Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.

Slides:



Advertisements
Similar presentations
Cyber Laws in Pakistan Sehrish Mushtaq.
Advertisements

Human Security Act of 2007 Protect life, liberty, and property from acts of terrorism. Condemn terrorism as inimical and dangerous to the national security.
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
International Telecommunication Union Support for Harmonization of the ICT Policies in Sub-Sahara Africa Name of presenter HIPSSA Project.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Workshop on Tanzania National.
UN Comprehensive Study on Cybercrime
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Workshop on Harmonizing Cyberlaw in the ECOWAS region ( Procedural Law in the Budapest Convention ) Ghana, Accra 17 – 21 March 2014, Kofi Annan International.
Legal & Political Issues in International Computer Crime Investigation & Prosecution Jennifer S. Granick m.
Copyright 2010, The World Bank Group. All Rights Reserved. Background and governance Part 1 Crime, Justice & Security Statistics Produced in Collaboration.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
6 August 2015 Rule of law: implementing a comprehensive and integrated approach in prevention and fight against corruption in the Danube region,
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
CYBER CRIME AND SECURITY TRENDS
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
 It is a Criminal Activity Committed On The Internet.  A generalized definition of Cyber Crime May Be “Unlawful Acts wherein the computer is either.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Tackling IT crime in a global context: the Convention on Cybercrime 3 years after Julio Pérez Gil University of Burgos, Spain.
Regional Conference Intellectual Property Crime Bahrain April 2008.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Corporate crime prevention project and Best practices manual Dr. Wybe Th. Douma T.M.C. Asser Institute, The Hague.
Cybersecurity Governance in Ethiopia
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Computer crimes.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Concept Criminalize new types of crime and few of the traditional crimes when committed by computer Criminalize certain acts where : The Computer is the.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
OTHER COUNCIL OF EUROPE CONVENTIONS INTRODUCTION.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
CIVILIAN SECRETARIAT FOR POLICE1 DRAFT POLICY GUIDELINES CIVILIAN SECRETARIAT FOR POLICE BY MINISTER OF POLICE TO BE APPROVED BY PARLIAMENT FOR THE DIRECTORATE.
Workshop on Developing Coordinated Inter-Agency National Plan Of Action To Eradicate Trafficking in Persons Held in Tokyo, JAPAN June,
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
And the additional protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through.
Dr. Heike Neuhaus. Federal Prosecutor General Head of Department Central Tasks; Espionage Staff Espionage 1 Espionage 2 Administration EU IT Espionage.
Development of IT has changed our – societies – commerce – lifestyle (communication, working, shopping) This creates considerable legal problems in many.
ASEAN v Transnational Crime and Terrorism…..an Introduction
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Cyber Laws in Pakistan.
Data Protection Act and Other Laws
Major international instruments on counteracting corruption and organized crime, ratified by Bulgaria UN Convention against Corruption; Council of Europe.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Overview of the Budapest Convention on Cybercrime (2001)
Trafficking in Persons (TIP)
Cybercrime in the election process:
Chapter 6 International crime
Cyber Laws in Pakistan Hassan Khalil.
“MONITORING, EVALUATING AND REPORTING ON THE IMPLEMENTATION OF ANTI-TRAFFICKING LEGISLATION AND POLICIES.“ MAY 23-24, Ms. ANTOANETA.
Preventing Information Technology Crimes
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
CROSS BORDER GATHERING EVIDENCE
Cybercrime legislation and policies in Africa: Issues for discussion
Seminar “Towards Implementation Strategy on International Standards on Economic Statistics in Africa” 6 – 9 July 2010.
UNODC and CYBERCRIME October 2009.
Digital Empowerment of Women in KP
Presentation transcript:

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government of Pakistan The 4th ASEAN Regional Forum (ARF) Seminar on Cyber Terrorism, Busan Korea, October 2007

A Major Step Taken by Pakistan The Cabinet of Pakistan has approved The Preventions of Electronic Crimes Bill 2007 In August 2007

Objectives of Draft Bill to deter actions directed against to deter actions directed against confidentiality confidentiality integrity integrity Illegal accessibility of computer systems Illegal accessibility of computer systems networks and networks and data data misuse of such systems, networks and data misuse of such systems, networks and data to combat such criminal offences, by facilitating to combat such criminal offences, by facilitating detection, detection, investigation investigation search & seizure search & seizure prosecution of such criminal offences prosecution of such criminal offences ICT Tribunal ICT Tribunal

Salient Features It contains definitions of Cyber Crimes and their respective Punishments It contains definitions of Cyber Crimes and their respective Punishments Provisions for prosecution and trial of such crimes Provisions for prosecution and trial of such crimes Provisions for international Cooperation Provisions for international Cooperation

Offences Contain in the Bill Criminal access to data or electronic system. Criminal access to data or electronic system. Data damage Data damage System damage System damage Electronic Fraud Electronic Fraud Electronic Forgery Electronic Forgery Misuse of devices Unauthorized access to code Misuse of encryption Malicious code Cyber stalking

…cont Offences Spamming Spamming Fake website to deceive or gain personal information Fake website to deceive or gain personal information Unauthorized interception Unauthorized interception Cyber Terrorism Cyber Terrorism Attempt and aiding or abetting Corporate liability

Draft Bill (POWERS OF INVESTIGATION) Provisions for investigations by Socialized Investigating Agency which is FIA. Provisions for investigations by Socialized Investigating Agency which is FIA. Power of I.O. to access computer and data. Power of I.O. to access computer and data. Expedited preservation of evidence. Expedited preservation of evidence. Real-time collection of traffic data. Real-time collection of traffic data. Trans-border access. Trans-border access.

Draft Bill (INTERNATIONAL CO-OPERATION) International co-operation International co-operation Territorial scope of offences Territorial scope of offences

Draft Bill (TRIAL OF OFFENCES) Majority of offences are compoundable Majority of offences are compoundable Majority of the crimes are non-cognizable Majority of the crimes are non-cognizable Trial of offences by ICT Tribunal. Trial of offences by ICT Tribunal. Order for payment of compensation Order for payment of compensation

What are Serious Crimes under this Law? Cyber Terrorism or Threat to Cyber Terrorism. Cyber Terrorism or Threat to Cyber Terrorism. Electronic Fraud, Electronic Forgery and Cyber Stalking if committed with any Minor Electronic Fraud, Electronic Forgery and Cyber Stalking if committed with any Minor The Punishment of these crimes are 7 years imprisonment or more, they are non- bailable and non compoundable. The Punishment of these crimes are 7 years imprisonment or more, they are non- bailable and non compoundable.

The composition of ICT Tribunal? It will have maximum of Seven Members including one as its Chairman. It will have maximum of Seven Members including one as its Chairman. Tribunal may be assisted by Amicus Curiae. Tribunal may be assisted by Amicus Curiae. Principal seat will be in Islamabad. Principal seat will be in Islamabad. The Chairman will have powers to make benches. The Chairman will have powers to make benches.

What Will be Achieved by this Law ? A sense of safety and protection will prevail in all sections of society that deal with IT. A sense of safety and protection will prevail in all sections of society that deal with IT. It will curb the electronic crimes in the country. It will curb the electronic crimes in the country. Pakistan will become more safe place for IT business. Pakistan will become more safe place for IT business. It will enhance confidence of our international partners in IT It will enhance confidence of our international partners in IT IT will provide safer environment for electronic transactions consequently boost e-Banking and e-Commerce in Pakistan. IT will provide safer environment for electronic transactions consequently boost e-Banking and e-Commerce in Pakistan. It will help Pakistan in moving towards paper free economy more confidently. It will help Pakistan in moving towards paper free economy more confidently.

Thanks