SlideShare a Scribd company logo
1 of 34
Cyber Laws in Pakistan
Cyber Crime
 Activity in which computers or networks are a
tool, a target, or a place of criminal activity.
 Committing fraud
 Stealing identities
 Violating privacy
Cyber Crime
 It is also include traditional crimes in which
computers or networks are used to enable
the illicit activity.
Most common hacking:
Social media
Rafay Baloch
Pakistani researcher
 Rafay Baloch is a Pakistani ethical hacker
and security researcher known for his
discovery of vulnerabilities on the Android
operating system. He has been featured and
known by both national and international
media and publications like Forbes, BBC,
 FIA director : abdul rauf
 http://www.fia.gov.pk/en/NR3C.php
Cyber Crime
 Examples:
 E-mail account of a Federal Minister is hacked.
 Credit cards frauds reach to an alarming level.
 Visiting CEOs of Multinational Companies gets
threatening E-mails.
 Financial institutions are the favorite targets of
Cyber criminals --- worst effecting the
technological
progress in the area of e –Commerce.
Cyber Laws
 The legal issues related to use of communications
technology, particularly "cyberspace", i.e. the
Internet.
 It is an intersection of many legal fields, like:
 Intellectual property,
 Privacy
 Cyber laws is an attempt to apply laws designed for
the physical world to human activity on the Internet
Cyber Laws in the World
 Electronic Commerce Act (Ireland)
 Electronic Transactions Act (UK, USA,
Australia, New Zealand, Singapore)
 Electronic Transactions Ordinance (Hong
Kong)
 Information Technology Act (India)
 Information Communication Technology Act
Draft (Bangladesh)
Cyber Laws in Pakistan
 There are different laws, promulgated in Pakistan.
 These laws not only deal with crime of Internet
 These deal with all dimensions related to computer
& networks.
 Two of them are most known.
 They are:
 Electronic Transaction Ordinance 2002
 Electronic / Cyber Crime Bill 2007
Punishment
 Spreading false information about an
individual: up to 3 years in prison or up to
PKR 1 million in fine, or both – if someone
intentionally and publicly displays any
information through any information system,
which he or she knows to be false and by
which he or she intimidates or harms the
reputation or privacy of a natural person
Punisment
 Making videos/taking photographs and
distributing them without consent: up to 3
years in prison or up to PKR 1 million in fine,
or both – if someone takes a photograph or
makes a video of any person and displays or
distributes it without his or her consent and in
a manner that harms that person.
Electronic Transaction Ordinance 2002
 Overview
 The Electronic Transactions Ordinance (ETO), 2002, was
the first IT-relevant legislation created by national
lawmakers.
 A first step and a solid foundation for legal sanctity and
protection for Pakistani e-Commerce locally and globally.
 Laid the foundation for comprehensive Legal Infrastructure.
 It is heavily taken from foreign law related to cyber crime.
Pre-ETO 2002
 No recognition of electronic documentation
 No recognition of electronic records
 No recognition of evidential basis of
documents/records
 Failure to authenticate or identify digital or electronic
signatures or forms of authentication
 No online transaction could be legally binding
 Electronic Data & Forensic Evidence not covered.
No Rules
ETO 2002
 Sections
 There are 43 sections in this ordinance
 It deals with following 8 main areas relating to e-
Commerce.
 Recognition of Electronic Documents
 Electronic Communications
 Digital Signature regime and its evidential consequences
 Web Site & Digital Signatures Certification Providers
 Stamp Duty
 Attestation, notarization, certified copies
 Jurisdiction
 Offences
ETO 2002
 Important Sections are:
 36. Violation of privacy information
 gains or attempts to gain access
 to any information system with or without internt
 to acquire the information
 Gain Knowledge
 Imprisonment 7 years (custody)
 Fine Rs. 1 million
ETO 2002
 37. Damage to information system, etc.
 alter, modify, delete, remove, generate, transmit or store
information
 to impair the operation of,
 or prevent or hinder access to, information
 knowingly not authorized
 Imprisonment 7 years
 Fine Rs. 1 million
ETO 2002
 38. Offences to be non-bailable, compoundable
and cognizable
 All offences under this Ordinance shall be non-bailable,
compoundable and cognizable.
Post ETO 2002
 Electronic Documentation & Records
recognized
 Electronic & Digital forms of authentication &
identification given legal sanctity
 Messages through email, fax, mobile phones,
Plastic Cards, Online recognized.
Electronic/Cyber Crime Bill 2007
Overview
 “Prevention of Electronic Crimes Ordinance, 2007″
is in force now
 It was promulgated by the President of Pakistan on
the 31st December 2007
 The bill deals with the electronic crimes included:
 Cyber terrorism
 Data damage
 Electronic fraud
 Electronic forgery
 Unauthorized access to code
 Cyber stalking
 Cyber Spamming/spoofing
Electronic/Cyber Crime Bill 2007
 It offers penalties ranging from six months
imprisonment to capital punishment for 17
types of cyber crimes
 It will apply to every person who commits an
offence, irrespective of his nationality or
citizenship.
 It gives exclusive powers to the Federal
Investigation Agency (FIA) to investigate and
charge cases against such crimes.
Punishments
 Under this law there are defined punishment
for the offence.
 Every respective offence under this law has
its distinctive punishment which can be
imprisonment or fine.
Offence Imprisonment (years) Fine
Criminal Access 3 3 Lac
Criminal Data Access 3 3 Lac
Data Damage 3 3 Lac
System Damage 3 3 Lac
Electronic Fraud 7 7 Lac
Electronic Forgery 7 7 Lac
Misuse of Device 3 3 Lac
Unauthorized access to code 3 3 Lac
Malicious code 5 5 Lac
Defamation 5 5 Lac
Cyber stalking 3 3 Lac
Cyber Spamming 6 months 50,000
Spoofing 3 3 Lac
Pornography 10 -----
Cyber terrorism Life 10 Million
Sections
 Data Damage:
 Whoever with intent to illegal gain or cause harm
to the public or any person, damages any data,
shall come under this section.
 Punishment:
 3 years
 3 Lac
Electronic/Cyber Crime Bill 2007
 Electronic fraud:
 People for illegal gain get in the way or use any
data, electronic system or device or with intent to
deceive any person, which act or omissions is
likely to cause damage or harm.
 Punishment:
 7 years
 7 Lac
Electronic/Cyber Crime Bill 2007
 Electronic Forgery:
 Digital forgery is falsely altering digital contents
such as pictures, images, documents, and music
perhaps. for economic gain. It may
involve electronic forgery and identity theft.
The majority of digital forgery occurs. because
digitally altered pictures often appeal to the
viewers' eyes
 Punishment:
 7years
 7 Lac
 For example, identity theft, where a person
forges the signature of another, is a felony
and is punishable by a fine and some years
of imprisonment. Digital forgery involves
changing elements of a document or image
and representing the changes as true copies
of the original.
Electronic/Cyber Crime Bill 2007
 Malicious code:
 Whoever willfully writes, offers, makes available,
distributes or transmits malicious code through an
electronic system or device, with intent to cause
harm to any electronic system or resulting in the
theft or loss of data commits the offence of
malicious code.
 Punishment:
 5 years
 5 Lac
Electronic/Cyber Crime Bill 2007
 Cyber stalking:
 Whoever with intent to harass any person uses computer,
computer network, internet, or any other similar means of
communication to communicate obscene, vulgar, profane,
lewd.
 Make any suggestion or proposal of an obscene nature
 Threaten any illegal or immoral act
 Take or distribute pictures or photographs of any person
without his consent or knowledge
 Commits the offence of cyber stalking.
 3 Years
 3 Lac
Electronic/Cyber Crime Bill 2007
 Spamming:
 Whoever transmits harmful, fraudulent, misleading,
 illegal or unsolicited electronic messages in bulk to any
person
 without the express permission of the recipient,
 involves in falsified online user account registration or
falsified domain name registration for commercial purpose
commits the offence of spamming.
 Punishment:
 6 month
 50,000
Electronic/Cyber Crime Bill 2007
 Spoofing:
 Whoever establishes a website, or sends an
electronic message with a counterfeit source
intended to be believed by the recipient or visitor
or its electronic system to be an authentic source
 with intent to gain unauthorized access or obtain
valuable information
 Later, Information can be used for any lawful
purposes commits the offence of spoofing.
 3 Years
 3 Lac
Electronic/Cyber Crime Bill 2007
 Cyber terrorism:
 Any person, group or organization who, with terroristic
intent utilizes,
 accesses or causes to be accessed a computer or
computer network or electronic system or device or by any
available means,
 knowingly engages in or attempts to engage in a terroristic
act commits the offence of cyber terrorism.
 Punishment
 Whoever commits the offence of cyber terrorism and
causes death of any person shall be punished with death
 Or imprisonment for life, and with fine
 Otherwise he shall be punishable with imprisonment of ten
years or with fine ten million rupees
Crimes Reported in Pakistan
 A total of 57 cases have been registered under
the ETO 2002 in the years 2005 & 2006.
Offences 2006 2005 Total
IPR Crimes 14 20 34
Spurious Drugs 37 30 67
Cyber Crimes 33 24 57
Counterfeit Currencies 7 2 9
Others 105 148 253
Total: 196 224 420

More Related Content

Similar to Cyber Laws in Pakistan Explained

Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 

Similar to Cyber Laws in Pakistan Explained (20)

Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Shilpa
ShilpaShilpa
Shilpa
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 

Recently uploaded

Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 

Recently uploaded (20)

Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 

Cyber Laws in Pakistan Explained

  • 1. Cyber Laws in Pakistan
  • 2. Cyber Crime  Activity in which computers or networks are a tool, a target, or a place of criminal activity.  Committing fraud  Stealing identities  Violating privacy
  • 3. Cyber Crime  It is also include traditional crimes in which computers or networks are used to enable the illicit activity. Most common hacking: Social media
  • 4. Rafay Baloch Pakistani researcher  Rafay Baloch is a Pakistani ethical hacker and security researcher known for his discovery of vulnerabilities on the Android operating system. He has been featured and known by both national and international media and publications like Forbes, BBC,
  • 5.  FIA director : abdul rauf  http://www.fia.gov.pk/en/NR3C.php
  • 6.
  • 7. Cyber Crime  Examples:  E-mail account of a Federal Minister is hacked.  Credit cards frauds reach to an alarming level.  Visiting CEOs of Multinational Companies gets threatening E-mails.  Financial institutions are the favorite targets of Cyber criminals --- worst effecting the technological progress in the area of e –Commerce.
  • 8. Cyber Laws  The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet.  It is an intersection of many legal fields, like:  Intellectual property,  Privacy  Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet
  • 9. Cyber Laws in the World  Electronic Commerce Act (Ireland)  Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore)  Electronic Transactions Ordinance (Hong Kong)  Information Technology Act (India)  Information Communication Technology Act Draft (Bangladesh)
  • 10. Cyber Laws in Pakistan  There are different laws, promulgated in Pakistan.  These laws not only deal with crime of Internet  These deal with all dimensions related to computer & networks.  Two of them are most known.  They are:  Electronic Transaction Ordinance 2002  Electronic / Cyber Crime Bill 2007
  • 11. Punishment  Spreading false information about an individual: up to 3 years in prison or up to PKR 1 million in fine, or both – if someone intentionally and publicly displays any information through any information system, which he or she knows to be false and by which he or she intimidates or harms the reputation or privacy of a natural person
  • 12. Punisment  Making videos/taking photographs and distributing them without consent: up to 3 years in prison or up to PKR 1 million in fine, or both – if someone takes a photograph or makes a video of any person and displays or distributes it without his or her consent and in a manner that harms that person.
  • 13. Electronic Transaction Ordinance 2002  Overview  The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers.  A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally.  Laid the foundation for comprehensive Legal Infrastructure.  It is heavily taken from foreign law related to cyber crime.
  • 14. Pre-ETO 2002  No recognition of electronic documentation  No recognition of electronic records  No recognition of evidential basis of documents/records  Failure to authenticate or identify digital or electronic signatures or forms of authentication  No online transaction could be legally binding  Electronic Data & Forensic Evidence not covered. No Rules
  • 15. ETO 2002  Sections  There are 43 sections in this ordinance  It deals with following 8 main areas relating to e- Commerce.  Recognition of Electronic Documents  Electronic Communications  Digital Signature regime and its evidential consequences  Web Site & Digital Signatures Certification Providers  Stamp Duty  Attestation, notarization, certified copies  Jurisdiction  Offences
  • 16. ETO 2002  Important Sections are:  36. Violation of privacy information  gains or attempts to gain access  to any information system with or without internt  to acquire the information  Gain Knowledge  Imprisonment 7 years (custody)  Fine Rs. 1 million
  • 17. ETO 2002  37. Damage to information system, etc.  alter, modify, delete, remove, generate, transmit or store information  to impair the operation of,  or prevent or hinder access to, information  knowingly not authorized  Imprisonment 7 years  Fine Rs. 1 million
  • 18. ETO 2002  38. Offences to be non-bailable, compoundable and cognizable  All offences under this Ordinance shall be non-bailable, compoundable and cognizable.
  • 19. Post ETO 2002  Electronic Documentation & Records recognized  Electronic & Digital forms of authentication & identification given legal sanctity  Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
  • 21. Overview  “Prevention of Electronic Crimes Ordinance, 2007″ is in force now  It was promulgated by the President of Pakistan on the 31st December 2007  The bill deals with the electronic crimes included:  Cyber terrorism  Data damage  Electronic fraud  Electronic forgery  Unauthorized access to code  Cyber stalking  Cyber Spamming/spoofing
  • 22. Electronic/Cyber Crime Bill 2007  It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes  It will apply to every person who commits an offence, irrespective of his nationality or citizenship.  It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.
  • 23. Punishments  Under this law there are defined punishment for the offence.  Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.
  • 24. Offence Imprisonment (years) Fine Criminal Access 3 3 Lac Criminal Data Access 3 3 Lac Data Damage 3 3 Lac System Damage 3 3 Lac Electronic Fraud 7 7 Lac Electronic Forgery 7 7 Lac Misuse of Device 3 3 Lac Unauthorized access to code 3 3 Lac Malicious code 5 5 Lac Defamation 5 5 Lac Cyber stalking 3 3 Lac Cyber Spamming 6 months 50,000 Spoofing 3 3 Lac Pornography 10 ----- Cyber terrorism Life 10 Million
  • 25. Sections  Data Damage:  Whoever with intent to illegal gain or cause harm to the public or any person, damages any data, shall come under this section.  Punishment:  3 years  3 Lac
  • 26. Electronic/Cyber Crime Bill 2007  Electronic fraud:  People for illegal gain get in the way or use any data, electronic system or device or with intent to deceive any person, which act or omissions is likely to cause damage or harm.  Punishment:  7 years  7 Lac
  • 27. Electronic/Cyber Crime Bill 2007  Electronic Forgery:  Digital forgery is falsely altering digital contents such as pictures, images, documents, and music perhaps. for economic gain. It may involve electronic forgery and identity theft. The majority of digital forgery occurs. because digitally altered pictures often appeal to the viewers' eyes  Punishment:  7years  7 Lac
  • 28.  For example, identity theft, where a person forges the signature of another, is a felony and is punishable by a fine and some years of imprisonment. Digital forgery involves changing elements of a document or image and representing the changes as true copies of the original.
  • 29. Electronic/Cyber Crime Bill 2007  Malicious code:  Whoever willfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or device, with intent to cause harm to any electronic system or resulting in the theft or loss of data commits the offence of malicious code.  Punishment:  5 years  5 Lac
  • 30. Electronic/Cyber Crime Bill 2007  Cyber stalking:  Whoever with intent to harass any person uses computer, computer network, internet, or any other similar means of communication to communicate obscene, vulgar, profane, lewd.  Make any suggestion or proposal of an obscene nature  Threaten any illegal or immoral act  Take or distribute pictures or photographs of any person without his consent or knowledge  Commits the offence of cyber stalking.  3 Years  3 Lac
  • 31. Electronic/Cyber Crime Bill 2007  Spamming:  Whoever transmits harmful, fraudulent, misleading,  illegal or unsolicited electronic messages in bulk to any person  without the express permission of the recipient,  involves in falsified online user account registration or falsified domain name registration for commercial purpose commits the offence of spamming.  Punishment:  6 month  50,000
  • 32. Electronic/Cyber Crime Bill 2007  Spoofing:  Whoever establishes a website, or sends an electronic message with a counterfeit source intended to be believed by the recipient or visitor or its electronic system to be an authentic source  with intent to gain unauthorized access or obtain valuable information  Later, Information can be used for any lawful purposes commits the offence of spoofing.  3 Years  3 Lac
  • 33. Electronic/Cyber Crime Bill 2007  Cyber terrorism:  Any person, group or organization who, with terroristic intent utilizes,  accesses or causes to be accessed a computer or computer network or electronic system or device or by any available means,  knowingly engages in or attempts to engage in a terroristic act commits the offence of cyber terrorism.  Punishment  Whoever commits the offence of cyber terrorism and causes death of any person shall be punished with death  Or imprisonment for life, and with fine  Otherwise he shall be punishable with imprisonment of ten years or with fine ten million rupees
  • 34. Crimes Reported in Pakistan  A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006. Offences 2006 2005 Total IPR Crimes 14 20 34 Spurious Drugs 37 30 67 Cyber Crimes 33 24 57 Counterfeit Currencies 7 2 9 Others 105 148 253 Total: 196 224 420

Editor's Notes

  1. characteristic of the culture of computers, information technology, and virtual reality. "the cyber age" We are living in cyber age.
  2. ناجائز:Illicit
  3. Rafay friend story……American lawyer…..
  4. Promulgated : Naqiz
  5. Ordinance : Urgent need ….President right ..but for 90 days
  6. Pre-ETO : Electronic Transactions Ordinance, 2002
  7. قابل دست اندازی cognizable : without warrant arrest the accused Compoundable offences are those offences where, the complainant (one who has filed the case, i.e. the victim), enter into a compromise, and agrees to have the charges dropped against the accused.
  8. Forgery : illegally manipulate things
  9. Digital forgery is falsely altering digital contents such as pictures, images, documents, and music perhaps. for economic gain. It may involve electronic forgery and identity theft. The majority of digital forgery occurs. because digitally altered pictures often appeal to the viewers' eyes
  10. Fai-lony (felony  سنگین جرم - sangeen-juram
  11. Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.:::Malware
  12. گستاخ profane
  13. Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
  14. What we should have to do?