar by muhammad talha
 
Presentation samsung
Presentation samsungPresentation samsung
Presentation samsung
 
Presentation on samsung
Presentation on samsungPresentation on samsung
Presentation on samsung
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Samsung STPD & 4 P's
Samsung STPD & 4 P'sSamsung STPD & 4 P's
Samsung STPD & 4 P's
 
Presentation on International Marketing (samsung company)
Presentation on International Marketing (samsung company)Presentation on International Marketing (samsung company)
Presentation on International Marketing (samsung company)
 
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre SarcanThe 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
The 4 P'S of Marketing- Advertisement-Samsung-Company- Business-Emre Sarcan
 
Samsung Galaxy Presentation
Samsung Galaxy PresentationSamsung Galaxy Presentation
Samsung Galaxy Presentation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 

Similar to Cyber laws in pakistan

It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptxHarini Sai
 

Similar to Cyber laws in pakistan (20)

Cyber law
Cyber lawCyber law
Cyber law
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by RuyookaUganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
cyber law.pptx
cyber law.pptxcyber law.pptx
cyber law.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Cyber laws in pakistan

  • 1. Cyber Laws in Pakistan Presented By: Arfan Afzal Saad Khatri Azra Sayani Muhammad Sajeel Hameed
  • 2. Information To Share 1. Cyber Crime o Emergence of Cyber Crime o Dispute in the Cyber World o Types of Cyber Crime o Targets of Cyber Crime 2. Cyber Law 3. International Aspect of Cyber Law 4. Role of Pakistan in Cyber World 5. Conventions o Electronic Transaction Ordinance - 2002 o Electronic Crime Bill - 2007 o Electronic Crime Act - 2015
  • 3. Cyber Crime  Activity in which computers or networks are a tool, a target, or a place of criminal activity.  Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as  Committing fraud  Stealing identities  Violating privacy  It is also include traditional crimes in which computers or networks are used to enable the illicit activity.  As the computer has become central to commerce, entertainment, and government.  Cyber crime has grown in importance.
  • 4. Cyber Crime Emergence of Cyber Crime  The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.
  • 5. Cyber Crime Disputes in the Cyber World  Disputes relating to on-line transactions and culture are extensively different in their nature, scope and treatment.  Pervasive societal dependence on networks. A new network paradigm is emerging.  For example, commercial organizations are integrating operations with business units, suppliers, and customers through large-scale networks that enhance communication and services. This new paradigm represents a shift from bounded networks with central control to unbounded networks.  Extremely important feature of today's unbounded networks is the emergence of tremendous disputes, differences, fights and dispute.
  • 6. Cyber Crime Types of Cyber Crimes Types Example Financial crimes Cheating, credit card frauds, money laundering etc. Cyber pornography Pornographic websites etc Sale of illegal articles Sale of narcotics, weapons and wildlife etc Online gambling Online gambling, money laundering etc Email spoofing Sending e-mails that appear to originate from one source but actually has been sent from another source. Forgery Counterfeit currency notes, postage and revenue stamps and mark sheet etc Cyber Defamation Publishing/distributing defamatory matter of someone Cyber stalking Victimizing someone online
  • 7. Cyber Crime Targets of Cyber Crime  Cyber crimes are targeted and have an impact at three levels:  (i) Individuals (ii) Organizations (iii) Society at large Individual Property Organization Society at large Computer vandalism Unauthorized control/access over computer system Pornography (basically child pornography) Intellectual Property crimes Possession of unauthorized information Polluting the youth through indecent way Unauthorized control/access over computer system Cyber terrorism against the government organization Financial crimes Transmitting virus Pirated software Dist. Sale of illegal articles
  • 8. Cyber Law  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet.  It is an intersection of many legal fields, like:  Intellectual property OR Contract Law  Privacy  Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet .
  • 9. International Aspect of Cyber Law Information and communications flow more easily around the world. Borders are no longer boundaries to this flow. This causes difficulty, as the internet based society has no physical boundaries and thus much traffic escapes national supremacy. Criminals are increasingly located in places other than where their acts produce their effects. o Over the past thirty years, developed nations transit from the industrial era to the new information age has enabled them to develop the Nascent Technology and produce ever greater quality in standards and value. Between 2000 and 2005, the average internet user growth rate was of 183.4%. o The highest rate being in the Middle East with 454.2%. o Africa with 423.9% o Latin America and the Caribbean collectively with 342.5%14.
  • 10. Int’l Aspect of Cyber Law Continue …  It is clear from these statistics that these regions, in which most developing countries are eager to implement and exploit the advantages of ICTs and the internet superhighway.  The European Union, on the other hand, has enabled harmonized implementation of regulation on electronic commerce through directives in almost all European countries, with non-member countries aligning themselves with the EU movement.  The United State has both important knowledge and experience in the legal field of cyber security, with significant influence in the area.
  • 11. Int’l Aspect of Cyber Law Continue …  European Union  The Council of Europe Convention on Cyber Crime in 2001 was the first international initiative on computer crime. It has been signed by 37 States and entered into force in July 2004. This Convention helps to foster international cooperation by criminalizing the basic cyber crimes.  United State  The United State Resolutions on Combating the Criminal Misuse of Information Technology tried to address the problem of safe havens for those who criminally misuse information technology by requesting that States put into place laws to eliminate such havens.
  • 12. Role of Pakistan in the Cyber World  The Pakistan market has now grown manifolds with the largest majority of internet users in Karachi and then Lahore and Islamabad. These three cities jointly provide over 90% of the customer base and expansion in activity is also likely to remain primarily confined to these cities because of the concentration of economic activity in these cities.  Pakistan also is not free from the cyber space dilemma. The availability of computers and Internet connections provides unprecedented opportunities to communicate and learn in Pakistan. However, certain individuals do exploit the power of the Internet for criminal purposes as well.
  • 13. Pakistan Cyber Law Conventions  While the government of Pakistan focuses on fighting terrorism and extremism under the National Action Plan (NAP), another threat seems to be looming on the horizon, i.e. cyber warfare.  Cyber-crime rises rapidly in Pakistan. There are about 30 million internet users with 15 million mobile subscribers in Pakistan.  According to Cyber Crime Unit (CCU), a branch of Federal Investigation Agency, only 62 cases were reported to the unit in 2007, 287 cases in 2008, ratio dropped in 2009 but in 2010, more than 312 cases were registered.
  • 14. PAK Cyber Law Con. Continue …  There are different law are promulgated in Pakistan. These laws not only deal with crime of Internet, which deal with all dimensions related to computer & networks.  Three of them are most important as below: o Electronic Transaction Ordinance - 2002 o Electronic Crime Bill - 2007 o Electronic Crime Act - 2015
  • 15. Electronic Transaction Ordinance-2002  The Electronic Transaction Ordinance 2002 was passed by Pakistan Government with the objective to recognize and facilitate documents, records, information, communications and transactions in electronic form, and to provide for the accreditation of certification service providers.  The Electronic Transaction Ordinance is an essential prerequisite for e- commerce growth and termed as "a landmark decision for the IT development of the country.
  • 16. ETO – 2002 Continue … The Ordinance aimed to achieve:  Great economic impact.  E-commerce and projecting Pakistan’s products such as textile, leather goods, sports goods and surgical items to the world.  Increased e-transactions.  Major benefits for the small and medium business enterprises as the cost of transactions are greatly reduced electronically.  Legal and safe trading to take place as the necessary laws to protect the interests of both the buyers and the sellers in the process of electronic sales and purchases.
  • 17. ETO – 2002 Continue …  Important Sections of ETO – 2002 1. 36. Violation of privacy information  For acquiring the information.  Gain Knowledge. 2. 37. Damage to information system, etc.  alter, modify, delete, remove, generate, transmit or store information. 3. 38. Offences to be non bail-able, compoundable and cognizable  All offences under this Ordinance shall be non bail-able, compoundable and cognizable. 4. 39. Prosecution and trial of offences.  No Court inferior to the Court of Sessions shall try any offence under this Ordinance.
  • 18. Cyber Crime Bill - 2007  Electronic Crimes Ordinance – 2007. It is in forced.  The Federal Cabinet approved the adoption of The Prevention of Electronic Crimes Bill 2007 on 17 January 2007.  The bill deals with the electronic crimes included: o Cyber terrorism o Data damage o Electronic fraud o Electronic forgery o Unauthorized access to code o Cyber stalking o Cyber Spamming
  • 19. Cyber Crime Bill – 2007 Continue … Characteristics of Bill - 2007  It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes  It will apply to every person who commits an offence, irrespective of his nationality or citizenship.  It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.
  • 20. Cyber Crime Bill – 2007 Continue …  OFFENCES AND PUNISHMENTS  Under this law there are defined punishment for the offence.  Every respective offence under this law has its distinctive punishment which can be imprisonment or fine. O/P Next Slide
  • 21. Offence Imprisonment (years) Fine Criminal Access 3 3 Lac Criminal Data Access 3 3 Lac Data Damage 3 3 Lac System Damage 3 3 Lac Electronic Fraud 7 7 Lac Electronic Forgery 7 7 Lac Misuse of Device 3 3 Lac Unauthorized access to code 3 3 Lac Malicious code 5 5 Lac Defamation 5 5 Lac Cyber stalking 3 3 Lac Cyber Spamming 6 months 50,000 Spoofing 3 3 Lac Pornography 10 ----- Cyber terrorism Life 10 Million
  • 22. Cyber Crime Act - 2015  On September 17, 2015, the National Assembly’s Standing Committee on Information Technology and Telecommunications approved the government’s proposed “Prevention of Electronic Crimes Bill 2015”, for a second time. An earlier version was approved in April 16, 2015. Both versions were approved despite reservations expressed by members of opposition part of the National Assembly (NA) Standing Committee on IT.  The proposed bill does not distinguish between innocent people and criminals. In turn, it prescribes heavy penalties in the form of jail terms and fines.
  • 23. Cyber Crime Act – 2015 Continue …  There are 5 main points from summary of this new bill: 1. It will be a crime to send text messages or photos to anyone’s email address or phone without the recipient’s consent. 2. The police or FIA or any other agency won’t need a warrant to search, seize or make arrests. 3. Under sections 17 and 18 of the new bill, the political criticism and political expression in the form of analysis, commentary, blogs, cartoons, caricatures and memes has been criminalized. Authorities will decide what is moral and what is immoral. 4. Under section 31, government can block or remove access to any website or online source if it deems it inappropriate. 5. Under section 26, the ISPs, restaurants, malls, hotels, offices, airports bus stations and anywhere with Internet facility will be required to hold data record for 3 months.
  • 24. Cyber Crime Act – 2015 Continue …  OFFENCES AND PUNISHMENTS Unauthorized access to information system or data:  Unauthorized access to any information system or data then imprisonment for a six months or with fine which may extend to one hundred thousand rupees or with both. Unauthorized copying or transmission of data:  Imprisonment for a six months or with fine which may extend to one hundred thousand rupees or with both. Cyber terrorism  Imprisonment fourteen year (14) and fine 5 million or both. Electronic fraud  Imprisonment two (02) year and fine 10 million or both.
  • 25. Cyber Crime Act – 2015 Continue … Identity crime  Whoever obtains, sells, possesses or transmits another person’s identity information, without lawful justification shall be punished with imprisonment for a term which may extend to three months or with fine which may extend to fifty thousand rupees, or with both. Unauthorized issuance of SIM cards  SIM to be used in cellular mobile or wireless phone for transmitting without verification in the mode and manner approved by the Authority shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five hundred thousand rupees or both.