SlideShare a Scribd company logo
1 of 24
Cyber Laws In Pakistan
AZWAR REHMAN (11-24)
ZAFAR IQBAL (11-31)
Cyber Laws in Pakistan
• There are different laws, promulgated in Pakistan.
• These laws not only deal with crime of Internet
• These deal with all dimensions related to computer & networks.
• Two of them are most known.
• They are:
–Electronic Transaction Ordinance 2002
–Electronic / Cyber Crime Bill 2007
Electronic Transaction Ordinance 2002
Overview
– The Electronic Transactions Ordinance (ETO), 2002, was the first IT-
relevant legislation created by national lawmakers.
– Protection for Pakistani e-Commerce locally and globally.
– Protect Pakistan’s critical infrastructure
– It is heavily taken from foreign law related to cyber crime.
Pre-ETO 2002
• No recognition of electronic documentation
• No recognition of electronic records
• No recognition of evidential basis of documents/records
• Failure to authenticate or identify digital or electronic signatures or forms of
authentication
• No online transaction system on legal basis.
• Electronic Data & Forensic Evidence not covered.
No Rules for all of these …
ETO 2002
• Sections
–There are 43 sections in this ordinance
–It deals with following 8 main areas relating to e-Commerce.
• Recognition of Electronic Documents
• Electronic Communications
• Web Site & Digital Signatures Certification Providers
• Stamp Duty
• Attestation, certified copies
• Jurisdiction
• Offences
-36. Violation of privacy information
• gains or attempts to gain access
• to any information system with or without any
purpose
• to acquire the information unauthorized
•Imprisonment 7 years
•Fine Rs. 1 million
-37. Damage to information system
• alter, modify, delete, remove, generate, transmit or store information
• create hindrance in information access
• knowingly when not authorized to do so
• Imprisonment 7 years
• Fine Rs. 1 million
-38. Offences to be non-bailable
All offences under this Ordinance shall be non-bailable,
compoundable and cognizable.
-39. Prosecution and trail of offences
–39. Prosecution and trial of offences.
• No Court inferior to the Court of Sessions shall try any
offence under this Ordinance.
Post ETO 2002
• Electronic Documentation & Records recognized
• Electronic & Digital forms of authentication & identification
• Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
Electronic/Cyber Crime Bill 2007
Overview
•“Prevention of Electronic Crimes Ordinance, 2007″ is in force now
•It was promulgated by the President of Pakistan on the 31st December 2007
•The bill deals with the electronic crimes included:
–Cyber terrorism
–Data damage
–Electronic fraud
–Electronic forgery
–Unauthorized access to code
–Cyber stalking
–Cyber Spamming/spoofing
Electronic/Cyber Crime Bill 2007
•It will apply to every person who commits an offence, irrespective of his nationality or
citizenship.
•It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge
cases against such crimes.
Punishments
•Every respective offence under this law has its distinctive punishment which can be
imprisonment or fine.
Sections
• Data Damage:
– Whoever with intent to illegal gain or cause harm to the public or any person, damages any
data, shall come under this section.
• Punishment:
– 3 years
– 3 Lac
Electronic/Cyber Crime Bill 2007
•Electronic fraud:
–People for illegal gain get in the way or use any data, electronic system or device or with intent
to deceive any person, which act or omissions is likely to cause damage or harm.
•Punishment:
–7 years
–7 Lac
Electronic/Cyber Crime Bill 2007
•Electronic Forgery:
–Whoever for unlawful gain interferes with data, electronic system or device, with intent to
cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in
unauthentic data that it be considered or acted upon for legal purposes as if it were authentic
•Punishment:
–7years
–7 Lac
Electronic/Cyber Crime Bill 2007
•Malicious code:
–Whoever willfully writes, offers, makes available, distributes or transmits malicious code
through an electronic system or device, with intent to cause harm to any electronic system or
resulting in the theft or loss of data commits the offence of malicious code.
•Punishment:
–5 years
–5 Lac
Electronic/Cyber Crime Bill 2007
•Cyber stalking:
–Whoever with intent to harass any person uses computer, computer network, internet, or any other
similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or
indecent language, picture or image.
–Threaten any illegal or immoral act
–Take or distribute pictures or photographs of any person without his knowledge
–Commits the offence of cyber stalking.
–3 Years
–3 Lac
Electronic/Cyber Crime Bill 2007
•Spamming:
–illegal electronic messages to any person
–without the permission of the recipient,
•Punishment:
–6 month
–50,000
Electronic/Cyber Crime Bill 2007
•Spoofing:
–Whoever establishes a website, or sends an electronic message with a fake source intended to
be believed by the recipient or visitor or its electronic system to be an authentic source
–with intent to gain unauthorized access or obtain valuable information
–3 Years
–3 Lac
Why we must know Cyber Laws?
•Which specific laws apply to Organization.
•By law, which information assets need to be protected?
Crimes in software house
DATA DAMAGE
ELECTRONIC FRAUD
ELECTRONIC FORGERY
MALICIOUS CODE
SPOOFING

More Related Content

What's hot

Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)gunpreet kamboj
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan Shahbaz Cheema
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptgagan deep
 

What's hot (20)

Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan Administration of Criminal Justice System in Pakistan
Administration of Criminal Justice System in Pakistan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 

Similar to Cyber laws in pakistan

Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaakashsaqi444
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Cyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxCyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxMohaiUDin
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACTJulainaMehraj
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)Yogendra Wagh
 

Similar to Cyber laws in pakistan (20)

Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxCyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptx
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
it act
it act it act
it act
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
law.pptx
law.pptxlaw.pptx
law.pptx
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 

More from Rana Muhammad Asif

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Rana Muhammad Asif
 
Software licencing techniqes
Software licencing techniqesSoftware licencing techniqes
Software licencing techniqesRana Muhammad Asif
 
Intellectual properties and laws
Intellectual properties and lawsIntellectual properties and laws
Intellectual properties and lawsRana Muhammad Asif
 
Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)Rana Muhammad Asif
 
Health and safety at work
Health and safety at workHealth and safety at work
Health and safety at workRana Muhammad Asif
 
Design pattern-presentation
Design pattern-presentationDesign pattern-presentation
Design pattern-presentationRana Muhammad Asif
 
Black box software testing
Black box software testingBlack box software testing
Black box software testingRana Muhammad Asif
 
Association for computing machinery (acm)
Association for computing machinery (acm)Association for computing machinery (acm)
Association for computing machinery (acm)Rana Muhammad Asif
 

More from Rana Muhammad Asif (8)

Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)Software engineering-codes-of-ethics (1)
Software engineering-codes-of-ethics (1)
 
Software licencing techniqes
Software licencing techniqesSoftware licencing techniqes
Software licencing techniqes
 
Intellectual properties and laws
Intellectual properties and lawsIntellectual properties and laws
Intellectual properties and laws
 
Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)Ieee institute-of-electrical-and-electronics-engineers (1)
Ieee institute-of-electrical-and-electronics-engineers (1)
 
Health and safety at work
Health and safety at workHealth and safety at work
Health and safety at work
 
Design pattern-presentation
Design pattern-presentationDesign pattern-presentation
Design pattern-presentation
 
Black box software testing
Black box software testingBlack box software testing
Black box software testing
 
Association for computing machinery (acm)
Association for computing machinery (acm)Association for computing machinery (acm)
Association for computing machinery (acm)
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Cyber laws in pakistan

  • 1. Cyber Laws In Pakistan AZWAR REHMAN (11-24) ZAFAR IQBAL (11-31)
  • 2. Cyber Laws in Pakistan • There are different laws, promulgated in Pakistan. • These laws not only deal with crime of Internet • These deal with all dimensions related to computer & networks. • Two of them are most known. • They are: –Electronic Transaction Ordinance 2002 –Electronic / Cyber Crime Bill 2007
  • 3. Electronic Transaction Ordinance 2002 Overview – The Electronic Transactions Ordinance (ETO), 2002, was the first IT- relevant legislation created by national lawmakers. – Protection for Pakistani e-Commerce locally and globally. – Protect Pakistan’s critical infrastructure – It is heavily taken from foreign law related to cyber crime.
  • 4. Pre-ETO 2002 • No recognition of electronic documentation • No recognition of electronic records • No recognition of evidential basis of documents/records • Failure to authenticate or identify digital or electronic signatures or forms of authentication • No online transaction system on legal basis. • Electronic Data & Forensic Evidence not covered. No Rules for all of these …
  • 5. ETO 2002 • Sections –There are 43 sections in this ordinance –It deals with following 8 main areas relating to e-Commerce. • Recognition of Electronic Documents • Electronic Communications • Web Site & Digital Signatures Certification Providers • Stamp Duty • Attestation, certified copies • Jurisdiction • Offences
  • 6. -36. Violation of privacy information • gains or attempts to gain access • to any information system with or without any purpose • to acquire the information unauthorized •Imprisonment 7 years •Fine Rs. 1 million
  • 7. -37. Damage to information system • alter, modify, delete, remove, generate, transmit or store information • create hindrance in information access • knowingly when not authorized to do so • Imprisonment 7 years • Fine Rs. 1 million
  • 8. -38. Offences to be non-bailable All offences under this Ordinance shall be non-bailable, compoundable and cognizable.
  • 9. -39. Prosecution and trail of offences –39. Prosecution and trial of offences. • No Court inferior to the Court of Sessions shall try any offence under this Ordinance.
  • 10. Post ETO 2002 • Electronic Documentation & Records recognized • Electronic & Digital forms of authentication & identification • Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
  • 11.
  • 13. Overview •“Prevention of Electronic Crimes Ordinance, 2007″ is in force now •It was promulgated by the President of Pakistan on the 31st December 2007 •The bill deals with the electronic crimes included: –Cyber terrorism –Data damage –Electronic fraud –Electronic forgery –Unauthorized access to code –Cyber stalking –Cyber Spamming/spoofing
  • 14. Electronic/Cyber Crime Bill 2007 •It will apply to every person who commits an offence, irrespective of his nationality or citizenship. •It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.
  • 15. Punishments •Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.
  • 16. Sections • Data Damage: – Whoever with intent to illegal gain or cause harm to the public or any person, damages any data, shall come under this section. • Punishment: – 3 years – 3 Lac
  • 17. Electronic/Cyber Crime Bill 2007 •Electronic fraud: –People for illegal gain get in the way or use any data, electronic system or device or with intent to deceive any person, which act or omissions is likely to cause damage or harm. •Punishment: –7 years –7 Lac
  • 18. Electronic/Cyber Crime Bill 2007 •Electronic Forgery: –Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in unauthentic data that it be considered or acted upon for legal purposes as if it were authentic •Punishment: –7years –7 Lac
  • 19. Electronic/Cyber Crime Bill 2007 •Malicious code: –Whoever willfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or device, with intent to cause harm to any electronic system or resulting in the theft or loss of data commits the offence of malicious code. •Punishment: –5 years –5 Lac
  • 20. Electronic/Cyber Crime Bill 2007 •Cyber stalking: –Whoever with intent to harass any person uses computer, computer network, internet, or any other similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, picture or image. –Threaten any illegal or immoral act –Take or distribute pictures or photographs of any person without his knowledge –Commits the offence of cyber stalking. –3 Years –3 Lac
  • 21. Electronic/Cyber Crime Bill 2007 •Spamming: –illegal electronic messages to any person –without the permission of the recipient, •Punishment: –6 month –50,000
  • 22. Electronic/Cyber Crime Bill 2007 •Spoofing: –Whoever establishes a website, or sends an electronic message with a fake source intended to be believed by the recipient or visitor or its electronic system to be an authentic source –with intent to gain unauthorized access or obtain valuable information –3 Years –3 Lac
  • 23. Why we must know Cyber Laws? •Which specific laws apply to Organization. •By law, which information assets need to be protected?
  • 24. Crimes in software house DATA DAMAGE ELECTRONIC FRAUD ELECTRONIC FORGERY MALICIOUS CODE SPOOFING