SlideShare a Scribd company logo
Analysis Of Cyber Crime Bill 2016
Why Cyber Crime Bill??
 To Prevent unauthorized acts with respect to information systems and
provide for related offences as well as mechanisms for their investigation,
prosecution, trial and international cooperation with respect thereof and
for matters connected therewith.
Analysis Of Cyber Crime Bill
 After Analysis of cyber crime bill, I have come to conclusion that this bill is
not meant to be implemented. And one of the reason is that the whole
opposition stands against this bill and is not taken in confidence while
passing this bill and also there are many ambiguities present in the bill.
Limitation To Freedom Of Speech
Section 34 States as:
 The Authority shall have the power to remove or block directions for
removal or blocking of access to any information through system if it
considers it necessary.
Problems:
 Freedom of Speech/Expression ? Totally ruined.
 If Someone post something that doesn't suits the government policy or
something that agencies cant digest then it is illegal and you will be sued.
 The Authority shall have the power to remove or block or issue directions
for removal or blocking of access to any information through any
information system if it considers it necessary
Suggestions:
 Section 34 should be re considered, there must be room for freedom of
speech and proper handling of power if something is taken wrong. Direct
punishment without inspection is not worthy anyways.
Legitimate access to information
Section 39:
 Section 39 will permit the Federal Government to extend cooperation to
foreign governments, agencies, and international organizations with
regards to collection, preservation and transference of 24 x 7 network
information and digital data of Pakistani citizens collected in forms of
audio, video, images, text, or any digital format without any permission
from the Court.
Problems:
 No Privacy of Citizens Guaranteed.
 You are not secure anymore. Cheers to that.
 No one will Ask for your permission. Privacy Protection is dead for good.
Suggestions:
 The government should look after citizens privacy and in any case they
permission or order from court must be taken.
Rights to privacy for public Section
34 (2) &(3)
 Section 34 (2) and (3) give the Government broad powers to use
technology, such as deep packet inspection, to monitor online content in
breach of international standards on freedom of expression and privacy.
Problems:
 Government have full control over what you do and what you watch.
 Again User’s Privacy is sacrificed.
Suggestions:
 Section 34 should be rejected in its entirety.
Misuse of authority
 There is a need to curb growing cybercrimes, but at the same time, there is
also a crucial need to check the misuse of this law against innocent people.
Problems:
 Agency don’t care if they found evidence from your sight even if it wasn't
you.
Suggestions:
 Social media users must be protected along with the electronic data and
there should be an effective and transparent mechanism to tackle the
misuse of powers by the investigator
“Usage of vague and complex words”
Sections 14, 15, 16, 17, 22, 23, 27, 28,
29, 30, 31, 32, 33, and 45”
 Mention Above sections have vague, ambiguous and broad scope
which have been drafted loosely leaving too much room for
interpretation and provide for broad punitive measures.
Problems:
 In a country where the rule of law is as such compromised such
legislations will pave the way for rights’ abuse.
 The complex and ambiguous language would also create great
difficulties for the common person using the Internet as there is an
uncertainty of what acts would constitute an offence
Suggestions:
 Redraft the Bill using clear and explicit language, and avoid subjective
terms
Anonymity and Encryption Section 13
& 16
 Mentioned Sections violated the right of commenting on political, religious
and social issues that may be controversial, persons need the comfort of
anonymity and encryption.
Problems:
 Individual have no knowledge what comes under the terms right and
wrong.
 denying access to encryption, data and sources.
Suggestions:
 There must be some room provided for Whistle-blowers , human rights
defenders, and journalists to speak.
Very strict and harsh punishments
Section 3,4,5,6,7,8,9
 According to the Cyber Crime Bill 2016, illegal access to data is punishable
by three months prison term and 50,000 fine
 unauthorized access to sensitive infrastructure, information system or data
can get an accused to be jailed for five years and fined up to Rs
five million.
Suggestions:
 Plenty's are too high and need to be re considered.
Analysis of cyber crime bill 2016

More Related Content

What's hot

Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
Orko Abir
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
gcanavati
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
Kevin Cedeño, CISM, CISA
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
Shahzaib Mahesar
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Cyber crime
Cyber crimeCyber crime
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
Jim Ayson
 
Official secrets act
Official secrets actOfficial secrets act
Cybersex law
Cybersex lawCybersex law
Cybersex law
Ronnel Fernandez
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
SVS College
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
Rabita Rejwana
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
Tearsome Llantada
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
mrbennett2009
 
Internet governance
Internet governanceInternet governance
Internet governance
Ghazala Ajami
 
It act cases
It act casesIt act cases
It act cases
Kiruba Nagini Raju
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
Vishni Ganepola
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillance
marianavigato0
 

What's hot (20)

Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
Pornography act,2012 bangladesh
Pornography act,2012 bangladeshPornography act,2012 bangladesh
Pornography act,2012 bangladesh
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Official secrets act
Official secrets actOfficial secrets act
Official secrets act
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Cyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandanCyer crimes and cyber laws b.v.raghunandan
Cyer crimes and cyber laws b.v.raghunandan
 
Cyber security and prevention in Bangladesh
Cyber security and prevention in BangladeshCyber security and prevention in Bangladesh
Cyber security and prevention in Bangladesh
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Internet governance
Internet governanceInternet governance
Internet governance
 
It act cases
It act casesIt act cases
It act cases
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Computer and network surveillance
Computer and network surveillanceComputer and network surveillance
Computer and network surveillance
 

Similar to Analysis of cyber crime bill 2016

Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
Luca De Biase
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
Roxanne St Ives
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
Social Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfSocial Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdf
Free Law - by De Jure
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
Gabriella Razzano
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
ManuGupta344215
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
archiejones4
 
Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’
Md.Rezaul Hoque Razu
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
FOTIOS ZYGOULIS
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
Zarrar Siddiqui
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
FranciscoJoaoVitug
 
New it rules (presented by abhinav pathak)
New it rules (presented by  abhinav pathak)New it rules (presented by  abhinav pathak)
New it rules (presented by abhinav pathak)
Abhinav Pathak
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
Ernesto Neri
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
EquiGov Institute
 
Internet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case BookletInternet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case Booklet
Rajat Kumar
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
ASHUTOSHKUMARPANDEY40
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
Ayesha Majid
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
CRO Cyber Rights Organization
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
Uc Man
 

Similar to Analysis of cyber crime bill 2016 (20)

Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Social Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdfSocial Media Laws and its Implications.pdf
Social Media Laws and its Implications.pdf
 
The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
 
Ronit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptxRonit Mathur Cyber Security assesment.pptx
Ronit Mathur Cyber Security assesment.pptx
 
online-disinformation-human-rights
online-disinformation-human-rightsonline-disinformation-human-rights
online-disinformation-human-rights
 
Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’Critical Analysis on Sec-57 of ICT Act 2006’’
Critical Analysis on Sec-57 of ICT Act 2006’’
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
New it rules (presented by abhinav pathak)
New it rules (presented by  abhinav pathak)New it rules (presented by  abhinav pathak)
New it rules (presented by abhinav pathak)
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
Internet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case BookletInternet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case Booklet
 
Art_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdfArt_19(1)(a)_IT.pdf
Art_19(1)(a)_IT.pdf
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Internet rights.pdf
Internet rights.pdfInternet rights.pdf
Internet rights.pdf
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 

Recently uploaded

Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
ssuser05e8f3
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
yemqpj
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.
Christina Parmionova
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
ahcitycouncil
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
fundraising4
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
Energy for One World
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
yemqpj
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
Cheong Man Keong
 
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
3woawyyl
 
RFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance CenterRFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance Center
This Is Reno
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
odmqk
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
Christina Parmionova
 
Researching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssssResearching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssss
DanielOliver74
 
China Politics social economic political
China Politics social economic politicalChina Politics social economic political
China Politics social economic political
ajatjamwal123
 
Practical guide for the celebration of World Environment Day on june 5th.
Practical guide for the  celebration of World Environment Day on  june 5th.Practical guide for the  celebration of World Environment Day on  june 5th.
Practical guide for the celebration of World Environment Day on june 5th.
Christina Parmionova
 
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
yemqpj
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
Partito democratico
 

Recently uploaded (20)

Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
Bangladesh studies presentation on Liberation War 1971 Indepence-of-Banglades...
 
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
原版制作(DPU毕业证书)德保罗大学毕业证Offer一模一样
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.Awaken new depths - World Ocean Day 2024, June 8th.
Awaken new depths - World Ocean Day 2024, June 8th.
 
PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)PPT Item # 7 - 231 Encino Avenue (sign. review)
PPT Item # 7 - 231 Encino Avenue (sign. review)
 
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your WillMilton Keynes Hospital Charity - A guide to leaving a gift in your Will
Milton Keynes Hospital Charity - A guide to leaving a gift in your Will
 
IEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- StatisticsIEA World Energy Investment June 2024- Statistics
IEA World Energy Investment June 2024- Statistics
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
在线办理(ISU毕业证书)爱荷华州立大学毕业证学历证书一模一样
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
 
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
快速办理(Bristol毕业证书)布里斯托大学毕业证Offer一模一样
 
RFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance CenterRFP for Reno's Community Assistance Center
RFP for Reno's Community Assistance Center
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
 
World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.World Food Safety Day 2024- Communication-toolkit.
World Food Safety Day 2024- Communication-toolkit.
 
Researching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssssResearching the client.pptxsxssssssssssssssssssssss
Researching the client.pptxsxssssssssssssssssssssss
 
China Politics social economic political
China Politics social economic politicalChina Politics social economic political
China Politics social economic political
 
Practical guide for the celebration of World Environment Day on june 5th.
Practical guide for the  celebration of World Environment Day on  june 5th.Practical guide for the  celebration of World Environment Day on  june 5th.
Practical guide for the celebration of World Environment Day on june 5th.
 
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
快速办理(UVM毕业证书)佛蒙特大学毕业证学位证一模一样
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 

Analysis of cyber crime bill 2016

  • 1. Analysis Of Cyber Crime Bill 2016
  • 2. Why Cyber Crime Bill??  To Prevent unauthorized acts with respect to information systems and provide for related offences as well as mechanisms for their investigation, prosecution, trial and international cooperation with respect thereof and for matters connected therewith.
  • 3. Analysis Of Cyber Crime Bill  After Analysis of cyber crime bill, I have come to conclusion that this bill is not meant to be implemented. And one of the reason is that the whole opposition stands against this bill and is not taken in confidence while passing this bill and also there are many ambiguities present in the bill.
  • 4. Limitation To Freedom Of Speech Section 34 States as:  The Authority shall have the power to remove or block directions for removal or blocking of access to any information through system if it considers it necessary. Problems:  Freedom of Speech/Expression ? Totally ruined.  If Someone post something that doesn't suits the government policy or something that agencies cant digest then it is illegal and you will be sued.  The Authority shall have the power to remove or block or issue directions for removal or blocking of access to any information through any information system if it considers it necessary Suggestions:  Section 34 should be re considered, there must be room for freedom of speech and proper handling of power if something is taken wrong. Direct punishment without inspection is not worthy anyways.
  • 5. Legitimate access to information Section 39:  Section 39 will permit the Federal Government to extend cooperation to foreign governments, agencies, and international organizations with regards to collection, preservation and transference of 24 x 7 network information and digital data of Pakistani citizens collected in forms of audio, video, images, text, or any digital format without any permission from the Court. Problems:  No Privacy of Citizens Guaranteed.  You are not secure anymore. Cheers to that.  No one will Ask for your permission. Privacy Protection is dead for good. Suggestions:  The government should look after citizens privacy and in any case they permission or order from court must be taken.
  • 6. Rights to privacy for public Section 34 (2) &(3)  Section 34 (2) and (3) give the Government broad powers to use technology, such as deep packet inspection, to monitor online content in breach of international standards on freedom of expression and privacy. Problems:  Government have full control over what you do and what you watch.  Again User’s Privacy is sacrificed. Suggestions:  Section 34 should be rejected in its entirety.
  • 7. Misuse of authority  There is a need to curb growing cybercrimes, but at the same time, there is also a crucial need to check the misuse of this law against innocent people. Problems:  Agency don’t care if they found evidence from your sight even if it wasn't you. Suggestions:  Social media users must be protected along with the electronic data and there should be an effective and transparent mechanism to tackle the misuse of powers by the investigator
  • 8. “Usage of vague and complex words” Sections 14, 15, 16, 17, 22, 23, 27, 28, 29, 30, 31, 32, 33, and 45”  Mention Above sections have vague, ambiguous and broad scope which have been drafted loosely leaving too much room for interpretation and provide for broad punitive measures. Problems:  In a country where the rule of law is as such compromised such legislations will pave the way for rights’ abuse.  The complex and ambiguous language would also create great difficulties for the common person using the Internet as there is an uncertainty of what acts would constitute an offence Suggestions:  Redraft the Bill using clear and explicit language, and avoid subjective terms
  • 9. Anonymity and Encryption Section 13 & 16  Mentioned Sections violated the right of commenting on political, religious and social issues that may be controversial, persons need the comfort of anonymity and encryption. Problems:  Individual have no knowledge what comes under the terms right and wrong.  denying access to encryption, data and sources. Suggestions:  There must be some room provided for Whistle-blowers , human rights defenders, and journalists to speak.
  • 10. Very strict and harsh punishments Section 3,4,5,6,7,8,9  According to the Cyber Crime Bill 2016, illegal access to data is punishable by three months prison term and 50,000 fine  unauthorized access to sensitive infrastructure, information system or data can get an accused to be jailed for five years and fined up to Rs five million. Suggestions:  Plenty's are too high and need to be re considered.