This document discusses cyber laws and digital evidence discovery in Pakistan. It outlines several key Pakistani statutes related to cyber crimes, such as the Electronic Transaction Ordinance of 2002, Payment System Electronic Funds Transfer Act of 2007, and Anti-Money Laundering Act of 2010. It also discusses offenses covered under these laws, including those related to privacy violations, unauthorized access, and money laundering. The document then outlines amendments made to the Qanun-e-Shahadat Order of 1984 to incorporate electronic evidence. It concludes by discussing the Investigation of Fair Trial Act of 2013 and several relevant court cases.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
This presentation is about the Cyber Governemance in Pakistan, it clarifys the laws, Bills and Punishments for cyber crimes in the world and perticulary Pakistan.
The Prevention of Electronic Crimes Act 2016 being new cyber crimes law in Pakistan provide a comprehensive mechanism to prevent and apprehend the cyber crimes.
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
The Information Technology (Amendment) Bill, 2008 (Bill No.96-F of 2008) was passed by the both houses of parliament on December, 2008 and received the accent of the president on 5th February, 2009. However, the Amendment Act had not yet come into force and was only for information purpose. However, there was lots of confusion about the date of “Notification” of IT Amendment Act, 2008 as per the requirements of the Section 1 (2) of the same. However, after the wait of almost more than 8 months, the Information Technology (Amendment) Act, 2008 (ITAA, 2008) has been notified with effect from 27/10/2009 and is now become operational.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
The Prevention of Electronic Crimes Act 2016 being new cyber crimes law in Pakistan provide a comprehensive mechanism to prevent and apprehend the cyber crimes.
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
The Information Technology (Amendment) Bill, 2008 (Bill No.96-F of 2008) was passed by the both houses of parliament on December, 2008 and received the accent of the president on 5th February, 2009. However, the Amendment Act had not yet come into force and was only for information purpose. However, there was lots of confusion about the date of “Notification” of IT Amendment Act, 2008 as per the requirements of the Section 1 (2) of the same. However, after the wait of almost more than 8 months, the Information Technology (Amendment) Act, 2008 (ITAA, 2008) has been notified with effect from 27/10/2009 and is now become operational.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
Cloud and Security: a Legislator's Perspective
at "Up in the Cloud: Conference on Legal and Privacy Challenges in Cloud Computing"
University of Hong Kong
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Present Cyber Laws and Discovery of Digital Evidence
1. Present Cyber Laws and Discovery of
Digital Evidence in Pakistan
Introduction of Cyber laws and
Discovery of Digital Evidence Forensic
Laws
2. Cyber Law Statutes
• Electronic Transaction Ordinance 2002
• Payment System Electronic Funds Transfer Act
2007
• Anti-Money Laundering Act 2010
• Pakistan Protection Act 2014
• PTA Regulation S.R.O 713 (1)/2009
• Investigation of Fair Trial Act 2013
• Qanun -e-Shahdat Order 1984 amended
3. ETO 2002 Cyber Law Offences
• Section 34, 35 of ETO covered the offences by
corporate body, punishment is 10 year and fine
10 million or both
• Sec. 36 of ETO is about Violation of privacy of
information, unauthorized access to information
system, punishment 7 years and fine one million
• Sec. 37 of ETO Damage to information system,
unauthorized alter, delete, modify, remove ,
transmit etc; punishment 7 years and one million
4. PSEFTA 2007 Cyber Law Offences
• 56. Criminal Liability; providing false information,
corporate offence, punish 3 yrs fine 3 million
• 57. Violations Affecting Electronic Commerce; whoever
uses or attempts or conspires to use any counterfeit,
fictitious, altered, forged, lost, stolen, or fraudulently
obtained Debit Instrument to obtain money etc, punish
7 yrs, one million
• 58. Cheating by Use of Electronic Device; Whosoever
cheats , fraudulently or dishonestly uses any credit or
debit card, or code or any other means of access to an
Electronic Fund Transfer device and thereby causes any
wrongful gain to him, punish 7 yrs and fine
5. Anti Money Laundering Act 2010
• The section 2 f (v) of Anti-money Laundering
Act 2010 recognizes the electronic money and
the record maintained in the electronic
device.
6. Pakistan Protection Act 2014
• Crimes via internet and information technology
against state and state owned institutions may be
cybercrimes. The section 2(i) provides a schedule
in The Pakistan Protection Act 2014 which sets
the schedule cybercrimes as;
• (ix) destruction of or attack on communication
and interaction lines, devices, grids, stations, or
systems etc
• (xiv) crimes against computers including
cybercrimes, internet offenses and other offences
related to information technology etc
7. PTA Regulations
• PTA has issued S.R.O 713 (1)/2009 against
spams which is called, Protection from Spam,
Unsolicited, Fraudulent an Obnoxious
Communication Regulations 2009
• PTA in its letter No. 1609/11/N&TA to all
CMTOs has restrain from sending SMS contain
bar-code or Masking
8. COPYRIGHT PROTECTION UNDER
COPYRIGHT ORDINANCE 1962
• Section 66 of the Ordinance, as amended by
the Amendment Act, provides that any person
who knowingly infringes or abets the
infringement of the copyright in a work
(defined to include computer programmes), or
any other right conferred by the Ordinance
shall be punishable with imprisonment which
may extend to 3 years with fine
9. QANUN -E-SHAHDAT ORDER 1984
• While enacting the ETO 2002 the QSO 1984 has
been amended
• Art 2 (e); (f) the expression, “automated”,
“electronic”, “information”, “information system”,
“electronic document”, “electronic signature etc
shall bear the meanings given in the ETO 2002
• Addition in Art. 30; “Statements gene rated by
automated information systems may be
attributed to the person exercising power or
control over the said information system”
10. QSO 1984
• Addition in Art. 46 A for Relevance of information
generated, received or recorded by automated information
system.
• Art 59 is about the authenticity or integrity of electronic
record.
• Art. 73 A printout or other form of output of an automated
information system shall not be denied the status of
primary evidence.
• Art. 78-A. Proof of electronic signature and electronic
document.
• Art. 85 is about certificates deposited in a repository.
• Case Law; Alamgir Khalid Chughtai V State 2009 PLD
254 Lahore
11. Investigation of Fair Trial Act 2013
• Preamble; An Act to provide for investigation for
collection of evidence by means of modern
techniques and devices
• To regulate advance and modern investigative
techniques such as covert surveillance and
human intelligence, property interference,
wiretapping and communication interception
• 16. Authorization under the warrant; video
recording, intercepting telephone, obtaining
email, SMS, electronic communication, electronic
database etc
12. IFTA 2013
• Sec 22. Registration of Case on the based on
evidence collected in pursuant of warrant
• 23. Admissibility of warrant based information
• 25. Report of expert ; In case where an
analysis of the intercepted material collected
pursuant to the warrant of surveillance or
interception is required, then the same shall
be carried out by a person referred to in
section 3(f) being suitably qualified
13. IFTA 2013
• 31. Warrants to be served outside Pakistan
• 32. Warrants received from outside Pakistan
• Case Laws
• Qurban Ali V State 2007 PCRLJ 675 KARACHI; held E-
mail could be retrieved from it by using computer
Forensics Tools, Prosecution, in the case had not taken
any effort to prove E-mail in accordance with law.
• WAQAS AHMED SIDDIQUI Vs THE STATE through Cyber
Circle FIA 2012 YLR 320 KARACHI; objectionable email
• Mst. MARIUM HAJI V Mrs. YASMIN R. MINHAS 2003
PLD 148 KARACHI (Evidence based on modern devices,
Pics can be manipulated)
14. Shahid Jamal Tubrazy
Adv. Shahid Jamal Tubrazy is Masters in
Law(LLM), Lahore High Court Lawyer, Lecturer of
Cyber Laws, Speaker, Author & Expert in Cyber
Law & Cyber Security, President – Cyber Law
Consulting(Advocates & Attorneys)
Email: shahy_legal@yahoo.com
Editor's Notes
Cyber Law Statutes
Electronic Transaction Ordinance 2002
Payment System Electronic Funds Transfer Act 2007
Anti-Money Laundering Act 2010
Pakistan Protection Act 2014
PTA Regulation S.R.O 713 (1)/2009