The document summarizes cyber crime laws in Pakistan. It outlines several key laws related to cyber crimes, electronic transactions, telecommunications, and electronic fund transfers. The primary law is the Prevention of Electronic Crimes Ordinance of 2007, which defines various cyber crimes and corresponding penalties. The laws aim to address online criminal activities and regulate electronic transactions, telecommunications systems, and payment systems in Pakistan.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
This is a PPT of Mobile phone crimes in cyber crimes under Information Technology Act, 2000. This will help students to understand the cyber crimes or mobile phone crimes.
Legislations enacted for Empowerment of Women and the statistics relating to crimes against women for creating awareness among public including students, professional, academicians with a view to recognize, secure and safeguard the rights and interests of women by all and to cherish the noble ideals incorporated in Indian Constitution and to establish egalitarian society.
The Prevention of Electronic Crimes Act 2016 being new cyber crimes law in Pakistan provide a comprehensive mechanism to prevent and apprehend the cyber crimes.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
This is a PPT of Mobile phone crimes in cyber crimes under Information Technology Act, 2000. This will help students to understand the cyber crimes or mobile phone crimes.
Legislations enacted for Empowerment of Women and the statistics relating to crimes against women for creating awareness among public including students, professional, academicians with a view to recognize, secure and safeguard the rights and interests of women by all and to cherish the noble ideals incorporated in Indian Constitution and to establish egalitarian society.
The Prevention of Electronic Crimes Act 2016 being new cyber crimes law in Pakistan provide a comprehensive mechanism to prevent and apprehend the cyber crimes.
Regulation in the place of digital and mobile platformShamseena Zubair
Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Also the numbers of users are increasing rapidly. India, unlike the oppressive regimes in China and Iran, does not closely monitor or censor Internet activity. Government of India promoting new technologies same time it’s also protecting from the new technological problems by its laws and regulations.
In the light of the rapid technological developments in our world , it has become necessary for states to keep pace with the technological revolution in order for them to become modern and advanced countries, or, at least , to be on the road to become so, by investing in modern technologies of communication of information, and through the development and investment in favor of public services.
There is no doubt that the tremendous revolution that took place in the world of communications has led to a change in the means and methods of business transactions and expressions of the will for what is called now “Electronic Data Interchange”. In lieu of paper documents seeking the legislation of modern developments and keeping up with the technological developments of the countries, Jordanian legislators took the lead among their Arab counterparts and issued the Interim Electronic Transactions Act No. 85 for the year 2011 on 11/12/2001. This legislation comprised of the first Jordanian law in the field of information technology , which was the second Arab law in the field of e-commerce after the Tunisian law making room for other Arab countries, out of which was Dubai which enacted the Act on electronic exchanges and Bahrain which passed the Bahraini law of e-commerce.
The Jordanian legislature came up with this law to put a legal framework that conforms with the international legislative framework in order to regulate the electronic transactions and to recognize all means of electronic data and electronic signatures in terms of their validity or invalidity. Moreover, the objective was the establishment of legal obligations on one side and the recognition electronic records on the other side.
The Electronic Transactions Act allowed the establishment of authorities of authentication and electronic signatures for giving evidence in a given argument.
Information technology act (SANDEEP HARISH B).pptxsandeepharish2
In this power point I clearly explain about the information technology act, uses of information technology, what is digital signature and how the information technology act going to punish the cybercriminals? And the different kinds of punishment also explain under the power point. And I hope it will every helpful to you people to learn about information technology.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
Second Amandement to the Law No. 11/2008: Streghtening Legal Protection and C...AHRP Law Firm
In 2022, based on the data of the Central Bureau of Statistics, 66.48% of the Indonesian citizens have accessed internet. This number have increased by 4.38% from the number in 2021. Such rise of the internet utilization shows that electronic data and information has became the basic need in Indonesia.
At the same time, technology has been developing progressively worldwide. Transboundary transactions are inevitable. Moreover, data and information being accessible to any person regardless of his age. Therefore, the Government of Indonesia issued the Second Amendment of Law No. 11 of 2008 on Electronic Information and Transaction on January 2nd 2024 which one of the objectives is to provide clearer regulatory framework on the distribution of electronic data and information. Find out more our insights about this topic in our Legal Brief Publication.
MPLS VPN is a family of methods for using multiprotocol label switching (MPLS) to create virtual private networks (VPNs). MPLS VPN is a flexible method to transport and route several types of network traffic using an MPLS backbone.
The field of artificial intelligence (AI) has witnessed tremendous growth in recent years with the advent of Deep Neural Networks (DNNs) that surpass humans in a variety of cognitive tasks.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
2. A Brief Round Up of Cyber Crime Law In Pakistan
• Cyber crime is a crime in which criminal activities are carried out by means of
computers or the internet.
• Cyber crime has been talked about a lot ever since the law was passed by
Parliament on September 21, 2016.
• The law on cyber crime is a relatively new one in the Pakistani legal system and
most of it has been derived from laws being practiced in other countries.
• Since cyber crime is different from street crime, the laws and policies drafted by
law enforcement agencies, precautions taken by citizens, especially young girls
and boys (such as not disclosing passwords, emails or barcodes with personal
information, or opening suspicious links, etc.), and educational and awareness
campaigns on cyber crime must also be synchronized and updated accordingly to
combat the causes of this curse.
4. Prevention of Electronic Crimes Ordinance, 2007
OFFENCES IMPRISONMENT FINE
Criminal access up-to 2 years Rs. 100000
Criminal data access up-to 3 years undefined
Data damage up-to 3 years undefined
System damage up-to 3 years undefined
Electronic fraud up-to 7 years undefined
Electronic forgery up-to 7 years undefined
Misuse of encryption up-to 5 years undefined
Malicious code up-to 5 years undefined
Cyber Stalking 7 to 10 years Rs. 100000
Cyber terrorism 10 years to death or imprisonment for life Rs. 10 million
Spamming up-to 3 months undefined
Spoofing up-to 3 years undefined
5. Electronic Transactions Ordinance, 2002
1. The law states that no document, record, information communication or
transaction will be denied legal recognition, admissibility, validity, proof or
enforceability on the ground that it is in electronic form and has not been attested
by any witness.
2. The law also provides legal recognition to electronic signatures. It says that “the
requirement under any law for affixation of signatures shall be deemed satisfied
where electronic signatures or advanced electronic signatures are applied.”
3. The law provides for the establishment of an electronic certification accreditation
council within 60 days of the promulgation of the ordinance.
4. No electronic document would require attestation and notarization for a period of
two years from the date of commencement of this ordinance or the time
appropriate authority devised and implement measures for attestation and
notarization of electronic documents, which is later.
6. Pakistan Telecommunication (Re-Organization) Act, 1996
• Telecommunication (Re-Organization) Act no XVII was promulgated in 1996 that
aimed to reorganize the telecom sector of Pakistan.
• Under Telecom Reorganization Act 1996, Pakistan Telecommunication Authority
(PTA) was established in January 1997 to regulate the establishment, operation
and maintenance of telecommunication systems, and the provision of telecom
services in Pakistan.
• The Authority shall exercise all powers-grant and renew licenses for any
telecommunication system, establish or modify accounting procedure for licenses,
carry out inspections of telecommunication equipment, provide guidelines for, and
determine, the terms of inter-connection arrangements, develop national
telecommunication numbering plans and prescribe standards for
telecommunication equipment-as shall enable it to effectively perform its functions.
7. Wireless Telegraphy Act, 1933
• The main objective of the Indian Wireless Telegraphy Act, 1933 is ‘to regulate the
possession of wireless telegraphy apparatus’. One of the major sources of
revenue for the Indian State Broadcasting Service was revenue from the license
fee from working of wireless apparatus under the Indian Telegraph Act, 1885.
• The extent of the Act, definitions and key concepts are covered under sections 1
and 2 of the Act. Section 3 prohibits any person from possessing a ‘wireless
telegraphy apparatus’ without a license.
• Presently the Act is used to prosecute cases, related to illegal possession and
transmission via satellite phones. Any person who wishes to use satellite phones
for communication purposes has to get license from the Department of
Telecommunications. Recently foreign tourists were charged under this Act for
illegal possession of satellite phones.
8. Telegraph Act, 1885
• The main object of the Telegraph Act was to give power to the Government to
install telegraph lines on private as well as public property.
• The Act contains six parts.
• Part I deals with definitions of key words used in the Telegraph Act.
• Part II grants government the exclusive privilege with respect to telegraph and gives power
to the issue license to private operators to offer telegraph services.
• Part IIA (inserted in 2003) deals with setting up of the Universal Service Obligation Fund
(USOF) for the purpose of meeting universal service obligation.
• Part III deals with procedures and guidelines to be followed; for installing and maintaining
communication equipment, setting up communication devices in private property and the
procedure for resolution of any dispute which may arise between the service provider and
the owner of the private property.
• Part IV lays down the offences and penalties with respect to unauthorized use of
communication or telegraph services.
• Part V deals with other supplementary provisions.
9. Federal Investigation Agency Act, 1974
• Federal Investigation Agency was established under FIA Act, 1974 with objective
to deal with Smuggling, Narcotics, Currency offences, Enforcement of Laws
relating to Foreigners, Immigration & Passports and offences having inter-
provincial ramifications.
1. The members of the Agency have throughout Pakistan such powers, including
search, arrest of persons and seizure of property.
2. Any member of the Agency not below the rank of a Sub-Inspector may, for the
purposes of any inquiry or investigation under this Act, exercise any of the
powers of an officer-in-charge of a Police Station in any area in which he is for
the time being and, when so exercising such powers, shall be deemed to be an
officer-in-charge of a Police Station discharging his functions as such within the
limits of his station.
10. Federal Investigation Agency Act, 1974
3. Any member of the Agency not below the rank of Sub-Inspector authorized by
the Director General may arrest without warrant any person who has committed,
or against whom a reasonable suspicion exists that he has committed, any of the
offences referred Act.
4. A member of the Agency conducting an investigation, any property which is the
subject-matter is likely to be removed, transferred or otherwise disposed of
before an order of the appropriate authority for its seizure is obtained, such
member may, by order in writing, direct the owner or any person who is, for the
time being, possession thereof not to remove, transfer or otherwise dispose of
such property in any manner except with the previous permission of that member
and such order shall be subject to any order made by the Court having
jurisdiction in the matter.
5. Any contravention of an order made under sub-section (5) shall be punishable
with rigorous imprisonment for a term which may be extend to one year, or with
fine, or with both.
11. Payments & Electronic Fund Transfers Act, 2007
• The was been proposed to ensure safety, integrity, efficiency and reliability of
payment systems and also prescribed the respective rights and obligations of the
financial institutions, service providers, consumers and other participants of the
systems.
• Under the act, the State Bank may designate a payment system and a payment
instrument as designated system and instrument respectively. Upon such
designation, the operator of the designated payment system is required to institute
adequate governance arrangements, rules, procedures and controls to ensure
continued integrity and reliability of such system and the issuer of the designated
payment instrument shall comply with the specified requirements of the State
Bank.
12. Payments & Electronic Fund Transfers Act, 2007
• A bank, financial institution, clearing house, service provider or any person
authorized by State Bank to transact business under the Act and providing funds
transfer facility is required to retain complete record of electronic transactions in
electronic form and shall ensure secure means of transfer consistent with
international standards.
• The State Bank is empowered under the Act to nominate one or more clearing
house to provide clearing or settlement services for a payment system and to
formulate ‘settlement rules’ relating thereto.
• Under the proposed Act, a financial institution or other operator of a designated
payment system is required to disclose, in the specified manner, the terms and
conditions of EFT to the consumer at the time the consumer contracts for the
same and shall also notify the consumer of any material change in such terms and
conditions.
13. Payments & Electronic Fund Transfers Act, 2007
• ATM operators and other service providers seeking to impose a fee on any
consumer for providing services shall be required by the State Bank to notify the
consumer, in the specified manner, about such fee including the amount thereof
and EFT may be preauthorized by a consumer and also be initiated by means of
truncated cheque.
• The PSEFT Act further requires the financial institution to provide periodic
statement of account to each consumer in respect of each electronically
accessible account.
• The PSEFT Act also lays down the procedures to be followed in case of errors or
omission in EFT and the respective liabilities of the financial institutions and
consumers in such circumstances; and under the PSEFT Act, a consumer may
also complain to the State Bank regarding EFT in case of not being satisfied with
the outcome of a complaint made to financial institution without prejudice to any
right to seek any other remedy under the law.