The document discusses cyber laws in Pakistan. It provides an overview of key cyber crimes like hacking, credit card fraud, and phishing. It then summarizes Pakistan's two main cyber laws: the Electronic Transaction Ordinance of 2002, which established legal frameworks for e-commerce; and the Prevention of Electronic Crimes Act of 2007, which defined new cyber crimes and corresponding punishments like imprisonment and fines. The document concludes by offering tips for preventing cyber crimes like continuously updating software and encrypting data.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
The Information Technology (Amendment) Bill, 2008 (Bill No.96-F of 2008) was passed by the both houses of parliament on December, 2008 and received the accent of the president on 5th February, 2009. However, the Amendment Act had not yet come into force and was only for information purpose. However, there was lots of confusion about the date of “Notification” of IT Amendment Act, 2008 as per the requirements of the Section 1 (2) of the same. However, after the wait of almost more than 8 months, the Information Technology (Amendment) Act, 2008 (ITAA, 2008) has been notified with effect from 27/10/2009 and is now become operational.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
The Information Technology (Amendment) Bill, 2008 (Bill No.96-F of 2008) was passed by the both houses of parliament on December, 2008 and received the accent of the president on 5th February, 2009. However, the Amendment Act had not yet come into force and was only for information purpose. However, there was lots of confusion about the date of “Notification” of IT Amendment Act, 2008 as per the requirements of the Section 1 (2) of the same. However, after the wait of almost more than 8 months, the Information Technology (Amendment) Act, 2008 (ITAA, 2008) has been notified with effect from 27/10/2009 and is now become operational.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
cyber crime and cyber security
Introduction to cybercrime
History of cybercrime
Categories of cybercrime
Types of cyber crime
Cyber Laws
Preventions to cybercrime
Cyber Security
Cyber Security Advantages
Conclusion
Computer crime, or cybercrime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
cyber crime and cyber security
Introduction to cybercrime
History of cybercrime
Categories of cybercrime
Types of cyber crime
Cyber Laws
Preventions to cybercrime
Cyber Security
Cyber Security Advantages
Conclusion
Computer crime, or cybercrime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
Pros And Cons Of Cybercrime
Pros And Disadvantages Of Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Cyber Crime Speech
Why Cybercrime Is Important
The Issue Of Cyber Crimes Essay
Cyber Security Threats And Crimes
Cyber Crime Essay
Cybercrime Research Paper : Cybercrime
Cyber Crime In Australia
Cyber Crimes And The Crime
Research Paper On Cybercrime
Cyber Crime
Cyber Crime And Transnational Crime Essay
CyberCrime Essay
Advantages And Disadvantages Of Cyber Crime
Disadvantages Of Cyber Crime
Essay on Computer Crimes
Cyber Crime Essay
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
4. CONTENTS
• What is Cyber Crime?
• Who are Cyber Criminals?
• What Are Cyber Laws?
• Cyber Laws in the World
• Cyber Laws in Pakistan
• How to Prevent Cyber Crime?
Page no : 4
Media Law & Ethic ( Amna Ashraf )
5. Crime Commmeitted using a Computer and the internet to steal a
persons identity or sell contraband or stalk victims or disrupt operations
with malicious programs, Threating Email, Defamation, Spam and
Phishing are some examples where computers are used to commit crime.
Cyber crime also stated as any use of a computer as an instrument to
further illegal ends, such as
Committing fraud
Stealing identities
Violating privacy
WHAT IS CYBER CRIME ?
Page no : 5
Media Law & Ethic ( Amna Ashraf )
6. EXAMPLES
E-mail account of a Federal Minister is hacked.
Credit cards frauds reach to an alarming level.
Financial institutions are the favourite targets of Cyber criminals ---
worstly effecting the technological progress in the area of e –Commerce.
Page no : 6
Media Law & Ethic ( Amna Ashraf )
7. HISTORY
The 1st recorded cyber crime took place in the year 1820 . In 1820,
Joseph-Marie a Textile manufacture in France, produced loom. This
device allowed the repetition of a series of steps in the weaving of
special fabrics. This Resulted in afear amongst Joseph employee that
their traditional employee & livelihood were being threatened.
Page no : 7
Media Law & Ethic ( Amna Ashraf )
8. CATEGORIES OF CYBER CRIME
• 1. The computer as a Target : using a computer to attack other
computer/device.
• 2. The computer as a Weapon : using a computer to commit real world
crimes.
Page no : 8
Media Law & Ethic ( Amna Ashraf )
9. CRIME REPORT IN PAKISTAN 2018 TO 2019
Offences 2006 2005 Total
IPR Crimes 34 44 78
Spurious Drugs 83 88
171
Cyber Crimes 102 115
217
Counterfeit Currencies 19 13
32
Others 299 331 630
Total: 537 591
1128
Page no : 9
Media Law & Ethic ( Amna Ashraf )
10. FURQAN IDRESS
2nd to present the slides
Page no : 10
Media Law & Ethic ( Amna Ashraf )
11. CYBER ATTACK
In Computer & Computer Network an
attack is any attempt to expose, alter ,
disable , destroy , steal or gain
unauthorized access or make unathorized
use of an asset.
TYPES
Hacking
Credit Card
Spoofing
Net Extortion
Virus Attack
WHAT IS CYBER ATTACK ?”
Page no : 11
Media Law & Ethic ( Amna Ashraf )
12. Teen
( Age Group 11-19 )
Organized
Hacktivists
Disgruntled
Employee
Professional
Hackers
Terrorists
WHO ARE
CYBER
CRIMINALS ?
Page no : 12
Media Law & Ethic ( Amna Ashraf )
13. Cyber Laws is anAttempt to apply
laws designed for the physical world
to human activity on internet
WHAT IS CYBER
LAW ?
Page no : 13
Media Law & Ethic ( Amna Ashraf )
14. The Legal issues related to use
of communication technology
i.e the internet .
Privacy
Intellectual property
WHAT IS CYBER
LAW ?
Page no : 14
Media Law & Ethic (Amna Ashraf )
15. These laws not only
deal with crime of
Internet
These deal with all
dimensions related to
computer & networks
Two of them are
most known
Electronic
Transaction
Ordinance 2002
Electronic / Cyber
Crime Bill 2007
CYBER LAW IN
PAKISTAN
Page no : 15
Media Law & Ethic ( Amna Ashraf )
16. NIRMAL BAZLA
3rd To present the slides
Page no : 16
Media Law & Ethic ( Amna Ashraf )
17. ELECTRONIC TRANSACTION ORDINANCE 2002
Overview
The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by
national lawmakers.
Laid the foundation for comprehensive Legal Infrastructure.
It is heavily taken from foreign law related to cyber crime.
Page no : 17
Media Law & Ethic ( Amna Ashraf )
18. ELECTRONIC TRANSACTION ORDINANCE 2002
There are 43 sections in this ordinance
It deals with following 8 main areas relating to eCommerce.
Important Sections are
36. Violation of privacy information
gains or attempts to gain access
to acquire the information
Imprisonment 7 years
Fine Rs. 1 million
Page no : 18
Media Law & Ethic (Amna Ashraf )
19. ELECTRONIC TRANSACTION ORDINANCE 2002
38. Offences to be non-bailable, compoundable and cognizable
All offences under this Ordinance shall be non-bailable, compoundable and
cognizable.
39. Prosecution and trial of offences.
No Court inferior to the Court of Sessions shall try any offence under this
Ordinance.
Page no : 19
Media Law & Ethic ( Amna Ashraf )
20. ELECTRONIC/CYBER CRIME BILL 2007
It was promulgated by the President of Pakistan on the 31st December 2007
The bill deals with the electronic crimes included:
Cyber terrorism
Electronic fraud
Unauthorized access to code
Cyber stalking
Cyber Spamming/spoofing
Page no : 20
Media Law & Ethic ( Amna Ashraf )
22. PREVENTION OF ELECTRONIC CRIMES ACT
Cyber Crime Bill 2007
The legislation established new offences including
illegal access of data (hacking)
DOS and DDOS attacks
electronic forgery and electronic fraud cyber terrorism
Prevention
Page no : 22
Media Law & Ethic (Amna Ashraf )
23. PUNISHMENTS
Under this law there are defined punishment for the offence.
Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.
Page no : 23
Media Law & Ethic ( Amna Ashraf )
24. PUNISHMENTS
Offence Imprisonment (years) Fine
CriminalAccess 3 3 Lac
Criminal DataAccess 3 3 Lac
Data Damage 3 3 Lac
System Damage 3 3 Lac
Electronic Fraud 7 7 Lac
Electronic Forgery 7 7 Lac
Misuse of Device 3 3 Lac
Defamation 5 5 Lac
Cyber stalking 3 3 Lac
Cyber terrorism Life 10 Million
25. MOST COMMON CRIME & PUNISHEMENT
• Cyber stalking Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
• Spamming Three Months of Prison or Fine up to Rs. 5 Million or Both
• Spoofing Up to 3 Years in Jail or Fine up to Rs. 500,00 or both
• Malicious Code Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both
• Glorification of an offence Up to 7 Years Prison or up to Rs. 10 Million Fine or both
• Electronic forgery Up to 3 Years in Prison or up to Rs. 250,000 fine or bot
Page no : 25
Media Law & Ethic( Amna Ashraf)
26. HOW TO PREVENT CYBER CRIME ?
Continuously update software.
Encrypt all data
Use ad-blockers
Set and communicate email response policies
Update, distribute and get signatures on Acceptable Use agreements
Page no : 26
Media Law & Ethic ( Amna Ashraf)
27. • Thank you Bs 4 A
ANY QUESTION ?
Page no : 27
Media Law & Ethic ( Amna Ashraf )