Digital Empowerment of Women in KP

Slides:



Advertisements
Similar presentations
Cyber Laws in Pakistan Sehrish Mushtaq.
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
By Andy Scott, Michael Murray and Adam Kanopa
Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Sri Lankan perspective in meeting the Cyber crime challenge
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Identity Theft “When Bad Things Happen To Your Good Name” Federal Trade Commission.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Materials Developed By: CLARIFI CLARIFI ID Theft & Scams Don’t be a Victim.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
“Cyber Crime in India”
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Identity Theft.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
WHO’s IN YOUR “WALLET” WHO’s IN YOUR “WALLET” YOU BETER “RECOGNIZE” YOU BETER “RECOGNIZE” STEPPING $2o0 $300 $400 $500 $400 $300 $200 $500 $400 $300.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Information Systems Unit 3.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Comprehensive Volume, 18 th Edition Chapter 8: Crimes.
Computer crimes.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Presenter: Shelley King University of KwaZulu-Natal, South Africa The slow development of legislature in South Africa to combat human trafficking- Challenges.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Year 8 Assembly Internet Safety.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
GCSE ICT SECURITY THREATS.
Cyber Laws in Pakistan.
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
● SmartLaw Cyberbullying.
Overview of the Budapest Convention on Cybercrime (2001)
>> PETTY THEFT<<
Cyber Laws in Pakistan Hassan Khalil.
Harmful Digital Communications Act 2015 URLs
Protecting Your Credit Identity
Adult business digital marketing. What to Expect from adult digital marketing.
The E-Commerce Act and the Right to Privacy
Deputy Chief Officer CHIEF OF DEPARTMENT Police Inspector
Security in mobile technologies
Security of network and information systems
DhakaCom Bangladesh Cyber Security Status Global Perspective Mohammad Fakrul Alam dhakaCom Limited fakrul [at] dhakacom [dot] com
Laws Against Computer Hacking
Digital Empowerment of Women in KP
Digital Empowerment of Women in KP
According to the provisions
Presentation transcript:

Digital Empowerment of Women in KP

Prevention of Electronic Crimes Act, 2016

What is the Act About? The Act provides a comprehensive legal framework that defines various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in relation to electronic crimes.

Offenses and Punishments Articles Content Section 3 Any unauthorized access to an information system is an offence; punishment of up to three months or fine up to Rs. 50,000, or both. Section 4 Unauthorized copying or transmission of data; punishment up to six months or fine up to Rs 100,000, or both. Section 5 Interference or damage to an information system; punishment of up to two years or fine up to Rs 500,000, or both.

Offenses and Punishments Articles Content Section 6 Unauthorized access to a critical infrastructure information system (which is an information system that supports critical infrastructure that is infrastructure necessary for essential services in the country); punishment of up to three years or fine up to Rs 1 million, or both. Section 7 Unauthorized copying or transmission of critical infrastructure data; punishment of up to five years or fine up to Rs 5 million, or both.

Offenses and Punishments Articles Content Section 8 Interference or damage of critical infrastructure data or information system; punishment of up to seven years or fine up to Rs 10 million, or both. Section 12 Electronic fraud; punishment of up to two years or fine up to Rs 10 million, or both. Section 13 Making obtaining or supplying device, data, or information system used in an offence; punishment of up to six months in jail or fine of up to Rs 50,000, or both.

Offenses and Punishments Articles Content Section 14 Unauthorized use of identity information of another person; punishment of op to three years or fine of up to Rs. 5 million, or both. Section 15 Unauthorized issuance of SIM cards; punishment of up to three years or a fine of up to Rs. 500,000, or both. Section 16 Tampering with communication information; punishment of up to three years or a fine of up to Rs. 1 million, or both.

Offenses and Punishments Articles Content Section 17 Unauthorized interception of transmission; punishment of up to two years or a fine of up to Rs 500,000, or both. Section 18 Offences against a natural person; punishment of up to three years or a fine of up to Rs 1 million, or both. Section 19 Offences against the modesty of a natural person or minor; punishment of up to seven years or fine of up to Rs 5 million, or both.

Offenses and Punishments Articles Content Section 20 Writing offering or making available of malicious code is an offence; punishment of up to two years or fine of Rs 1 million, or both. Section 21 Cyber stalking: For adult victims, punishment of up to three years or fine of Rs 1 million or both. For minor victims, punishment of up to five years or fine of Rs 10 million, or both.

Offenses and Punishments Articles Content Section 22 Spamming: Fine of up to Rs 50,000 for the first offence; fine between Rs 50,000 and 1 million for the subsequent offences. Section 23 Spoofing i.e. false websites etc. with dishonest intent; punishment of up to three years imprisonment or fine of Rs 500,000, or both.

Know More Content Web-Link Federal investigation Agency (FIA) http://www.fia.gov.pk National Response Centre for Cyber Crime (NR3C), Department of FIA http://www.nr3c.gov.pk/ Online complaint Application http://complaint.fia.gov.pk/

Hayatabad, Peshawar, KPK Contact Destination Contact Details National Response Centre for Cyber Crime (NR3C) Head-Quarters Postal Address: 2nd Floor, National Police Foundation Building , Mauve Area, Sector G-10/4, Islamabad, Pakistan. Phone: +92 51 9106384 Fax: +92 51 9106383 Email: helpdesk@nr3c.gov.pk National Response Centre for Cyber Crime (NR3C) Peshawar Postal Address: Opposite RMI Hospital, Phase 5, Hayatabad, Peshawar, KPK Phone: +92 91 9217109