SlideShare a Scribd company logo
1 of 9
Cybercrime act of Pakistan (2015)
Cybercrime:
Computer Crime or Cybercrime is any crimethat involves
a computer and a network. (Also known as hacking) The computer may have
been used in the commission of a crime, or it may be the target. Net crime
is criminalexploitation of the internet, inherently a Cybercrime.
Types of Cybercrime
Types Examples
Financial Crimes Cheating, credit card frauds, money
laundering etc.
Sale of illegal
articles
Sale of narcotics, weapons and wildlife etc.,
through websites or email communication.
Online gambling Online gambling, money laundering etc.
Intellectual
property crimes
Software piracy, copyright infringement,
trademarks violations, theft of compute
source code etc.
Email spoofing Sending e-mails that appear to originate
from one source but actually has been sent
from another source.
Forgery Counterfeit currency notes, postage and
revenue stamps, mark sheets etc.
Cyber Defamation Publishing/distributing defamatory matter
about someone.
Unauthorized
access to
computer system
Hacking.
or networks
Theft of
information in
electronic form
Stealing information on computer hard
disks, removable storage media etc.
Email bombing Sending a large number of emails crashing
email accounts or servers.
Data diddling Altering data.
Salami attacks Commissioning financial crimes.
Denial of service
attack
Flooding systems by
sendingexcessivedemands etc.
Virus attacks Spread of viruses and worms.
Logic bombs Triggering programs at events.
Trojan attacks Unauthorized programs.
Internet time theft Stealing internet hours.
Web jacking Stealing control over websites.
Theftor damaging
of computer
system
Theft of a computer, peripherals etc.
Unauthorized
access
The Cybercrime of “gaining entry into,
instructing or communicating with the
logical, arithmetical, or memory function
resources of a computer, computer system
or computer network”11 known as access
has the greatest impact Packet sniffing,
tempest attack,password cracking and
buffer overflow etc. are some techniques for
gaining access.
Offences and Punishments
Illegal access to information system:
1. Cause an information system to perform any function with intent to
secure access to the whole or any part of any information system or to
enable any such access to be secured ;
2. At the time, when he causes the information system to perform the
function he knows that the access he intends to secure or to be enable
to be secured is unauthorized under this section.
Fine Punishment Both
6 Months 100,000PKR Yes
Illegal access to program or data:
(a) Whoever intentionally, whether temporarily or not,
1. Causes to any program or data to be secured or to be enabled.
2. The access to the program or data he intends to secure, or to
enable to be secured, is unauthorized under this section.
3. At the time, when he accesses the program or data he knows that
the access he intends to secure, or to enable to be secured, is
unauthorized under this section.
Fine Punishment Both
200,000PKR 9 Months Yes
(b) Whoever recklessly, whether temporarily or not,
1. Causes to any program or data to be secured or to be enabled.
2. The access to the program or data he intends to secure, or to
enable to be secured, is unauthorized under this section.
3. At the time, when he accesses the program or data he knows that
the access he intends to secure, or to enable to be secured, is
unauthorized under this section.
Fine Punishment Both
100,000PKR 6 Months Yes
Illegal Interface with Program or Data:
(a)Whoever intentionally, whether temporarily or not, does any
unauthorized act in relation to an information system, or at
the time when he does the act he knows that it is
unauthorized, and acts with intent;
1. To destroy, damage, delete, erase, generate, modify or alter
any program or data;
2. To render any program or data inaccessible, meaningless,
useless or ineffective;
3. To obstruct, interface or interrupt with any program or data or
any aspect or attribute related to the program or data;
4. To obstruct, interface or interrupt with any person in the use
of any program or data or any aspect or attribute related
to the program or data;
5. To deny, prevent, suppress or hinder access to any program or
data to any person entitled to it;
6. To impair the operation of any program or any aspect or
attribute related to the program or data;
Fine Punishment Both
500,000PKR 3 Years Yes
(a) Whoever recklessly, whether temporarily or not, does any
unauthorized act in relation to an information system, or at
the time when he does the act he knows that it is
unauthorized, and acts with intent;
1. Causing destruction, damage, deletion, eraser, generation
modification or alteration of any program or data or any
aspect or attribute related to the program or data;
2. Rendering any program or data meaningless, useless or
ineffective;
3. Causing impairment to the operation of any program;
4. Causing impairment to the reliability of any program or data
or any aspect or attribute related to the program or data;
5. Causing denial, suppression or hindrance of access to any
program or data or any aspect or attribute related to the
program or data;
Fine Punishment Both
250,000PKR 2 Years Yes
Illegal Interface with Information System:
(a) Whoever intentionally, whether temporarily or not, does any
unauthorized access in relation to an information system, at the
time when he does the act he knows that is unauthorized, and
acts with intent to severely;
1. Interfere, hinder, damage, prevent, suppress, impair or obstruct
the functioning of an information system;
2. Interfere with or hinder access to any information system;
3. Impair the operation of any information system;
4. Impair the reliability of any information system;
5. Impair the security of any information system;
Fine Punishment Both
500,000PKR 5 Years yes
(b)Whoever recklessly, whether temporarily or not, does any
unauthorized access in relation to an information system, at the
time when he does the act he knows that is unauthorized, and
acts recklessly thereby cause severe;
1. Interference, damage, hindrance, prevention, suppression or
obstruction to the function of an information system;
2. Interference or hindrance to the access of any information
system;
3. Impairment to the operation of any information system;
4. Impairment to the reliability of any information system;
5. Impairment to the security of any information system;
Fine Punishment Both
250,000PKR 2 years Yes
(c)Whoever commits any offence under sub-section (a) By
circumventing or infringing security with respect to any
information system, program or data shall be punished with
imprisonment of
Fine Punishment Both
500,000PKR 3 Years Yes
(d) Whoever commits any offenceunder sub-section (b) by
circumventing or infringing security with respect to any
information system, programor data shall be punished with
imprisonmentof
Fine Punishment Both
250,000PKR 2 Years Yes
(d) Whoever commits any offence under sub section (a) with respect
to any Government controlled critical infrastructure information
system; program or data that performs a critical public function
shall be punished with imprisonment of
Fine Punishment Both
7000000 PKR 7 Years Yes
Cyber Terrorism:
(a) Whoever commits or threatens to commit any of the offences
under
1. The use or threat is designed to coerce, intimidate, overawe or
create a sense of fear in Government or public section.
2. The use or threat of purposes the advancing of the cause
where political or religious with intention of—
3. Interfering or disrupting the system,
4. Severe interfere, serious disrupting or damaging the payment
system of multiple institutions,
5. Severe Interfere, seriously damage the system at the public
scale,
6. Severe interfere, serious disrupting or damaging the system of
Civil forces, Armed forces and security forces,
Fine Punishment Both
50,000,000 PKR 14 Years Yes
Electronic Forgery:
(a) Whoever;
1. Without authority,
2. In excess of authority,
3. Through an unauthorized act,
Inputs, generates, modifies, delete or suppress data resulting
in inauthentic data with any person or an information system
shall be punished,
Fine Punishment Both
250,000PKR 2 Years Yes
(b)Whoever commits any offence;
1. for wrongfulgain;
2. for wrongfulloss;
3. for any economic benefit for oneself or for another person,
Fine Punishment Both
250,000PKR 2 Years Yes
(c) Whoever commits any offence, fraudulently, dishonestly or
with similar intent;
1. To influence the public servantin the exercise of a public duty;
2. To influence a Governmentcontrolled information systemor
public information system
Shall be punished
Fine Punishment Both
500,000PKR 3 Years Yes
Electronic Fraud:
Whoever with fraudulent or dishonest intent;
1. Without authority;
2. In excess of authority;
3. Through an unauthorized act;
4. Any illegal access to information system;
5. Any input, alteration or deletion or suppression theprogramor
data
6. Any inference or hindrance data;
7. Copying , transferring the data or moving to any other
information system
i. Wrongful gain;
ii. Wrongful loss;
iii. Any economic benefit for oneself or another person;
Shall be punished
Fine Punishment Both
10,000,000PKR 5 Years Yes
Making, Supplying or obtaining devices for use in offence:
1. Whoever produces, makes any device intending it primarily to
be used or believing that it is primarily to be used to commit;
Fine Punishment Both
50,000 PKR 6 Months Yes
2. Whoever transfer, imports, shares or distributes any device
that it to be primarily used to commit;
Fine Punishment Both
100,000 PKR 1 Years Yes
Identify Crime:
1. Whoever knowingly obtains or process of any person’s
identity information without law justification and use in
offensivework shallbe punished;
Fine Punishment Both
50,000 PKR 3 Months Yes
2. Whoever transmits or makes available identity of any
person without permission for Fraud or deceit etc shall be
punished ;
Fine Punishment Both
100,000 PKR 6 Months Yes
Special Protection of Women:
1. Whoever knowingly or publically displays electronic
communication that harms the reputation of women,
threatens sexual acts against women or any explicit images
Shall be punished
Fine Punishment Both
10,000,00 PKR 1 Year Yes

More Related Content

What's hot

Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 

What's hot (20)

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 

Viewers also liked

Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-Rafique Ahmed
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal codeAqib Memon
 
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990Anthony Williams
 
Pakistan Taxation System - Law Presentation
Pakistan Taxation System - Law PresentationPakistan Taxation System - Law Presentation
Pakistan Taxation System - Law PresentationOmer Sharif Madni
 
Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015Anthony Williams
 
Labour law presentation
Labour law presentationLabour law presentation
Labour law presentationMalik Sheraz
 

Viewers also liked (10)

Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-
 
Law of labor
Law of laborLaw of labor
Law of labor
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal code
 
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
 
Contract law
Contract lawContract law
Contract law
 
Pakistan Taxation System - Law Presentation
Pakistan Taxation System - Law PresentationPakistan Taxation System - Law Presentation
Pakistan Taxation System - Law Presentation
 
Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015
 
Labour Law Pakistan
Labour Law PakistanLabour Law Pakistan
Labour Law Pakistan
 
NGOs in pakistan
NGOs in pakistanNGOs in pakistan
NGOs in pakistan
 
Labour law presentation
Labour law presentationLabour law presentation
Labour law presentation
 

Similar to Cybercrime act of Pakistan 2015 Report

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRajshekar786
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfbadangayonmgb
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondBenjamin Ang
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...Benjamin Ang
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 

Similar to Cybercrime act of Pakistan 2015 Report (20)

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
Shilpa
ShilpaShilpa
Shilpa
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber laws uk
Cyber laws ukCyber laws uk
Cyber laws uk
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Cyber law
Cyber law Cyber law
Cyber law
 

More from Abdul Rehman

PTCL and other Networks In Pakistan
PTCL and other Networks In PakistanPTCL and other Networks In Pakistan
PTCL and other Networks In PakistanAbdul Rehman
 
Abuttal of Pakistan
Abuttal of PakistanAbuttal of Pakistan
Abuttal of PakistanAbdul Rehman
 
Difference between Rural and urban life
Difference between Rural and urban lifeDifference between Rural and urban life
Difference between Rural and urban lifeAbdul Rehman
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Logical and Conditional Operator In C language
Logical and Conditional Operator In C languageLogical and Conditional Operator In C language
Logical and Conditional Operator In C languageAbdul Rehman
 
Water Level Indicator Project Presentation
Water Level Indicator Project PresentationWater Level Indicator Project Presentation
Water Level Indicator Project PresentationAbdul Rehman
 

More from Abdul Rehman (6)

PTCL and other Networks In Pakistan
PTCL and other Networks In PakistanPTCL and other Networks In Pakistan
PTCL and other Networks In Pakistan
 
Abuttal of Pakistan
Abuttal of PakistanAbuttal of Pakistan
Abuttal of Pakistan
 
Difference between Rural and urban life
Difference between Rural and urban lifeDifference between Rural and urban life
Difference between Rural and urban life
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Logical and Conditional Operator In C language
Logical and Conditional Operator In C languageLogical and Conditional Operator In C language
Logical and Conditional Operator In C language
 
Water Level Indicator Project Presentation
Water Level Indicator Project PresentationWater Level Indicator Project Presentation
Water Level Indicator Project Presentation
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

Cybercrime act of Pakistan 2015 Report

  • 1. Cybercrime act of Pakistan (2015) Cybercrime: Computer Crime or Cybercrime is any crimethat involves a computer and a network. (Also known as hacking) The computer may have been used in the commission of a crime, or it may be the target. Net crime is criminalexploitation of the internet, inherently a Cybercrime. Types of Cybercrime Types Examples Financial Crimes Cheating, credit card frauds, money laundering etc. Sale of illegal articles Sale of narcotics, weapons and wildlife etc., through websites or email communication. Online gambling Online gambling, money laundering etc. Intellectual property crimes Software piracy, copyright infringement, trademarks violations, theft of compute source code etc. Email spoofing Sending e-mails that appear to originate from one source but actually has been sent from another source. Forgery Counterfeit currency notes, postage and revenue stamps, mark sheets etc. Cyber Defamation Publishing/distributing defamatory matter about someone. Unauthorized access to computer system Hacking.
  • 2. or networks Theft of information in electronic form Stealing information on computer hard disks, removable storage media etc. Email bombing Sending a large number of emails crashing email accounts or servers. Data diddling Altering data. Salami attacks Commissioning financial crimes. Denial of service attack Flooding systems by sendingexcessivedemands etc. Virus attacks Spread of viruses and worms. Logic bombs Triggering programs at events. Trojan attacks Unauthorized programs. Internet time theft Stealing internet hours. Web jacking Stealing control over websites. Theftor damaging of computer system Theft of a computer, peripherals etc. Unauthorized access The Cybercrime of “gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network”11 known as access has the greatest impact Packet sniffing, tempest attack,password cracking and buffer overflow etc. are some techniques for gaining access. Offences and Punishments Illegal access to information system: 1. Cause an information system to perform any function with intent to secure access to the whole or any part of any information system or to enable any such access to be secured ;
  • 3. 2. At the time, when he causes the information system to perform the function he knows that the access he intends to secure or to be enable to be secured is unauthorized under this section. Fine Punishment Both 6 Months 100,000PKR Yes Illegal access to program or data: (a) Whoever intentionally, whether temporarily or not, 1. Causes to any program or data to be secured or to be enabled. 2. The access to the program or data he intends to secure, or to enable to be secured, is unauthorized under this section. 3. At the time, when he accesses the program or data he knows that the access he intends to secure, or to enable to be secured, is unauthorized under this section. Fine Punishment Both 200,000PKR 9 Months Yes (b) Whoever recklessly, whether temporarily or not, 1. Causes to any program or data to be secured or to be enabled. 2. The access to the program or data he intends to secure, or to enable to be secured, is unauthorized under this section. 3. At the time, when he accesses the program or data he knows that the access he intends to secure, or to enable to be secured, is unauthorized under this section. Fine Punishment Both 100,000PKR 6 Months Yes Illegal Interface with Program or Data: (a)Whoever intentionally, whether temporarily or not, does any unauthorized act in relation to an information system, or at
  • 4. the time when he does the act he knows that it is unauthorized, and acts with intent; 1. To destroy, damage, delete, erase, generate, modify or alter any program or data; 2. To render any program or data inaccessible, meaningless, useless or ineffective; 3. To obstruct, interface or interrupt with any program or data or any aspect or attribute related to the program or data; 4. To obstruct, interface or interrupt with any person in the use of any program or data or any aspect or attribute related to the program or data; 5. To deny, prevent, suppress or hinder access to any program or data to any person entitled to it; 6. To impair the operation of any program or any aspect or attribute related to the program or data; Fine Punishment Both 500,000PKR 3 Years Yes (a) Whoever recklessly, whether temporarily or not, does any unauthorized act in relation to an information system, or at the time when he does the act he knows that it is unauthorized, and acts with intent; 1. Causing destruction, damage, deletion, eraser, generation modification or alteration of any program or data or any aspect or attribute related to the program or data; 2. Rendering any program or data meaningless, useless or ineffective; 3. Causing impairment to the operation of any program; 4. Causing impairment to the reliability of any program or data or any aspect or attribute related to the program or data;
  • 5. 5. Causing denial, suppression or hindrance of access to any program or data or any aspect or attribute related to the program or data; Fine Punishment Both 250,000PKR 2 Years Yes Illegal Interface with Information System: (a) Whoever intentionally, whether temporarily or not, does any unauthorized access in relation to an information system, at the time when he does the act he knows that is unauthorized, and acts with intent to severely; 1. Interfere, hinder, damage, prevent, suppress, impair or obstruct the functioning of an information system; 2. Interfere with or hinder access to any information system; 3. Impair the operation of any information system; 4. Impair the reliability of any information system; 5. Impair the security of any information system; Fine Punishment Both 500,000PKR 5 Years yes (b)Whoever recklessly, whether temporarily or not, does any unauthorized access in relation to an information system, at the time when he does the act he knows that is unauthorized, and acts recklessly thereby cause severe; 1. Interference, damage, hindrance, prevention, suppression or obstruction to the function of an information system; 2. Interference or hindrance to the access of any information system; 3. Impairment to the operation of any information system; 4. Impairment to the reliability of any information system; 5. Impairment to the security of any information system; Fine Punishment Both
  • 6. 250,000PKR 2 years Yes (c)Whoever commits any offence under sub-section (a) By circumventing or infringing security with respect to any information system, program or data shall be punished with imprisonment of Fine Punishment Both 500,000PKR 3 Years Yes (d) Whoever commits any offenceunder sub-section (b) by circumventing or infringing security with respect to any information system, programor data shall be punished with imprisonmentof Fine Punishment Both 250,000PKR 2 Years Yes (d) Whoever commits any offence under sub section (a) with respect to any Government controlled critical infrastructure information system; program or data that performs a critical public function shall be punished with imprisonment of Fine Punishment Both 7000000 PKR 7 Years Yes Cyber Terrorism: (a) Whoever commits or threatens to commit any of the offences under 1. The use or threat is designed to coerce, intimidate, overawe or create a sense of fear in Government or public section.
  • 7. 2. The use or threat of purposes the advancing of the cause where political or religious with intention of— 3. Interfering or disrupting the system, 4. Severe interfere, serious disrupting or damaging the payment system of multiple institutions, 5. Severe Interfere, seriously damage the system at the public scale, 6. Severe interfere, serious disrupting or damaging the system of Civil forces, Armed forces and security forces, Fine Punishment Both 50,000,000 PKR 14 Years Yes Electronic Forgery: (a) Whoever; 1. Without authority, 2. In excess of authority, 3. Through an unauthorized act, Inputs, generates, modifies, delete or suppress data resulting in inauthentic data with any person or an information system shall be punished, Fine Punishment Both 250,000PKR 2 Years Yes (b)Whoever commits any offence; 1. for wrongfulgain; 2. for wrongfulloss; 3. for any economic benefit for oneself or for another person, Fine Punishment Both 250,000PKR 2 Years Yes (c) Whoever commits any offence, fraudulently, dishonestly or with similar intent;
  • 8. 1. To influence the public servantin the exercise of a public duty; 2. To influence a Governmentcontrolled information systemor public information system Shall be punished Fine Punishment Both 500,000PKR 3 Years Yes Electronic Fraud: Whoever with fraudulent or dishonest intent; 1. Without authority; 2. In excess of authority; 3. Through an unauthorized act; 4. Any illegal access to information system; 5. Any input, alteration or deletion or suppression theprogramor data 6. Any inference or hindrance data; 7. Copying , transferring the data or moving to any other information system i. Wrongful gain; ii. Wrongful loss; iii. Any economic benefit for oneself or another person; Shall be punished Fine Punishment Both 10,000,000PKR 5 Years Yes Making, Supplying or obtaining devices for use in offence: 1. Whoever produces, makes any device intending it primarily to be used or believing that it is primarily to be used to commit;
  • 9. Fine Punishment Both 50,000 PKR 6 Months Yes 2. Whoever transfer, imports, shares or distributes any device that it to be primarily used to commit; Fine Punishment Both 100,000 PKR 1 Years Yes Identify Crime: 1. Whoever knowingly obtains or process of any person’s identity information without law justification and use in offensivework shallbe punished; Fine Punishment Both 50,000 PKR 3 Months Yes 2. Whoever transmits or makes available identity of any person without permission for Fraud or deceit etc shall be punished ; Fine Punishment Both 100,000 PKR 6 Months Yes Special Protection of Women: 1. Whoever knowingly or publically displays electronic communication that harms the reputation of women, threatens sexual acts against women or any explicit images Shall be punished Fine Punishment Both 10,000,00 PKR 1 Year Yes