Cyber Laws in Pakistan Sehrish Mushtaq.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Boyertown Area School District Acceptable Use Policy.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Riverside Community School District
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Copyright © 2009 by Pearson Prentice Hall. All rights reserved. PowerPoint Slides to Accompany CONTEMPORARY BUSINESS AND ONLINE COMMERCE LAW 6 th Edition.
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
“Cyber Crime in India”
Unethical use of Computers and Networks
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 17 E-Commerce and Digital Law
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Cybercrime What is it, what does it cost, & how is it regulated?
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Computer crimes.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cyber Law And Ethics And Ethics.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Digital Crimes Cell Phone Computer. Malicious Use of a Telephone MCL e Threatening physical harm or damage to a person or property in the course.
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Chapter 15 Internet Law and E-Commerce
GCSE ICT SECURITY THREATS.
Cyber Laws in Pakistan.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Overview of the Budapest Convention on Cybercrime (2001)
Forensic and Investigative Accounting
Cyber Laws in Pakistan Hassan Khalil.
Chapter 13 E-Commerce Contracts
Digital Empowerment of Women in KP
Presentation transcript:

Cyber Laws in Pakistan Sehrish Mushtaq

Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as Committing fraud Stealing identities Violating privacy

Cyber Crime It is also include traditional crimes in which computers or networks are used to enable the illicit activity. As the computer has become central to commerce, entertainment, and government. Cyber crime has grown in importance.

Cyber Crime Examples: E-mail account of a Federal Minister is hacked. Credit cards frauds reach to an alarming level. Visiting CEOs of Multinational Companies gets threatening E-mails. Financial institutions are the favourite targets of Cyber criminals --- worstly effecting the technological progress in the area of e –Commerce.

Cyber Laws The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is an intersection of many legal fields, like: Intellectual property, Privacy Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet

Cyber Laws in the World Electronic Commerce Act (Ireland) Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore) Electronic Transactions Ordinance (Hong Kong) Information Technology Act (India) Information Communication Technology Act Draft (Bangladesh)

Cyber Laws in Pakistan There are different laws, promulgated in Pakistan. These laws not only deal with crime of Internet These deal with all dimensions related to computer & networks. Two of them are most known. They are: Electronic Transaction Ordinance 2002 Electronic / Cyber Crime Bill 2007

Electronic Transaction Ordinance 2002 Overview The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers. A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally. Laid the foundation for comprehensive Legal Infrastructure. It is heavily taken from foreign law related to cyber crime.

Pre-ETO 2002 No recognition of electronic documentation No recognition of electronic records No recognition of evidential basis of documents/records Failure to authenticate or identify digital or electronic signatures or forms of authentication No online transaction could be legally binding Electronic Data & Forensic Evidence not covered. No Rules

ETO 2002 Sections There are 43 sections in this ordinance It deals with following 8 main areas relating to e-Commerce. Recognition of Electronic Documents Electronic Communications Digital Signature regime and its evidential consequences Web Site & Digital Signatures Certification Providers Stamp Duty Attestation, notarization, certified copies Jurisdiction Offences

ETO 2002 Important Sections are: 36. Violation of privacy information gains or attempts to gain access to any information system with or without intent to acquire the information Gain Knowledge Imprisonment 7 years Fine Rs. 1 million

ETO 2002 37. Damage to information system, etc. alter, modify, delete, remove, generate, transmit or store information to impair the operation of, or prevent or hinder access to, information knowingly not authorised Imprisonment 7 years Fine Rs. 1 million

ETO 2002 38. Offences to be non-bailable, compoundable and cognizable All offences under this Ordinance shall be non-bailable, compoundable and cognizable. 39. Prosecution and trial of offences. No Court inferior to the Court of Sessions shall try any offence under this Ordinance.

Post ETO 2002 Electronic Documentation & Records recognized Electronic & Digital forms of authentication & identification given legal sanctity Messages through email, fax, mobile phones, Plastic Cards, Online recognized.

Electronic/Cyber Crime Bill 2007

Overview “Prevention of Electronic Crimes Ordinance, 2007″ is in force now It was promulgated by the President of Pakistan on the 31st December 2007 The bill deals with the electronic crimes included: Cyber terrorism Data damage Electronic fraud Electronic forgery Unauthorized access to code Cyber stalking Cyber Spamming/spoofing

Electronic/Cyber Crime Bill 2007 It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cyber crimes It will apply to every person who commits an offence, irrespective of his nationality or citizenship. It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.

Punishments Under this law there are defined punishment for the offence. Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.

Imprisonment (years) Fine Offence Imprisonment (years) Fine Criminal Access 3 3 Lac Criminal Data Access Data Damage System Damage Electronic Fraud 7 7 Lac Electronic Forgery Misuse of Device Unauthorized access to code Malicious code 5 5 Lac Defamation Cyber stalking Cyber Spamming 6 months 50,000 Spoofing Pornography 10 ----- Cyber terrorism Life 10 Million

Sections Data Damage: Punishment: Whoever with intent to illegal gain or cause harm to the public or any person, damages any data, shall come under this section. Punishment: 3 years 3 Lac

Electronic/Cyber Crime Bill 2007 Electronic fraud: People for illegal gain get in the way or use any data, electronic system or device or with intent to deceive any person, which act or omissions is likely to cause damage or harm. Punishment: 7 years 7 Lac

Electronic/Cyber Crime Bill 2007 Electronic Forgery: Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in unauthentic data that it be considered or acted upon for legal purposes as if it were authentic, regardless of the fact that the data is directly readable and intelligible or not. Punishment: 7years 7 Lac

Electronic/Cyber Crime Bill 2007 Malicious code: Whoever willfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or device, with intent to cause harm to any electronic system or resulting in the theft or loss of data commits the offence of malicious code. Punishment: 5 years 5 Lac

Electronic/Cyber Crime Bill 2007 Cyber stalking: Whoever with intent to harass any person uses computer, computer network, internet, or any other similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, picture or image. Make any suggestion or proposal of an obscene nature Threaten any illegal or immoral act Take or distribute pictures or photographs of any person without his consent or knowledge Commits the offence of cyber stalking. 3 Years 3 Lac

Electronic/Cyber Crime Bill 2007 Spamming: Whoever transmits harmful, fraudulent, misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient, involves in falsified online user account registration or falsified domain name registration for commercial purpose commits the offence of spamming. Punishment: 6 month 50,000

Electronic/Cyber Crime Bill 2007 Spoofing: Whoever establishes a website, or sends an electronic message with a counterfeit source intended to be believed by the recipient or visitor or its electronic system to be an authentic source with intent to gain unauthorized access or obtain valuable information Later, Information can be used for any lawful purposes commits the offence of spoofing. 3 Years 3 Lac

Electronic/Cyber Crime Bill 2007 Cyber terrorism: Any person, group or organization who, with terroristic intent utilizes, accesses or causes to be accessed a computer or computer network or electronic system or device or by any available means, knowingly engages in or attempts to engage in a terroristic act commits the offence of cyber terrorism. Punishment Whoever commits the offence of cyber terrorism and causes death of any person shall be punished with death Or imprisonment for life, and with fine Otherwise he shall be punishable with imprisonment of ten years or with fine ten million rupees

Crimes Reported in Pakistan A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006. Offences 2006 2005 Total IPR Crimes 14 20 34 Spurious Drugs 37 30 67 Cyber Crimes 33 24 57 Counterfeit Currencies 7 2 9 Others 105 148 253 Total: 196 224 420