SlideShare a Scribd company logo
Lahore School of economics
Cyber Crime Laws in
Pakistan
A Brief Overview
Ayesha Majid
Iza Haider
Kinza Babr
Mahnoor Saad
2-22-2018
0 | P a g e
Contents
Cyber Crime ................................................................................................................................... 2
Cyber Laws..................................................................................................................................... 2
Cyber Laws in the World ............................................................................................................ 2
Cyber Laws in Pakistan .................................................................................................................. 3
Electronic Transaction Ordinance (ETO) 2002.............................................................................. 3
Pre-ETO 2002 Scenario .............................................................................................................. 3
Post ETO 2002 ............................................................................................................................ 3
Sections of ETO 2002 ................................................................................................................. 4
Electronic/Cyber Crime Bill 2007.................................................................................................. 5
Prevention of Electronic Crimes Act (PECA) 2016....................................................................... 6
Punishments for Cyber Crime under Judicial Precedence.............................................................. 7
1 | P a g e
Cyber Crime
Cybercrime is an act in which computers or networks are a tool, a target, or a place of
criminal activity. Cybercrime is also stated as any use of a computer as an instrument to
further illegal ends, such as
• Committing fraud
• Stealing identities
• Violating privacy
It is also include traditional crimes in which computers or networks are used to enable the
illicit activity. As the computer has become central to commerce, entertainment, and
government. Cybercrime has grown in importance.
• E-mail account of a Federal Minister is hacked.
• Credit cards frauds reach to an alarming level.
• Visiting CEOs of Multinational Companies gets threatening E-mails.
• Financial institutions are the favourite targets of Cyber criminals, mostly effecting the
technological progress in the area of e –Commerce.
Cyber Crimes Reported in Pakistan
A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006.
Cyber Laws
The legal issues related to use of communications technology, particularly "cyberspace", i.e. the
Internet. It is an intersection of many legal fields, like:
• Intellectual property
• Privacy
Cyber laws is an attempt to apply laws designed for the physical world to human activity on
the Internet.
Cyber Laws in the World
• Electronic Commerce Act (Ireland)
• Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore)
2 | P a g e
• Electronic Transactions Ordinance (Hong Kong)
• Information Technology Act (India)
• Information Communication Technology Act Draft (Bangladesh)
Cyber Laws in Pakistan
There are different laws, promulgated in Pakistan. These laws not only deal with crime of
Internet. These deal with all dimensions related to computer & networks. Three of them
are most known. They are:
• Electronic Transaction Ordinance (ETO) 2002
• Electronic / Cyber Crime Bill 2007
• Prevention of Electronic Crimes Act (PECA) 2016
Electronic Transaction Ordinance
(ETO) 2002
The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation
created by national lawmakers. A first step and a solid foundation for legal sanctity and
protection for Pakistani e-Commerce locally and globally. The ordinance laid the foundation for
comprehensive Legal Infrastructure. It is heavily taken from foreign law related to cybercrime.
Pre-ETO 2002 Scenario
• No recognition of electronic documentation
• No recognition of electronic records
• No recognition of evidential basis of documents/records
• Failure to authenticate or identify digital or electronic signatures or forms of authentication
• No online transaction could be legally binding
• Electronic Data & Forensic Evidence not covered. No Rules
Post ETO 2002
• Electronic Documentation & Records recognized
• Electronic & Digital forms of authentication & identification given legal sanctity
3 | P a g e
• Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
Sections of ETO 2002
There are 43 sections in this ordinance. It deals with following 8 main areas relating to e-
Commerce.
1. Recognition of Electronic Documents
2. Electronic Communications
3. Digital Signature regime and its evidential consequences
4. Web Site & Digital Signatures Certification Providers
5. Stamp Duty
6. Attestation, notarization, certified copies
7. Jurisdiction
8. Offences
Important Sections of the act are:
Sec 36. Violation of privacy information
• gains or attempts to gain access
• to any information system with or without intent
• to acquire the information
• Gain Knowledge
• Imprisonment 7 years
• Fine Rs. 1 million
• alter, modify, delete, remove, generate, transmit or store information
• to impair the operation of,
• or prevent or hinder access to, information
• knowingly not authorized
• Imprisonment 7 years
• Fine Rs. 1 million
Sec 38. Offences to be non-bail able, compoundable and cognizable
4 | P a g e
• All offences under this Ordinance shall be non-bail able, compoundable and
cognizable. Sec 39. Prosecution and trial of offences.
• No Court inferior to the Court of Sessions shall try any offence under this Ordinance.
Electronic/Cyber Crime Bill 2007
Prevention of Electronic Crimes Ordinance, 2007 was promulgated by the President of Pakistan
on the 31st December 2007 and approved by federal cabinet on 17 January 2007. The Prevention
of Electronic Crime Ordinance (PECO) 2007 was presented in the National Assembly under
article 89(2) of the Constitution. The bill deals with the electronic crimes included:
Cyber terrorism
Data damage
Electronic fraud
Electronic forgery
Unauthorized access to code
Cyber stalking
Cyber Spamming/spoofing
It offers penalties ranging from six months imprisonment to capital punishment for 17 types of
cybercrimes. It will apply to every person who commits an offence, irrespective of his
nationality or citizenship. It gives exclusive powers to the Federal Investigation Agency (FIA)
to investigate and charge cases against such crimes. The bill suggests maximum punishment of
death or life imprisonment for those booked under cybercrimes or involved in sensitive
electronic systems offences. The Minister for Information Technology Awais Ahmad Khan
Leghari stated for the bill: “the e-crime law would require the internet companies maintain their
traffic data for at least six months to enable the agencies to investigate cases involving data
stored by them.” He said the law would enable the government to seek extradition of foreign
nationals through Interpol for their involvement in criminal activities punishable under the law.
5 | P a g e
Prevention of Electronic Crimes Act
(PECA) 2016
National Assembly enacted the PECA to provide a comprehensive legal framework to define
various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in
relation to electronic crimes. Supports Cyber Crime Bill 2007. The legislation established new
offences including
illegal access of data (hacking)
DOS and DDOS attacks
electronic forgery and electronic fraud
cyber terrorism
The legislation provides new investigative powers which were unavailable before such as
search and seizure of digital forensic evidence using technological means, production orders for
electronic evidence, electronic evidence preservation order, partial disclosure of traffic data,
and real time collection of data under certain circumstances and other enabling power which are
necessary to effectively investigate cybercrime cases. On April 13, 2016 the National
Assembly's
Standing Committee on Information Technology and Telecommunication approved
the Prevention of Electronic Crimes Bill (PECB).
1. Up to three years imprisonment, Rs1 million fine or both for unauthorised access to
critical infrastructure information system or data
2. The government may cooperate with any foreign government, foreign or international
agency, organisation or 24x7 network for investigation or proceedings relating to an
offence or for collecting evidence
3. The government may forward any information to any foreign government, 24x7
network, foreign or international agency or organisation any information obtained from
its own investigation if the disclosure assists their investigations
4. Up to seven years, Rs10 million fine or both for interference with critical
infrastructure information system or data with dishonest intention
6 | P a g e
5. Up to seven years, Rs10 million fine or both for glorification of an offence relating to
terrorism, any person convicted of a crime relating to terrorism or proscribed individuals
or groups. Glorification is explained as “depiction of any form of praise or celebration in a
desirable manner”
6. Up to six months imprisonment, Rs50 thousand or both for producing, making, generating,
adapting, exporting, supplying, offering to supply or importing a device for use in an offence
7. Up to three years imprisonment, Rs5 million fine or both for obtaining, selling, possessing,
transmitting or using another person’s identity information without authorisation
8. If your identity information is used without authorisation, you may apply to the
authorities to secure, destroy or prevent transmission of your information
Conclusion:
In its present form PECB will criminalise conduct that shouldn’t be criminalised, equip
investigation agencies and PTA with overbroad and unguided powers that will be susceptible
to abuse, and chill free speech without any corresponding augmentation of the right to privacy
or dignity.
Punishments for Cyber Crime
under Judicial Precedence
Under law there are defined punishment for the offence. Every respective offence has
its distinctive punishment which can be imprisonment or fine.
Data Damage:
Whoever with intent to illegal gain or cause harm to the public or any person, damages any
data, shall come under this section.
Punishment
3 years imprisonment
Maximum damages of 3 lac rupees
Electronic fraud:
People for illegal gain get in the way or use any data, electronic system or device or with
intent to deceive any person, which act or omissions is likely to cause damage or harm.
7 | P a g e
Punishment
7 years imprisonment
Maximum damages of 7 Lac
Electronic Forgery:
Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause
harm or to commit fraud by any input, alteration, or suppression of data, resulting in
unauthentic data that it be considered or acted upon for legal purposes as if it were authentic,
regardless of the fact that the data is directly readable and intelligible or not.
Punishment
7 years imprisonment
Maximum damages of 7 Lac
Malicious code:
Whoever wilfully writes, offers, makes available, distributes or transmits malicious code
through an electronic system or device, with intent to cause harm to any electronic system or
resulting in the theft or loss of data commits the offence of malicious code.
Punishment
5 years imprisonment
Maximum damages of 5 Lac
Cyber stalking:
Whoever with intent to harass any person uses computer, computer network, internet, or any
other similar means of communication to communicate obscene, vulgar, profane, lewd,
lascivious, or indecent language, picture or image? Make any suggestion or proposal of an
obscene nature. Threaten any illegal or immoral act, take or distribute pictures or photographs of
any person without his consent or knowledge commits the offence of cyber stalking.
Punishment
3 Years of imprisonment
Maximum damages of 3 Lac
Spamming:
Whoever transmits harmful, fraudulent, misleading, illegal or unsolicited electronic messages in
bulk to any person without the express permission of the recipient, involves in falsified online
8 | P a g e
user account registration or falsified domain name registration for commercial purpose commits
the offence of spamming.
Punishment:
6 month of imprisonment
Maximum damages of 50,000/Cyber Crime Bill 2007
Spoofing:
Whoever establishes a website, or sends an electronic message with a counterfeit source
intended to be believed by the recipient or visitor or its electronic system to be an authentic
source with intent to gain unauthorized access or obtain valuable information. Later, Information
can be used for any lawful purposes commits the offence of spoofing. Punishment:
3 Years of imprisonment
Maximum damages of 3 Lac
Cyber terrorism:
Any person, group or organization who, with terroristic intent utilizes, accesses or causes to be
accessed a computer or computer network or electronic system or device or by any available
means, knowingly engages in or attempts to engage in a terroristic act commits the offence of
cyber terrorism.
Punishment:
Whoever commits the offence of cyber terrorism and causes death of any person shall be
punished with death
Or imprisonment for life, and with fine
Otherwise he shall be punishable with imprisonment of ten years or with fine ten million
rupees
9 | P a g e

More Related Content

What's hot

CYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTAN
shabanakousershabana
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
Shahzaib Mahesar
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
FM Consulting International
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anees Raza
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
Uc Man
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Criminal defamation
Criminal defamationCriminal defamation
Criminal defamation
Altacit Global
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
Sorav Jain
 
Cyber law
Cyber lawCyber law

What's hot (20)

CYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTAN
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Criminal defamation
Criminal defamationCriminal defamation
Criminal defamation
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Cyber crime laws in Pakistan

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
Shakeel Ahmed
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
Gautam GR
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
TheMuslimLady
 
Cyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxCyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptx
MohaiUDin
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
utkarshjani
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Jahid Khan Rahat
 
New criminal laws— Future of criminal justice system in India
New criminal laws— Future of criminal justice system in IndiaNew criminal laws— Future of criminal justice system in India
New criminal laws— Future of criminal justice system in India
aakash malhotra
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Information technology act
Information technology actInformation technology act
Information technology act
bahubali1611
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public
PrashantKanade5
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Ashish Karan
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 

Similar to Cyber crime laws in Pakistan (20)

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Cyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxCyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptx
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
New criminal laws— Future of criminal justice system in India
New criminal laws— Future of criminal justice system in IndiaNew criminal laws— Future of criminal justice system in India
New criminal laws— Future of criminal justice system in India
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 

More from Ayesha Majid

Lessons from 2000s
Lessons from 2000sLessons from 2000s
Lessons from 2000s
Ayesha Majid
 
Sustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over RivalsSustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over Rivals
Ayesha Majid
 
Cpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistanCpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistan
Ayesha Majid
 
Infrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistanInfrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistan
Ayesha Majid
 
An overview of Mercantile Law in Pakistan
An overview of Mercantile Law in PakistanAn overview of Mercantile Law in Pakistan
An overview of Mercantile Law in Pakistan
Ayesha Majid
 
Microfinance service in pakistan over the decade
Microfinance service in pakistan over the decadeMicrofinance service in pakistan over the decade
Microfinance service in pakistan over the decade
Ayesha Majid
 
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Ayesha Majid
 
Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy
Ayesha Majid
 
Phillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain AnalysisPhillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain Analysis
Ayesha Majid
 
Apple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply ChainApple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply Chain
Ayesha Majid
 
Pakistan's supply chain resileince
Pakistan's supply chain resileincePakistan's supply chain resileince
Pakistan's supply chain resileince
Ayesha Majid
 
Blue Economy of Pakistan
Blue Economy of PakistanBlue Economy of Pakistan
Blue Economy of Pakistan
Ayesha Majid
 
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Ayesha Majid
 
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Ayesha Majid
 
Corn Sillage
Corn SillageCorn Sillage
Corn Sillage
Ayesha Majid
 
Romantic Comedy in Netflix
Romantic Comedy in NetflixRomantic Comedy in Netflix
Romantic Comedy in Netflix
Ayesha Majid
 
The British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of PakistanisThe British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of Pakistanis
Ayesha Majid
 
Reko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and DifferencesReko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and Differences
Ayesha Majid
 
Liquidity Risk as under Basel III
Liquidity Risk as under Basel IIILiquidity Risk as under Basel III
Liquidity Risk as under Basel III
Ayesha Majid
 
An Overview of Corporate law in Pakistan
An Overview of Corporate law in PakistanAn Overview of Corporate law in Pakistan
An Overview of Corporate law in Pakistan
Ayesha Majid
 

More from Ayesha Majid (20)

Lessons from 2000s
Lessons from 2000sLessons from 2000s
Lessons from 2000s
 
Sustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over RivalsSustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over Rivals
 
Cpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistanCpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistan
 
Infrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistanInfrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistan
 
An overview of Mercantile Law in Pakistan
An overview of Mercantile Law in PakistanAn overview of Mercantile Law in Pakistan
An overview of Mercantile Law in Pakistan
 
Microfinance service in pakistan over the decade
Microfinance service in pakistan over the decadeMicrofinance service in pakistan over the decade
Microfinance service in pakistan over the decade
 
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
 
Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy
 
Phillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain AnalysisPhillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain Analysis
 
Apple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply ChainApple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply Chain
 
Pakistan's supply chain resileince
Pakistan's supply chain resileincePakistan's supply chain resileince
Pakistan's supply chain resileince
 
Blue Economy of Pakistan
Blue Economy of PakistanBlue Economy of Pakistan
Blue Economy of Pakistan
 
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
 
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
 
Corn Sillage
Corn SillageCorn Sillage
Corn Sillage
 
Romantic Comedy in Netflix
Romantic Comedy in NetflixRomantic Comedy in Netflix
Romantic Comedy in Netflix
 
The British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of PakistanisThe British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of Pakistanis
 
Reko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and DifferencesReko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and Differences
 
Liquidity Risk as under Basel III
Liquidity Risk as under Basel IIILiquidity Risk as under Basel III
Liquidity Risk as under Basel III
 
An Overview of Corporate law in Pakistan
An Overview of Corporate law in PakistanAn Overview of Corporate law in Pakistan
An Overview of Corporate law in Pakistan
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Cyber crime laws in Pakistan

  • 1. Lahore School of economics Cyber Crime Laws in Pakistan A Brief Overview Ayesha Majid Iza Haider Kinza Babr Mahnoor Saad 2-22-2018 0 | P a g e
  • 2. Contents Cyber Crime ................................................................................................................................... 2 Cyber Laws..................................................................................................................................... 2 Cyber Laws in the World ............................................................................................................ 2 Cyber Laws in Pakistan .................................................................................................................. 3 Electronic Transaction Ordinance (ETO) 2002.............................................................................. 3 Pre-ETO 2002 Scenario .............................................................................................................. 3 Post ETO 2002 ............................................................................................................................ 3 Sections of ETO 2002 ................................................................................................................. 4 Electronic/Cyber Crime Bill 2007.................................................................................................. 5 Prevention of Electronic Crimes Act (PECA) 2016....................................................................... 6 Punishments for Cyber Crime under Judicial Precedence.............................................................. 7 1 | P a g e
  • 3. Cyber Crime Cybercrime is an act in which computers or networks are a tool, a target, or a place of criminal activity. Cybercrime is also stated as any use of a computer as an instrument to further illegal ends, such as • Committing fraud • Stealing identities • Violating privacy It is also include traditional crimes in which computers or networks are used to enable the illicit activity. As the computer has become central to commerce, entertainment, and government. Cybercrime has grown in importance. • E-mail account of a Federal Minister is hacked. • Credit cards frauds reach to an alarming level. • Visiting CEOs of Multinational Companies gets threatening E-mails. • Financial institutions are the favourite targets of Cyber criminals, mostly effecting the technological progress in the area of e –Commerce. Cyber Crimes Reported in Pakistan A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006. Cyber Laws The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is an intersection of many legal fields, like: • Intellectual property • Privacy Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet. Cyber Laws in the World • Electronic Commerce Act (Ireland) • Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore) 2 | P a g e
  • 4. • Electronic Transactions Ordinance (Hong Kong) • Information Technology Act (India) • Information Communication Technology Act Draft (Bangladesh) Cyber Laws in Pakistan There are different laws, promulgated in Pakistan. These laws not only deal with crime of Internet. These deal with all dimensions related to computer & networks. Three of them are most known. They are: • Electronic Transaction Ordinance (ETO) 2002 • Electronic / Cyber Crime Bill 2007 • Prevention of Electronic Crimes Act (PECA) 2016 Electronic Transaction Ordinance (ETO) 2002 The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers. A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally. The ordinance laid the foundation for comprehensive Legal Infrastructure. It is heavily taken from foreign law related to cybercrime. Pre-ETO 2002 Scenario • No recognition of electronic documentation • No recognition of electronic records • No recognition of evidential basis of documents/records • Failure to authenticate or identify digital or electronic signatures or forms of authentication • No online transaction could be legally binding • Electronic Data & Forensic Evidence not covered. No Rules Post ETO 2002 • Electronic Documentation & Records recognized • Electronic & Digital forms of authentication & identification given legal sanctity 3 | P a g e
  • 5. • Messages through email, fax, mobile phones, Plastic Cards, Online recognized. Sections of ETO 2002 There are 43 sections in this ordinance. It deals with following 8 main areas relating to e- Commerce. 1. Recognition of Electronic Documents 2. Electronic Communications 3. Digital Signature regime and its evidential consequences 4. Web Site & Digital Signatures Certification Providers 5. Stamp Duty 6. Attestation, notarization, certified copies 7. Jurisdiction 8. Offences Important Sections of the act are: Sec 36. Violation of privacy information • gains or attempts to gain access • to any information system with or without intent • to acquire the information • Gain Knowledge • Imprisonment 7 years • Fine Rs. 1 million • alter, modify, delete, remove, generate, transmit or store information • to impair the operation of, • or prevent or hinder access to, information • knowingly not authorized • Imprisonment 7 years • Fine Rs. 1 million Sec 38. Offences to be non-bail able, compoundable and cognizable 4 | P a g e
  • 6. • All offences under this Ordinance shall be non-bail able, compoundable and cognizable. Sec 39. Prosecution and trial of offences. • No Court inferior to the Court of Sessions shall try any offence under this Ordinance. Electronic/Cyber Crime Bill 2007 Prevention of Electronic Crimes Ordinance, 2007 was promulgated by the President of Pakistan on the 31st December 2007 and approved by federal cabinet on 17 January 2007. The Prevention of Electronic Crime Ordinance (PECO) 2007 was presented in the National Assembly under article 89(2) of the Constitution. The bill deals with the electronic crimes included: Cyber terrorism Data damage Electronic fraud Electronic forgery Unauthorized access to code Cyber stalking Cyber Spamming/spoofing It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cybercrimes. It will apply to every person who commits an offence, irrespective of his nationality or citizenship. It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes. The bill suggests maximum punishment of death or life imprisonment for those booked under cybercrimes or involved in sensitive electronic systems offences. The Minister for Information Technology Awais Ahmad Khan Leghari stated for the bill: “the e-crime law would require the internet companies maintain their traffic data for at least six months to enable the agencies to investigate cases involving data stored by them.” He said the law would enable the government to seek extradition of foreign nationals through Interpol for their involvement in criminal activities punishable under the law. 5 | P a g e
  • 7. Prevention of Electronic Crimes Act (PECA) 2016 National Assembly enacted the PECA to provide a comprehensive legal framework to define various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in relation to electronic crimes. Supports Cyber Crime Bill 2007. The legislation established new offences including illegal access of data (hacking) DOS and DDOS attacks electronic forgery and electronic fraud cyber terrorism The legislation provides new investigative powers which were unavailable before such as search and seizure of digital forensic evidence using technological means, production orders for electronic evidence, electronic evidence preservation order, partial disclosure of traffic data, and real time collection of data under certain circumstances and other enabling power which are necessary to effectively investigate cybercrime cases. On April 13, 2016 the National Assembly's Standing Committee on Information Technology and Telecommunication approved the Prevention of Electronic Crimes Bill (PECB). 1. Up to three years imprisonment, Rs1 million fine or both for unauthorised access to critical infrastructure information system or data 2. The government may cooperate with any foreign government, foreign or international agency, organisation or 24x7 network for investigation or proceedings relating to an offence or for collecting evidence 3. The government may forward any information to any foreign government, 24x7 network, foreign or international agency or organisation any information obtained from its own investigation if the disclosure assists their investigations 4. Up to seven years, Rs10 million fine or both for interference with critical infrastructure information system or data with dishonest intention 6 | P a g e
  • 8. 5. Up to seven years, Rs10 million fine or both for glorification of an offence relating to terrorism, any person convicted of a crime relating to terrorism or proscribed individuals or groups. Glorification is explained as “depiction of any form of praise or celebration in a desirable manner” 6. Up to six months imprisonment, Rs50 thousand or both for producing, making, generating, adapting, exporting, supplying, offering to supply or importing a device for use in an offence 7. Up to three years imprisonment, Rs5 million fine or both for obtaining, selling, possessing, transmitting or using another person’s identity information without authorisation 8. If your identity information is used without authorisation, you may apply to the authorities to secure, destroy or prevent transmission of your information Conclusion: In its present form PECB will criminalise conduct that shouldn’t be criminalised, equip investigation agencies and PTA with overbroad and unguided powers that will be susceptible to abuse, and chill free speech without any corresponding augmentation of the right to privacy or dignity. Punishments for Cyber Crime under Judicial Precedence Under law there are defined punishment for the offence. Every respective offence has its distinctive punishment which can be imprisonment or fine. Data Damage: Whoever with intent to illegal gain or cause harm to the public or any person, damages any data, shall come under this section. Punishment 3 years imprisonment Maximum damages of 3 lac rupees Electronic fraud: People for illegal gain get in the way or use any data, electronic system or device or with intent to deceive any person, which act or omissions is likely to cause damage or harm. 7 | P a g e
  • 9. Punishment 7 years imprisonment Maximum damages of 7 Lac Electronic Forgery: Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in unauthentic data that it be considered or acted upon for legal purposes as if it were authentic, regardless of the fact that the data is directly readable and intelligible or not. Punishment 7 years imprisonment Maximum damages of 7 Lac Malicious code: Whoever wilfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or device, with intent to cause harm to any electronic system or resulting in the theft or loss of data commits the offence of malicious code. Punishment 5 years imprisonment Maximum damages of 5 Lac Cyber stalking: Whoever with intent to harass any person uses computer, computer network, internet, or any other similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, picture or image? Make any suggestion or proposal of an obscene nature. Threaten any illegal or immoral act, take or distribute pictures or photographs of any person without his consent or knowledge commits the offence of cyber stalking. Punishment 3 Years of imprisonment Maximum damages of 3 Lac Spamming: Whoever transmits harmful, fraudulent, misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient, involves in falsified online 8 | P a g e
  • 10. user account registration or falsified domain name registration for commercial purpose commits the offence of spamming. Punishment: 6 month of imprisonment Maximum damages of 50,000/Cyber Crime Bill 2007 Spoofing: Whoever establishes a website, or sends an electronic message with a counterfeit source intended to be believed by the recipient or visitor or its electronic system to be an authentic source with intent to gain unauthorized access or obtain valuable information. Later, Information can be used for any lawful purposes commits the offence of spoofing. Punishment: 3 Years of imprisonment Maximum damages of 3 Lac Cyber terrorism: Any person, group or organization who, with terroristic intent utilizes, accesses or causes to be accessed a computer or computer network or electronic system or device or by any available means, knowingly engages in or attempts to engage in a terroristic act commits the offence of cyber terrorism. Punishment: Whoever commits the offence of cyber terrorism and causes death of any person shall be punished with death Or imprisonment for life, and with fine Otherwise he shall be punishable with imprisonment of ten years or with fine ten million rupees 9 | P a g e