SlideShare a Scribd company logo
Present Cyber Laws and Discovery of
Digital Evidence in Pakistan
Introduction of Cyber laws and
Discovery of Digital Evidence Forensic
Laws
Cyber Law Statutes
• Electronic Transaction Ordinance 2002
• Payment System Electronic Funds Transfer Act
2007
• Anti-Money Laundering Act 2010
• Pakistan Protection Act 2014
• PTA Regulation S.R.O 713 (1)/2009
• Investigation of Fair Trial Act 2013
• Qanun -e-Shahdat Order 1984 amended
ETO 2002 Cyber Law Offences
• Section 34, 35 of ETO covered the offences by
corporate body, punishment is 10 year and fine
10 million or both
• Sec. 36 of ETO is about Violation of privacy of
information, unauthorized access to information
system, punishment 7 years and fine one million
• Sec. 37 of ETO Damage to information system,
unauthorized alter, delete, modify, remove ,
transmit etc; punishment 7 years and one million
PSEFTA 2007 Cyber Law Offences
• 56. Criminal Liability; providing false information,
corporate offence, punish 3 yrs fine 3 million
• 57. Violations Affecting Electronic Commerce; whoever
uses or attempts or conspires to use any counterfeit,
fictitious, altered, forged, lost, stolen, or fraudulently
obtained Debit Instrument to obtain money etc, punish
7 yrs, one million
• 58. Cheating by Use of Electronic Device; Whosoever
cheats , fraudulently or dishonestly uses any credit or
debit card, or code or any other means of access to an
Electronic Fund Transfer device and thereby causes any
wrongful gain to him, punish 7 yrs and fine
Anti Money Laundering Act 2010
• The section 2 f (v) of Anti-money Laundering
Act 2010 recognizes the electronic money and
the record maintained in the electronic
device.
Pakistan Protection Act 2014
• Crimes via internet and information technology
against state and state owned institutions may be
cybercrimes. The section 2(i) provides a schedule
in The Pakistan Protection Act 2014 which sets
the schedule cybercrimes as;
• (ix) destruction of or attack on communication
and interaction lines, devices, grids, stations, or
systems etc
• (xiv) crimes against computers including
cybercrimes, internet offenses and other offences
related to information technology etc
PTA Regulations
• PTA has issued S.R.O 713 (1)/2009 against
spams which is called, Protection from Spam,
Unsolicited, Fraudulent an Obnoxious
Communication Regulations 2009
• PTA in its letter No. 1609/11/N&TA to all
CMTOs has restrain from sending SMS contain
bar-code or Masking
COPYRIGHT PROTECTION UNDER
COPYRIGHT ORDINANCE 1962
• Section 66 of the Ordinance, as amended by
the Amendment Act, provides that any person
who knowingly infringes or abets the
infringement of the copyright in a work
(defined to include computer programmes), or
any other right conferred by the Ordinance
shall be punishable with imprisonment which
may extend to 3 years with fine
QANUN -E-SHAHDAT ORDER 1984
• While enacting the ETO 2002 the QSO 1984 has
been amended
• Art 2 (e); (f) the expression, “automated”,
“electronic”, “information”, “information system”,
“electronic document”, “electronic signature etc
shall bear the meanings given in the ETO 2002
• Addition in Art. 30; “Statements gene rated by
automated information systems may be
attributed to the person exercising power or
control over the said information system”
QSO 1984
• Addition in Art. 46 A for Relevance of information
generated, received or recorded by automated information
system.
• Art 59 is about the authenticity or integrity of electronic
record.
• Art. 73 A printout or other form of output of an automated
information system shall not be denied the status of
primary evidence.
• Art. 78-A. Proof of electronic signature and electronic
document.
• Art. 85 is about certificates deposited in a repository.
• Case Law; Alamgir Khalid Chughtai V State 2009 PLD
254 Lahore
Investigation of Fair Trial Act 2013
• Preamble; An Act to provide for investigation for
collection of evidence by means of modern
techniques and devices
• To regulate advance and modern investigative
techniques such as covert surveillance and
human intelligence, property interference,
wiretapping and communication interception
• 16. Authorization under the warrant; video
recording, intercepting telephone, obtaining
email, SMS, electronic communication, electronic
database etc
IFTA 2013
• Sec 22. Registration of Case on the based on
evidence collected in pursuant of warrant
• 23. Admissibility of warrant based information
• 25. Report of expert ; In case where an
analysis of the intercepted material collected
pursuant to the warrant of surveillance or
interception is required, then the same shall
be carried out by a person referred to in
section 3(f) being suitably qualified
IFTA 2013
• 31. Warrants to be served outside Pakistan
• 32. Warrants received from outside Pakistan
• Case Laws
• Qurban Ali V State 2007 PCRLJ 675 KARACHI; held E-
mail could be retrieved from it by using computer
Forensics Tools, Prosecution, in the case had not taken
any effort to prove E-mail in accordance with law.
• WAQAS AHMED SIDDIQUI Vs THE STATE through Cyber
Circle FIA 2012 YLR 320 KARACHI; objectionable email
• Mst. MARIUM HAJI V Mrs. YASMIN R. MINHAS 2003
PLD 148 KARACHI (Evidence based on modern devices,
Pics can be manipulated)
Shahid Jamal Tubrazy
Adv. Shahid Jamal Tubrazy is Masters in
Law(LLM), Lahore High Court Lawyer, Lecturer of
Cyber Laws, Speaker, Author & Expert in Cyber
Law & Cyber Security, President – Cyber Law
Consulting(Advocates & Attorneys)
Email: shahy_legal@yahoo.com

More Related Content

What's hot

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
Shahid Jamal Tubrazy
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
n|u - The Open Security Community
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
Hardik Solanki
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
fiza209
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
Neeraj Aarora
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
V'vek Sharma
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Raja Farhan Saeed
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
Shankey Gupta
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 

What's hot (20)

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 

Viewers also liked

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimesrharrisonaz
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
Dhurba Mainali
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009ClubHack
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
Michael Roa
 

Viewers also liked (12)

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 

Similar to Present Cyber Laws and Discovery of Digital Evidence

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
Sneha J Chouhan
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
JulainaMehraj
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
Himanshu Jawa
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
pattok
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
Dr. Prashant Vats
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Jahid Khan Rahat
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
kinjal vaghela
 
cyberlaw
cyberlawcyberlaw
cyberlaw
divyaanjali8
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
Dr. Prashant Vats
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Dr. Prashant Vats
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2
Charles Mok
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
22010122059
 
IT ACT 2000
IT ACT 2000IT ACT 2000
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
priya rana
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
shrinivas kulkarni
 

Similar to Present Cyber Laws and Discovery of Digital Evidence (20)

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 

Recently uploaded

Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 

Recently uploaded (20)

Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 

Present Cyber Laws and Discovery of Digital Evidence

  • 1. Present Cyber Laws and Discovery of Digital Evidence in Pakistan Introduction of Cyber laws and Discovery of Digital Evidence Forensic Laws
  • 2. Cyber Law Statutes • Electronic Transaction Ordinance 2002 • Payment System Electronic Funds Transfer Act 2007 • Anti-Money Laundering Act 2010 • Pakistan Protection Act 2014 • PTA Regulation S.R.O 713 (1)/2009 • Investigation of Fair Trial Act 2013 • Qanun -e-Shahdat Order 1984 amended
  • 3. ETO 2002 Cyber Law Offences • Section 34, 35 of ETO covered the offences by corporate body, punishment is 10 year and fine 10 million or both • Sec. 36 of ETO is about Violation of privacy of information, unauthorized access to information system, punishment 7 years and fine one million • Sec. 37 of ETO Damage to information system, unauthorized alter, delete, modify, remove , transmit etc; punishment 7 years and one million
  • 4. PSEFTA 2007 Cyber Law Offences • 56. Criminal Liability; providing false information, corporate offence, punish 3 yrs fine 3 million • 57. Violations Affecting Electronic Commerce; whoever uses or attempts or conspires to use any counterfeit, fictitious, altered, forged, lost, stolen, or fraudulently obtained Debit Instrument to obtain money etc, punish 7 yrs, one million • 58. Cheating by Use of Electronic Device; Whosoever cheats , fraudulently or dishonestly uses any credit or debit card, or code or any other means of access to an Electronic Fund Transfer device and thereby causes any wrongful gain to him, punish 7 yrs and fine
  • 5. Anti Money Laundering Act 2010 • The section 2 f (v) of Anti-money Laundering Act 2010 recognizes the electronic money and the record maintained in the electronic device.
  • 6. Pakistan Protection Act 2014 • Crimes via internet and information technology against state and state owned institutions may be cybercrimes. The section 2(i) provides a schedule in The Pakistan Protection Act 2014 which sets the schedule cybercrimes as; • (ix) destruction of or attack on communication and interaction lines, devices, grids, stations, or systems etc • (xiv) crimes against computers including cybercrimes, internet offenses and other offences related to information technology etc
  • 7. PTA Regulations • PTA has issued S.R.O 713 (1)/2009 against spams which is called, Protection from Spam, Unsolicited, Fraudulent an Obnoxious Communication Regulations 2009 • PTA in its letter No. 1609/11/N&TA to all CMTOs has restrain from sending SMS contain bar-code or Masking
  • 8. COPYRIGHT PROTECTION UNDER COPYRIGHT ORDINANCE 1962 • Section 66 of the Ordinance, as amended by the Amendment Act, provides that any person who knowingly infringes or abets the infringement of the copyright in a work (defined to include computer programmes), or any other right conferred by the Ordinance shall be punishable with imprisonment which may extend to 3 years with fine
  • 9. QANUN -E-SHAHDAT ORDER 1984 • While enacting the ETO 2002 the QSO 1984 has been amended • Art 2 (e); (f) the expression, “automated”, “electronic”, “information”, “information system”, “electronic document”, “electronic signature etc shall bear the meanings given in the ETO 2002 • Addition in Art. 30; “Statements gene rated by automated information systems may be attributed to the person exercising power or control over the said information system”
  • 10. QSO 1984 • Addition in Art. 46 A for Relevance of information generated, received or recorded by automated information system. • Art 59 is about the authenticity or integrity of electronic record. • Art. 73 A printout or other form of output of an automated information system shall not be denied the status of primary evidence. • Art. 78-A. Proof of electronic signature and electronic document. • Art. 85 is about certificates deposited in a repository. • Case Law; Alamgir Khalid Chughtai V State 2009 PLD 254 Lahore
  • 11. Investigation of Fair Trial Act 2013 • Preamble; An Act to provide for investigation for collection of evidence by means of modern techniques and devices • To regulate advance and modern investigative techniques such as covert surveillance and human intelligence, property interference, wiretapping and communication interception • 16. Authorization under the warrant; video recording, intercepting telephone, obtaining email, SMS, electronic communication, electronic database etc
  • 12. IFTA 2013 • Sec 22. Registration of Case on the based on evidence collected in pursuant of warrant • 23. Admissibility of warrant based information • 25. Report of expert ; In case where an analysis of the intercepted material collected pursuant to the warrant of surveillance or interception is required, then the same shall be carried out by a person referred to in section 3(f) being suitably qualified
  • 13. IFTA 2013 • 31. Warrants to be served outside Pakistan • 32. Warrants received from outside Pakistan • Case Laws • Qurban Ali V State 2007 PCRLJ 675 KARACHI; held E- mail could be retrieved from it by using computer Forensics Tools, Prosecution, in the case had not taken any effort to prove E-mail in accordance with law. • WAQAS AHMED SIDDIQUI Vs THE STATE through Cyber Circle FIA 2012 YLR 320 KARACHI; objectionable email • Mst. MARIUM HAJI V Mrs. YASMIN R. MINHAS 2003 PLD 148 KARACHI (Evidence based on modern devices, Pics can be manipulated)
  • 14. Shahid Jamal Tubrazy Adv. Shahid Jamal Tubrazy is Masters in Law(LLM), Lahore High Court Lawyer, Lecturer of Cyber Laws, Speaker, Author & Expert in Cyber Law & Cyber Security, President – Cyber Law Consulting(Advocates & Attorneys) Email: shahy_legal@yahoo.com

Editor's Notes

  1. Cyber Law Statutes Electronic Transaction Ordinance 2002 Payment System Electronic Funds Transfer Act 2007 Anti-Money Laundering Act 2010 Pakistan Protection Act 2014 PTA Regulation S.R.O 713 (1)/2009