Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Governemace In Pakistan


Published on

This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.

Published in: Business, Technology
  • Be the first to comment

Cyber Governemace In Pakistan

  1. 1. Cyber Laws and Governance in Pakistan Conveyor : Shakeel Ahmed Roll No: 08 / STP 03 Mehran University Institute of Science and Technology Development
  2. 2. Agenda <ul><li>Cyber Crime </li></ul><ul><li>Cyber Laws </li></ul><ul><li>Cyber laws in Pakistan </li></ul><ul><li>Electronic Transaction Ordinance 2002 </li></ul><ul><ul><li>Overview </li></ul></ul><ul><ul><li>Sections </li></ul></ul>
  3. 3. Agenda <ul><li>Electronic Crimes Bill 2007 </li></ul><ul><ul><li>Overview </li></ul></ul><ul><ul><li>Sections </li></ul></ul>
  4. 4. Cyber Crime <ul><li>Activity in which computers or networks are a tool, a target, or a place of criminal activity. </li></ul><ul><li>Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as </li></ul><ul><ul><li>Committing fraud </li></ul></ul><ul><ul><li>Stealing identities </li></ul></ul><ul><ul><li>Violating privacy </li></ul></ul>
  5. 5. <ul><li>It is also include traditional crimes in which computers or networks are used to enable the illicit activity. </li></ul><ul><li>As the computer has become central to commerce, entertainment, and government. </li></ul><ul><li>Cyber crime has grown in importance. </li></ul>
  6. 6. <ul><li>Examples: </li></ul><ul><ul><li>E-mail account of a Federal Minister was hacked. </li></ul></ul><ul><ul><li>Credit cards frauds reach to an alarming level. </li></ul></ul><ul><ul><li>Visiting CEOs of Multinational Companies gets threatening E-mails. </li></ul></ul><ul><ul><li>Financial institutions are the favorite targets of Cyber criminals --- worst effecting the technological and progress in the area of e –Commerce. </li></ul></ul>
  7. 7. Cyber Laws <ul><li>The legal issues related to use of communications technology, particularly &quot;cyberspace&quot;, i.e. the Internet. </li></ul><ul><li>It is an intersection of many legal fields, like: </li></ul><ul><ul><li>Intellectual property, </li></ul></ul><ul><ul><li>Privacy </li></ul></ul><ul><li>Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet </li></ul>
  8. 8. Cyber Laws in the World <ul><li>Electronic Commerce Act (Ireland) </li></ul><ul><li>Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore) </li></ul><ul><li>Electronic Transactions Ordinance (Hong Kong) </li></ul><ul><li>Information Technology Act (India) </li></ul><ul><li>Information Communication Technology Act Draft (Bangladesh) </li></ul>
  9. 9. Cyber Laws in Pakistan <ul><li>There are different law are promulgated in Pakistan. </li></ul><ul><li>These laws not only deal with crime of Internet </li></ul><ul><li>These deal with all dimensions related to computer & networks. </li></ul><ul><li>Two of them are most known. </li></ul><ul><li>They are: </li></ul><ul><ul><li>Electronic Transaction Ordinance 2002 </li></ul></ul><ul><ul><li>Electronic / Cyber Crime Bill 2007 </li></ul></ul>
  10. 10. Electronic Transaction Ordinance 2002 <ul><li>Overview </li></ul><ul><ul><li>The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers. </li></ul></ul><ul><ul><li>A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally. </li></ul></ul><ul><ul><li>Laid the foundation for comprehensive Legal Infrastructure. </li></ul></ul><ul><ul><li>It is heavily taken from foreign law related to cyber crime. </li></ul></ul>
  11. 11. Pre-ETO 2002 <ul><li>No recognition of electronic documentation </li></ul><ul><li>No recognition of electronic records </li></ul><ul><li>No recognition of evidential basis of documents/records </li></ul><ul><li>Failure to authenticate or identify digital or electronic signatures or forms of authentication </li></ul><ul><li>No online transaction could be legally binding </li></ul><ul><li>Electronic Data & Forensic Evidence not covered. No Rules </li></ul>
  12. 12. <ul><li>Important Sections are: </li></ul><ul><ul><li>Violation of privacy information </li></ul></ul><ul><ul><ul><li>gains or attempts to gain access </li></ul></ul></ul><ul><ul><ul><li>to any information system with or without intent </li></ul></ul></ul><ul><ul><ul><li>to acquire the information </li></ul></ul></ul><ul><ul><ul><li>Gain Knowledge </li></ul></ul></ul><ul><ul><ul><li>Imprisonment 7 years </li></ul></ul></ul><ul><ul><ul><li>Fine Rs. 1 million </li></ul></ul></ul>
  13. 13. <ul><ul><li>Damage to information system, etc. </li></ul></ul><ul><ul><ul><li>alter, modify, delete, remove, generate, transmit or store information </li></ul></ul></ul><ul><ul><ul><li>to impair the operation of, </li></ul></ul></ul><ul><ul><ul><li>or prevent or hinder access to, information </li></ul></ul></ul><ul><ul><ul><li>knowingly not authorized </li></ul></ul></ul><ul><ul><ul><li>Imprisonment 7 years </li></ul></ul></ul><ul><ul><ul><li>Fine Rs. 1 million </li></ul></ul></ul>
  14. 14. Post ETO 2002 <ul><li>Electronic Documentation & Records recognized </li></ul><ul><li>Electronic & Digital forms of authentication & identification given legal sanctity </li></ul><ul><li>Messages through email, fax, mobile phones, Plastic Cards, Online recognized. </li></ul>
  15. 15. Electronic/Cyber Crime Bill 2007
  16. 16. Overview <ul><li>“ Prevention of Electronic Crimes Ordinance, 2007″ is in force now </li></ul><ul><li>It was promulgated by the President of Pakistan on the 31st December 2007 </li></ul><ul><li>The bill deals with the electronic crimes included: </li></ul><ul><ul><li>Cyber terrorism </li></ul></ul><ul><ul><li>Data damage </li></ul></ul><ul><ul><li>Electronic fraud </li></ul></ul><ul><ul><li>Electronic forgery </li></ul></ul><ul><ul><li>Unauthorized access to code </li></ul></ul><ul><ul><li>Cyber stalking </li></ul></ul><ul><ul><li>Cyber Spaming </li></ul></ul>
  17. 17. <ul><li>It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes </li></ul><ul><li>It will apply to every person who commits an offence, irrespective of his nationality or citizenship. </li></ul><ul><li>It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes. </li></ul>
  18. 18. Punishments <ul><li>Under this law there are defined punishment for the offence. </li></ul><ul><li>Every respective offence under this law has its distinctive punishment which can be imprisonment or fine. </li></ul>
  19. 19. Offence Imprisonment (years) Fine Criminal Access 3 3 Lac Criminal Data Access 3 3 Lac Data Damage 3 3 Lac System Damage 3 3 Lac Electronic Fraud 7 7 Lac Electronic Forgery 7 7 Lac Misuse of Device 3 3 Lac Unauthorized access to code 3 3 Lac Malicious code 5 5 Lac Defamation 5 5 Lac Cyber stalking 3 3 Lac Cyber Spamming 6 months 50,000 Spoofing 3 3 Lac Pornography 10 ----- Cyber terrorism Life 10 Million
  20. 20. Crimes Reported in Pakistan <ul><li>A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006. </li></ul> (abstract) Offences 2006 2005 Total IPR Crimes 14 20 34 Spurious Drugs 37 30 67 Cyber Crimes 33 24 57 Counterfeit Currencies 7 2 9 Others 105 148 253 Total: 196 224 420
  21. 21. Conclusions : <ul><li>As the whole presentation shows, we have some very fine laws and regulations to implement in the Cyber Space, but the only lacking factor is the implementation of these lays, there are very rare cases when the these laws have been practiced. Now need is to educate people regarding what there rights are and the legal strength they have been empowered with. </li></ul>
  22. 22. <ul><li>References: </li></ul><ul><li>1- Ordinance No: LI OF 2002, rkingroups/pdf/ETO%20Readable.pdf , accessed on 7 th of April 2009. </li></ul><ul><li>2- , accessed on 7th of April 2009. </li></ul><ul><li>3- crime-cyber-crime-ordinance-act-law-credit- card-fraud-spam-spoof-forgery-malicious-online- internet-pakistan, accessed 7 th of April 2009. </li></ul><ul><li>4- laws_pakistan.php, accessed on 7 th of April 2009 </li></ul>