NUDRAT MUFTI (LEGAL & DEVELOPMENTCONSULTANT)
FREEDOM KNOWLEDGE  EDUCATION
GLAMOUR                                             UTUBEFRIENDSHIP                         MODERN                        ...
PERSONORGANIZATION  PROPERTY  SOCIETY
Go to the Internet for information,    entertainment, relationships and support. .   Heavy users are at risk when they ar...
The people going on-line excessively will encounter one or more of the following problems.   Personal neglect   Compulsi...
  when people mistreat or misuse other    people, showing no concern for theirintegrity or innate worth as individuals, a...
 Am  I Being Abused? Domestic Violence Stalking Sexual Harassment Financial Abuse Credit  card or debt, identity thef...
BETTER                                   FOCUS                                             CONCERTATION                 ME...
   Internet Security   Safety with an Abuser think of ways to try to stay safe if    you are currently living with someo...
   STRONG PASSWORD   BEING CAREFUL –FILE OR DOC SHARING   EXTRA CONCERNED WITH UR ONLINE BILL    PAYMENT   DISCLOSING ...
ILLEGAL ACCESSILLEGAL INTERCEPTIONDATA INTERFERENCESYSTEM INTERFERENCE MISUSE OF DEVICES      FORGERY       FRAUDCHILD POR...
• to two years. Criminal           • three hundred  access.    thousand rupeesCriminal    • to three years  data      • wi...
• three years,  Data          • with finedamage    • or with both          • three years, System          • with finedamag...
Whoever for wrongfulgain interferes with oruses any data, electronicsystem or device orinduces any person toenter into a r...
Misuse of       •three year                           electronic system • with fine,                          or electroni...
• ten years                              • with fine not less than one hundred . Cyber stalking              thousand rupe...
•fine not exceeding fifty                .           thousand rupees for the first                            time        ...
•ten years                                Cyber       •with fine not less than ten million                                ...
Enhanced punishment for •ten years,   offences involving                        •with fine not exceeding one   sensitive e...
   sections 193 and 228 of the Pakistan Penal    Code 1860 (XLV of 1860 )   sections 480 and 482 of the Code       ESTAB...
Overview Most of the laws related to domestic  violence and sexual assault are state laws. Restraining Orders A restraini...
   An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the    EastWest Institute Second ...
 SMALL AND MICRO ENTERPRISES FOR  DEVELOPMENT NEW TRENDS IN GOOD GOVERNANCE CONFLICT RESOLUTION SUSTAINABILITY ISSUES ...
Cyber Laws -Nudrat Mufti
Upcoming SlideShare
Loading in …5
×

Cyber Laws -Nudrat Mufti

1,052 views

Published on

September – December Session 2011- Development Programme on “A Grooming Academy for Women” organised by PAF Complex, E-9, Islamabad

Published in: Education, Health & Medicine
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,052
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber Laws -Nudrat Mufti

  1. 1. NUDRAT MUFTI (LEGAL & DEVELOPMENTCONSULTANT)
  2. 2. FREEDOM KNOWLEDGE EDUCATION
  3. 3. GLAMOUR UTUBEFRIENDSHIP MODERN TRENDS EMAIL POLLUTING APPRECIATION YOUTH LOTTERY RELATIONSHIP FINAICIAL CRIMES
  4. 4. PERSONORGANIZATION PROPERTY SOCIETY
  5. 5. Go to the Internet for information, entertainment, relationships and support. .  Heavy users are at risk when they are plugged for More Than 18 Hours A Week. There is no official diagnosis for an addiction to the Internet. The proposed disorder is called Internet Addiction Disorder (IAD).USING THE NET IS NOT A PROBLEM FOR INTERNETUSERS WHO ARE ON-LINE LESS THAN TWO HOURS A WEEK.
  6. 6. The people going on-line excessively will encounter one or more of the following problems. Personal neglect Compulsive checking and "clicking" Isolation and avoidance from people Lost productivity Depression Marital problems Internet abuse in the workplace Academic failure.
  7. 7.  when people mistreat or misuse other people, showing no concern for theirintegrity or innate worth as individuals, and in a manner that degrades their well being
  8. 8.  Am I Being Abused? Domestic Violence Stalking Sexual Harassment Financial Abuse Credit card or debt, identity theft and other money matters.
  9. 9. BETTER FOCUS CONCERTATION MEMORY FLEXIBILITYIMPROVE INTELLIGENCE SOLVE THINK OUTSIDE THE & I.Q PROBLEM BOX SPEED ATTENEION THINK FASTER AND BE A SHARPER AND IMPROVE REACTION TIME BETTER DRIVER
  10. 10.  Internet Security Safety with an Abuser think of ways to try to stay safe if you are currently living with someone who is violent. Getting Ready to Leave Ending the Abusive RelationshipIf you have left an abusive relationship, or you are trying to keep the abuser away, Safety in Rural AreasIf you live in a rural area or a small town, there are some extra things to keep in mind when youre making a safety plan. Safety Tips for Stalking Victims how to stay safe if you are a victim of stalking Safety with Social Media How to stay safe on Face book, MySpace, Twitter and Blog Where to Find Help Additional resources + create a safety plan that is right for you.
  11. 11.  STRONG PASSWORD BEING CAREFUL –FILE OR DOC SHARING EXTRA CONCERNED WITH UR ONLINE BILL PAYMENT DISCLOSING INFORMATIONS MISUSE OF PHOTOGRAPH CHILD CODE LATEST ANTI-VIRUS UPDATE AWARENESS BACK VOLUME-AVOID DATA LOSS
  12. 12. ILLEGAL ACCESSILLEGAL INTERCEPTIONDATA INTERFERENCESYSTEM INTERFERENCE MISUSE OF DEVICES FORGERY FRAUDCHILD PORNOGRAPHY
  13. 13. • to two years. Criminal • three hundred access. thousand rupeesCriminal • to three years data • with fine access • with both.
  14. 14. • three years, Data • with finedamage • or with both • three years, System • with finedamage • or with both
  15. 15. Whoever for wrongfulgain interferes with oruses any data, electronicsystem or device orinduces any person toenter into a relationship • seven years,or with intent to deceive , Electronicwhich act or omission is • with fine,likely to cause damage or fraud • with Bothharm to that personwrongful gain interfereswith data, electronic • seven years,system or device, withintent to cause damage Electronic • with fineor injury to the public orto any person, make forgery • with bothillegal claim or title or tocause any person to partwith property or to enterinto any express orimplied contract, or withintent to commit fraudby any input
  16. 16. Misuse of •three year electronic system • with fine, or electronic device •three year . Unauthorized • with fine, access to code •five years,encrypts any Misuse of • with fine,communication or data encryption • with both.contained in electronicsystem relating to thatcrime or incriminatingevidence, commits theoffence of misuse ofencryption
  17. 17. • ten years • with fine not less than one hundred . Cyber stalking thousand rupees, • with bothwith intent to coerce , intimidate, or harass any person usescomputer, computer network, internet, network site ,electronic mail or anyother similar means of communication (a) communicate obscene, vulgar, profane, lewd, lascivious , or indecentlanguage, picture or image; (b) make any suggestion or proposal of an obscene nature (c) threaten any illegal or immoral act;(d) take or distribute pictures or photographs of any person without his consentor knowledge;(e) display or distribute information in a manner that substantially increases therisk of harmor violence to any other person, commits the offence of cyber stalking.
  18. 18. •fine not exceeding fifty . thousand rupees for the first time Spamming •imprisonment of three months • with both.transmits harmful, fraudulent , misleading, illegal orunsolicitedelectronic messages in bulk to any person without theexpress permission of the recipient,• causes any electronic system to show any suchmessage or involves in falsified online user accountregistration falsified domain name registration for commercialpurpose commits the offence of
  19. 19. •ten years Cyber •with fine not less than ten million rupees, terrorism • with both.a website, or sends an •to three yearselectronic message with a • with fine,counterfeit Spoofing •both.source •to five years Malicious • with fine code • with both •to five years, Unauthorized •five hundred thousand rupees, interception • with both.
  20. 20. Enhanced punishment for •ten years, offences involving •with fine not exceeding one sensitive electronic systems million rupees, or with both. . Of abets, aids or •oneha1f of the longest term of attempts to commits imprisonment offence
  21. 21.  sections 193 and 228 of the Pakistan Penal Code 1860 (XLV of 1860 ) sections 480 and 482 of the Code ESTABLISHMENT OF INVESTIGATION AND PROSECUTION AGENCIES – Federal Investigation Agency to investigate and prosecute the offences under this Act- retain its traffic data minimum for a period of ninety days – in writing to the Ministry of Foreign Affairs of Government of Pakistan I other relevant agencies as the case may be . the Information and Communication Technologies Tribunal whose principal seat shall be at Islamabad
  22. 22. Overview Most of the laws related to domestic violence and sexual assault are state laws. Restraining Orders A restraining order is a legal order requiring one person to stop harming another. Custody General information about custody and visitation laws. Parental Kidnapping the laws of taking your child away from another parent without that parents consent. Divorce General information about the basic steps to get a divorce. Crimes General information about crimes the abuser may have committed. Suing Your Abuser You may have a right to sue your abuser for medical costs, destroyed property, or other damages.
  23. 23.  An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011). ‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010). ‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, (April 12-19, 2010). ‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth common space after land, sea, air and outer space neeed international law as a framework. - EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to Cybersecurity» - Brussels (February 17, 2010). ‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts, Denver, USA, (September 2009) (pdf) ‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries (pdf) prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May 2009) ‣The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva (pdf) Stein Schjolberg (December 2008)
  24. 24.  SMALL AND MICRO ENTERPRISES FOR DEVELOPMENT NEW TRENDS IN GOOD GOVERNANCE CONFLICT RESOLUTION SUSTAINABILITY ISSUES IN POVERTY REDUCTION SOCIAL MOBILIZATION IN DEVELOPMENT PLANNING TOOLS

×