SlideShare a Scribd company logo
1 of 16
1
My Introduction
2
Northern University Nowshera
What is Cyber
Security
4
Importance of Cyber Security
in digital age
!
 Protection of
personal information
 Prevention of Financial
Loss
 Safeguarding Business
Assets
Cybercrimes are illegal activities that happen using computers, the internet, or
other digital technologies. They are like traditional crimes, but they occur in the
digital world.
Cyber Crime is mainly consist of unauthorized access to
computer system, data alteration, theft of intellectual
property,
7 7
1 2 3
4 5 6
 Prevention of Electronic
Crimes Act (PECA) 2016
Cyber Crimes
Legislation in Pakistan.
8
 Electronic Transactions
Ordinance (ETO) 2002
 Electronic / Cyber Crime
Bill 2007
 Personal Data Protection
Act (PDPA)
9
1
The PECA is the primary legislation that addresses cybercrimes in
Pakistan. It criminalizes various cyber offenses such as unauthorized
access to computers, hacking, identity theft, cyber stalking, electronic
fraud, and distribution of malicious software. It provides guidelines
for investigation, prosecution, and penalties for offenders.
Prevention of Electronic
Crimes Act (PECA) 2016
10
• Unauthorized Access to Information Systems
and Data imprisonment for up to three months, a fine of up
to PKR 50,000 (approximately), or both
Punishments
1
Prevention of Electronic
Crimes Act (PECA) 2016
Here are some examples of the penalties
specified under PECA:
• Electronic Forgery Forgery or alteration of electronic
records or documents with the intent to deceive is punishable
with imprisonment for up to three years, a fine of up to PKR
500,000 (approximately), or both.
• Cyber Terrorism Engaging in or planning acts that may
cause violence, harm to individuals, or damage to property
through electronic means with a political, religious, or
ideological motive is punishable with imprisonment for up to
14 years, a fine of up to PKR 10 million (approximately), or
both.
• Cyber Harassment Engaging in cyberstalking or cyber
harassment, which causes mental distress or fear to the victim,
is punishable with imprisonment for up to two years, a fine of
up to PKR 500,000 (approximately), or both
11
2
The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant
legislation created by national lawmakers. A first step and a solid foundation
for legal sanctity and protection for Pakistani e-Commerce locally and
globally. Laid the foundation for comprehensive Legal Infrastructure. It is
heavily taken from foreign law related to cyber crime.
Electronic Transactions
Ordinance (ETO) 2002
12
• Violation of privacy information Gains or attempts to
gain access to any information system with or without internet
to acquire the information or to gain knowledge is punishable
with imprisonment & years (Custody), And Fine of Rs.1 million.
Punishments
Here are some examples of the penalties
specified under ETO 2002:
• Damage to information system Alter, modify, delete,
remove, generate, transmit or store Unauthorized information
may punishable with imprisonment 7 years, or Fine Rs.1 million
• Non-Bailable All offences under this ordinance shell be
non-bailable.
3
Electronic Crime Bill 2007 was a bill introduced in Pakistan to
address issues related to cybercrimes and electronic offenses.
However, it is important to note that the bill you mentioned, the
Electronic Crime Bill 2007, is not the current legislation in effect in
Pakistan. The Prevention of Electronic Crimes Act (PECA) 2016
replaced and superseded the Electronic Crime Bill 2007.
The Electronic Crime Bill 2007 was initially proposed to address
cybercrimes, but it did not become law. Instead, it went through
various revisions and amendments over the years, leading to the
development and enactment of the PECA in 2016.
Electronic / Cyber Crime Bill
2007
4
The PDPA is currently in the drafting phase and is expected to be
enacted soon. It aims to protect the privacy and personal data of
individuals in Pakistan. The law will regulate the collection,
storage, processing, and sharing of personal data by individuals
and organizations. It will establish guidelines and obligations for
data controllers and data processors to ensure data protection..
Personal Data Protection Act
(PDPA)
15
Government
Initiatives on Cyber
Security
“
16
Thank You :)

More Related Content

Similar to Cyber Crimes In Pakistan.pptx

PP ASSIGNMENT 3.docx
PP ASSIGNMENT 3.docxPP ASSIGNMENT 3.docx
PP ASSIGNMENT 3.docxrinim85726
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public29 1 24 cyber law Information for Public
29 1 24 cyber law Information for PublicPrashantKanade5
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
 

Similar to Cyber Crimes In Pakistan.pptx (20)

PP ASSIGNMENT 3.docx
PP ASSIGNMENT 3.docxPP ASSIGNMENT 3.docx
PP ASSIGNMENT 3.docx
 
Imran batada
Imran batadaImran batada
Imran batada
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
138740042-cyber-law.pptx
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptx
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 

Recently uploaded

如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxnibresliezel23
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 

Recently uploaded (20)

如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 

Cyber Crimes In Pakistan.pptx

  • 1. 1
  • 3.
  • 5. Importance of Cyber Security in digital age !  Protection of personal information  Prevention of Financial Loss  Safeguarding Business Assets
  • 6. Cybercrimes are illegal activities that happen using computers, the internet, or other digital technologies. They are like traditional crimes, but they occur in the digital world. Cyber Crime is mainly consist of unauthorized access to computer system, data alteration, theft of intellectual property,
  • 7. 7 7 1 2 3 4 5 6
  • 8.  Prevention of Electronic Crimes Act (PECA) 2016 Cyber Crimes Legislation in Pakistan. 8  Electronic Transactions Ordinance (ETO) 2002  Electronic / Cyber Crime Bill 2007  Personal Data Protection Act (PDPA)
  • 9. 9 1 The PECA is the primary legislation that addresses cybercrimes in Pakistan. It criminalizes various cyber offenses such as unauthorized access to computers, hacking, identity theft, cyber stalking, electronic fraud, and distribution of malicious software. It provides guidelines for investigation, prosecution, and penalties for offenders. Prevention of Electronic Crimes Act (PECA) 2016
  • 10. 10 • Unauthorized Access to Information Systems and Data imprisonment for up to three months, a fine of up to PKR 50,000 (approximately), or both Punishments 1 Prevention of Electronic Crimes Act (PECA) 2016 Here are some examples of the penalties specified under PECA: • Electronic Forgery Forgery or alteration of electronic records or documents with the intent to deceive is punishable with imprisonment for up to three years, a fine of up to PKR 500,000 (approximately), or both. • Cyber Terrorism Engaging in or planning acts that may cause violence, harm to individuals, or damage to property through electronic means with a political, religious, or ideological motive is punishable with imprisonment for up to 14 years, a fine of up to PKR 10 million (approximately), or both. • Cyber Harassment Engaging in cyberstalking or cyber harassment, which causes mental distress or fear to the victim, is punishable with imprisonment for up to two years, a fine of up to PKR 500,000 (approximately), or both
  • 11. 11 2 The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers. A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally. Laid the foundation for comprehensive Legal Infrastructure. It is heavily taken from foreign law related to cyber crime. Electronic Transactions Ordinance (ETO) 2002
  • 12. 12 • Violation of privacy information Gains or attempts to gain access to any information system with or without internet to acquire the information or to gain knowledge is punishable with imprisonment & years (Custody), And Fine of Rs.1 million. Punishments Here are some examples of the penalties specified under ETO 2002: • Damage to information system Alter, modify, delete, remove, generate, transmit or store Unauthorized information may punishable with imprisonment 7 years, or Fine Rs.1 million • Non-Bailable All offences under this ordinance shell be non-bailable.
  • 13. 3 Electronic Crime Bill 2007 was a bill introduced in Pakistan to address issues related to cybercrimes and electronic offenses. However, it is important to note that the bill you mentioned, the Electronic Crime Bill 2007, is not the current legislation in effect in Pakistan. The Prevention of Electronic Crimes Act (PECA) 2016 replaced and superseded the Electronic Crime Bill 2007. The Electronic Crime Bill 2007 was initially proposed to address cybercrimes, but it did not become law. Instead, it went through various revisions and amendments over the years, leading to the development and enactment of the PECA in 2016. Electronic / Cyber Crime Bill 2007
  • 14. 4 The PDPA is currently in the drafting phase and is expected to be enacted soon. It aims to protect the privacy and personal data of individuals in Pakistan. The law will regulate the collection, storage, processing, and sharing of personal data by individuals and organizations. It will establish guidelines and obligations for data controllers and data processors to ensure data protection.. Personal Data Protection Act (PDPA)