SlideShare a Scribd company logo
1 of 9
Cybercrime act of Pakistan (2015)
Cybercrime:
Computer Crime or Cybercrime is any crimethat involves
a computer and a network. (Also known as hacking) The computer may have
been used in the commission of a crime, or it may be the target. Net crime
is criminalexploitation of the internet, inherently a Cybercrime.
Types of Cybercrime
Types Examples
Financial Crimes Cheating, credit card frauds, money
laundering etc.
Sale of illegal
articles
Sale of narcotics, weapons and wildlife etc.,
through websites or email communication.
Online gambling Online gambling, money laundering etc.
Intellectual
property crimes
Software piracy, copyright infringement,
trademarks violations, theft of compute
source code etc.
Email spoofing Sending e-mails that appear to originate
from one source but actually has been sent
from another source.
Forgery Counterfeit currency notes, postage and
revenue stamps, mark sheets etc.
Cyber Defamation Publishing/distributing defamatory matter
about someone.
Unauthorized
access to
computer system
Hacking.
or networks
Theft of
information in
electronic form
Stealing information on computer hard
disks, removable storage media etc.
Email bombing Sending a large number of emails crashing
email accounts or servers.
Data diddling Altering data.
Salami attacks Commissioning financial crimes.
Denial of service
attack
Flooding systems by
sendingexcessivedemands etc.
Virus attacks Spread of viruses and worms.
Logic bombs Triggering programs at events.
Trojan attacks Unauthorized programs.
Internet time theft Stealing internet hours.
Web jacking Stealing control over websites.
Theftor damaging
of computer
system
Theft of a computer, peripherals etc.
Unauthorized
access
The Cybercrime of “gaining entry into,
instructing or communicating with the
logical, arithmetical, or memory function
resources of a computer, computer system
or computer network”11 known as access
has the greatest impact Packet sniffing,
tempest attack,password cracking and
buffer overflow etc. are some techniques for
gaining access.
Offences and Punishments
Illegal access to information system:
1. Cause an information system to perform any function with intent to
secure access to the whole or any part of any information system or to
enable any such access to be secured ;
2. At the time, when he causes the information system to perform the
function he knows that the access he intends to secure or to be enable
to be secured is unauthorized under this section.
Fine Punishment Both
6 Months 100,000PKR Yes
Illegal access to program or data:
(a) Whoever intentionally, whether temporarily or not,
1. Causes to any program or data to be secured or to be enabled.
2. The access to the program or data he intends to secure, or to
enable to be secured, is unauthorized under this section.
3. At the time, when he accesses the program or data he knows that
the access he intends to secure, or to enable to be secured, is
unauthorized under this section.
Fine Punishment Both
200,000PKR 9 Months Yes
(b) Whoever recklessly, whether temporarily or not,
1. Causes to any program or data to be secured or to be enabled.
2. The access to the program or data he intends to secure, or to
enable to be secured, is unauthorized under this section.
3. At the time, when he accesses the program or data he knows that
the access he intends to secure, or to enable to be secured, is
unauthorized under this section.
Fine Punishment Both
100,000PKR 6 Months Yes
Illegal Interface with Program or Data:
(a)Whoever intentionally, whether temporarily or not, does any
unauthorized act in relation to an information system, or at
the time when he does the act he knows that it is
unauthorized, and acts with intent;
1. To destroy, damage, delete, erase, generate, modify or alter
any program or data;
2. To render any program or data inaccessible, meaningless,
useless or ineffective;
3. To obstruct, interface or interrupt with any program or data or
any aspect or attribute related to the program or data;
4. To obstruct, interface or interrupt with any person in the use
of any program or data or any aspect or attribute related
to the program or data;
5. To deny, prevent, suppress or hinder access to any program or
data to any person entitled to it;
6. To impair the operation of any program or any aspect or
attribute related to the program or data;
Fine Punishment Both
500,000PKR 3 Years Yes
(a) Whoever recklessly, whether temporarily or not, does any
unauthorized act in relation to an information system, or at
the time when he does the act he knows that it is
unauthorized, and acts with intent;
1. Causing destruction, damage, deletion, eraser, generation
modification or alteration of any program or data or any
aspect or attribute related to the program or data;
2. Rendering any program or data meaningless, useless or
ineffective;
3. Causing impairment to the operation of any program;
4. Causing impairment to the reliability of any program or data
or any aspect or attribute related to the program or data;
5. Causing denial, suppression or hindrance of access to any
program or data or any aspect or attribute related to the
program or data;
Fine Punishment Both
250,000PKR 2 Years Yes
Illegal Interface with Information System:
(a) Whoever intentionally, whether temporarily or not, does any
unauthorized access in relation to an information system, at the
time when he does the act he knows that is unauthorized, and
acts with intent to severely;
1. Interfere, hinder, damage, prevent, suppress, impair or obstruct
the functioning of an information system;
2. Interfere with or hinder access to any information system;
3. Impair the operation of any information system;
4. Impair the reliability of any information system;
5. Impair the security of any information system;
Fine Punishment Both
500,000PKR 5 Years yes
(b)Whoever recklessly, whether temporarily or not, does any
unauthorized access in relation to an information system, at the
time when he does the act he knows that is unauthorized, and
acts recklessly thereby cause severe;
1. Interference, damage, hindrance, prevention, suppression or
obstruction to the function of an information system;
2. Interference or hindrance to the access of any information
system;
3. Impairment to the operation of any information system;
4. Impairment to the reliability of any information system;
5. Impairment to the security of any information system;
Fine Punishment Both
250,000PKR 2 years Yes
(c)Whoever commits any offence under sub-section (a) By
circumventing or infringing security with respect to any
information system, program or data shall be punished with
imprisonment of
Fine Punishment Both
500,000PKR 3 Years Yes
(d) Whoever commits any offenceunder sub-section (b) by
circumventing or infringing security with respect to any
information system, programor data shall be punished with
imprisonmentof
Fine Punishment Both
250,000PKR 2 Years Yes
(d) Whoever commits any offence under sub section (a) with respect
to any Government controlled critical infrastructure information
system; program or data that performs a critical public function
shall be punished with imprisonment of
Fine Punishment Both
7000000 PKR 7 Years Yes
Cyber Terrorism:
(a) Whoever commits or threatens to commit any of the offences
under
1. The use or threat is designed to coerce, intimidate, overawe or
create a sense of fear in Government or public section.
2. The use or threat of purposes the advancing of the cause
where political or religious with intention of—
3. Interfering or disrupting the system,
4. Severe interfere, serious disrupting or damaging the payment
system of multiple institutions,
5. Severe Interfere, seriously damage the system at the public
scale,
6. Severe interfere, serious disrupting or damaging the system of
Civil forces, Armed forces and security forces,
Fine Punishment Both
50,000,000 PKR 14 Years Yes
Electronic Forgery:
(a) Whoever;
1. Without authority,
2. In excess of authority,
3. Through an unauthorized act,
Inputs, generates, modifies, delete or suppress data resulting
in inauthentic data with any person or an information system
shall be punished,
Fine Punishment Both
250,000PKR 2 Years Yes
(b)Whoever commits any offence;
1. for wrongfulgain;
2. for wrongfulloss;
3. for any economic benefit for oneself or for another person,
Fine Punishment Both
250,000PKR 2 Years Yes
(c) Whoever commits any offence, fraudulently, dishonestly or
with similar intent;
1. To influence the public servantin the exercise of a public duty;
2. To influence a Governmentcontrolled information systemor
public information system
Shall be punished
Fine Punishment Both
500,000PKR 3 Years Yes
Electronic Fraud:
Whoever with fraudulent or dishonest intent;
1. Without authority;
2. In excess of authority;
3. Through an unauthorized act;
4. Any illegal access to information system;
5. Any input, alteration or deletion or suppression theprogramor
data
6. Any inference or hindrance data;
7. Copying , transferring the data or moving to any other
information system
i. Wrongful gain;
ii. Wrongful loss;
iii. Any economic benefit for oneself or another person;
Shall be punished
Fine Punishment Both
10,000,000PKR 5 Years Yes
Making, Supplying or obtaining devices for use in offence:
1. Whoever produces, makes any device intending it primarily to
be used or believing that it is primarily to be used to commit;
Fine Punishment Both
50,000 PKR 6 Months Yes
2. Whoever transfer, imports, shares or distributes any device
that it to be primarily used to commit;
Fine Punishment Both
100,000 PKR 1 Years Yes
Identify Crime:
1. Whoever knowingly obtains or process of any person’s
identity information without law justification and use in
offensivework shallbe punished;
Fine Punishment Both
50,000 PKR 3 Months Yes
2. Whoever transmits or makes available identity of any
person without permission for Fraud or deceit etc shall be
punished ;
Fine Punishment Both
100,000 PKR 6 Months Yes
Special Protection of Women:
1. Whoever knowingly or publically displays electronic
communication that harms the reputation of women,
threatens sexual acts against women or any explicit images
Shall be punished
Fine Punishment Both
10,000,00 PKR 1 Year Yes

More Related Content

What's hot

Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTHamza Khalid
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...Vishni Ganepola
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 

What's hot (20)

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 

Viewers also liked

Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-Rafique Ahmed
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal codeAqib Memon
 
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990Anthony Williams
 
Pakistan Taxation System - Law Presentation
Pakistan Taxation System - Law PresentationPakistan Taxation System - Law Presentation
Pakistan Taxation System - Law PresentationOmer Sharif Madni
 
Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015Anthony Williams
 
Labour law presentation
Labour law presentationLabour law presentation
Labour law presentationMalik Sheraz
 

Viewers also liked (10)

Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-Business Law Presentaion-Outlines-
Business Law Presentaion-Outlines-
 
Law of labor
Law of laborLaw of labor
Law of labor
 
Pakistan penal code
Pakistan penal codePakistan penal code
Pakistan penal code
 
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
Finance act 2016 (Pakistan) Worry-Some Provisions of Sales Tax Act 1990
 
Contract law
Contract lawContract law
Contract law
 
Pakistan Taxation System - Law Presentation
Pakistan Taxation System - Law PresentationPakistan Taxation System - Law Presentation
Pakistan Taxation System - Law Presentation
 
Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015Complete List of Labour laws of Pakistan as at June 2015
Complete List of Labour laws of Pakistan as at June 2015
 
Labour Law Pakistan
Labour Law PakistanLabour Law Pakistan
Labour Law Pakistan
 
NGOs in pakistan
NGOs in pakistanNGOs in pakistan
NGOs in pakistan
 
Labour law presentation
Labour law presentationLabour law presentation
Labour law presentation
 

Similar to Cybercrime act of Pakistan 2015 Report

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRajshekar786
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfbadangayonmgb
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondBenjamin Ang
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000PrakharPrasoon
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...Benjamin Ang
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 

Similar to Cybercrime act of Pakistan 2015 Report (20)

Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
New developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyondNew developments in cyber law - Singapore and beyond
New developments in cyber law - Singapore and beyond
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Information Technology Act, 2000
Information Technology Act, 2000Information Technology Act, 2000
Information Technology Act, 2000
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
Shilpa
ShilpaShilpa
Shilpa
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber laws uk
Cyber laws ukCyber laws uk
Cyber laws uk
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Cyber law
Cyber law Cyber law
Cyber law
 

More from Abdul Rehman

PTCL and other Networks In Pakistan
PTCL and other Networks In PakistanPTCL and other Networks In Pakistan
PTCL and other Networks In PakistanAbdul Rehman
 
Abuttal of Pakistan
Abuttal of PakistanAbuttal of Pakistan
Abuttal of PakistanAbdul Rehman
 
Difference between Rural and urban life
Difference between Rural and urban lifeDifference between Rural and urban life
Difference between Rural and urban lifeAbdul Rehman
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To BiometricsAbdul Rehman
 
Logical and Conditional Operator In C language
Logical and Conditional Operator In C languageLogical and Conditional Operator In C language
Logical and Conditional Operator In C languageAbdul Rehman
 
Water Level Indicator Project Presentation
Water Level Indicator Project PresentationWater Level Indicator Project Presentation
Water Level Indicator Project PresentationAbdul Rehman
 

More from Abdul Rehman (6)

PTCL and other Networks In Pakistan
PTCL and other Networks In PakistanPTCL and other Networks In Pakistan
PTCL and other Networks In Pakistan
 
Abuttal of Pakistan
Abuttal of PakistanAbuttal of Pakistan
Abuttal of Pakistan
 
Difference between Rural and urban life
Difference between Rural and urban lifeDifference between Rural and urban life
Difference between Rural and urban life
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
Logical and Conditional Operator In C language
Logical and Conditional Operator In C languageLogical and Conditional Operator In C language
Logical and Conditional Operator In C language
 
Water Level Indicator Project Presentation
Water Level Indicator Project PresentationWater Level Indicator Project Presentation
Water Level Indicator Project Presentation
 

Recently uploaded

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Cybercrime act of Pakistan 2015 Report

  • 1. Cybercrime act of Pakistan (2015) Cybercrime: Computer Crime or Cybercrime is any crimethat involves a computer and a network. (Also known as hacking) The computer may have been used in the commission of a crime, or it may be the target. Net crime is criminalexploitation of the internet, inherently a Cybercrime. Types of Cybercrime Types Examples Financial Crimes Cheating, credit card frauds, money laundering etc. Sale of illegal articles Sale of narcotics, weapons and wildlife etc., through websites or email communication. Online gambling Online gambling, money laundering etc. Intellectual property crimes Software piracy, copyright infringement, trademarks violations, theft of compute source code etc. Email spoofing Sending e-mails that appear to originate from one source but actually has been sent from another source. Forgery Counterfeit currency notes, postage and revenue stamps, mark sheets etc. Cyber Defamation Publishing/distributing defamatory matter about someone. Unauthorized access to computer system Hacking.
  • 2. or networks Theft of information in electronic form Stealing information on computer hard disks, removable storage media etc. Email bombing Sending a large number of emails crashing email accounts or servers. Data diddling Altering data. Salami attacks Commissioning financial crimes. Denial of service attack Flooding systems by sendingexcessivedemands etc. Virus attacks Spread of viruses and worms. Logic bombs Triggering programs at events. Trojan attacks Unauthorized programs. Internet time theft Stealing internet hours. Web jacking Stealing control over websites. Theftor damaging of computer system Theft of a computer, peripherals etc. Unauthorized access The Cybercrime of “gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network”11 known as access has the greatest impact Packet sniffing, tempest attack,password cracking and buffer overflow etc. are some techniques for gaining access. Offences and Punishments Illegal access to information system: 1. Cause an information system to perform any function with intent to secure access to the whole or any part of any information system or to enable any such access to be secured ;
  • 3. 2. At the time, when he causes the information system to perform the function he knows that the access he intends to secure or to be enable to be secured is unauthorized under this section. Fine Punishment Both 6 Months 100,000PKR Yes Illegal access to program or data: (a) Whoever intentionally, whether temporarily or not, 1. Causes to any program or data to be secured or to be enabled. 2. The access to the program or data he intends to secure, or to enable to be secured, is unauthorized under this section. 3. At the time, when he accesses the program or data he knows that the access he intends to secure, or to enable to be secured, is unauthorized under this section. Fine Punishment Both 200,000PKR 9 Months Yes (b) Whoever recklessly, whether temporarily or not, 1. Causes to any program or data to be secured or to be enabled. 2. The access to the program or data he intends to secure, or to enable to be secured, is unauthorized under this section. 3. At the time, when he accesses the program or data he knows that the access he intends to secure, or to enable to be secured, is unauthorized under this section. Fine Punishment Both 100,000PKR 6 Months Yes Illegal Interface with Program or Data: (a)Whoever intentionally, whether temporarily or not, does any unauthorized act in relation to an information system, or at
  • 4. the time when he does the act he knows that it is unauthorized, and acts with intent; 1. To destroy, damage, delete, erase, generate, modify or alter any program or data; 2. To render any program or data inaccessible, meaningless, useless or ineffective; 3. To obstruct, interface or interrupt with any program or data or any aspect or attribute related to the program or data; 4. To obstruct, interface or interrupt with any person in the use of any program or data or any aspect or attribute related to the program or data; 5. To deny, prevent, suppress or hinder access to any program or data to any person entitled to it; 6. To impair the operation of any program or any aspect or attribute related to the program or data; Fine Punishment Both 500,000PKR 3 Years Yes (a) Whoever recklessly, whether temporarily or not, does any unauthorized act in relation to an information system, or at the time when he does the act he knows that it is unauthorized, and acts with intent; 1. Causing destruction, damage, deletion, eraser, generation modification or alteration of any program or data or any aspect or attribute related to the program or data; 2. Rendering any program or data meaningless, useless or ineffective; 3. Causing impairment to the operation of any program; 4. Causing impairment to the reliability of any program or data or any aspect or attribute related to the program or data;
  • 5. 5. Causing denial, suppression or hindrance of access to any program or data or any aspect or attribute related to the program or data; Fine Punishment Both 250,000PKR 2 Years Yes Illegal Interface with Information System: (a) Whoever intentionally, whether temporarily or not, does any unauthorized access in relation to an information system, at the time when he does the act he knows that is unauthorized, and acts with intent to severely; 1. Interfere, hinder, damage, prevent, suppress, impair or obstruct the functioning of an information system; 2. Interfere with or hinder access to any information system; 3. Impair the operation of any information system; 4. Impair the reliability of any information system; 5. Impair the security of any information system; Fine Punishment Both 500,000PKR 5 Years yes (b)Whoever recklessly, whether temporarily or not, does any unauthorized access in relation to an information system, at the time when he does the act he knows that is unauthorized, and acts recklessly thereby cause severe; 1. Interference, damage, hindrance, prevention, suppression or obstruction to the function of an information system; 2. Interference or hindrance to the access of any information system; 3. Impairment to the operation of any information system; 4. Impairment to the reliability of any information system; 5. Impairment to the security of any information system; Fine Punishment Both
  • 6. 250,000PKR 2 years Yes (c)Whoever commits any offence under sub-section (a) By circumventing or infringing security with respect to any information system, program or data shall be punished with imprisonment of Fine Punishment Both 500,000PKR 3 Years Yes (d) Whoever commits any offenceunder sub-section (b) by circumventing or infringing security with respect to any information system, programor data shall be punished with imprisonmentof Fine Punishment Both 250,000PKR 2 Years Yes (d) Whoever commits any offence under sub section (a) with respect to any Government controlled critical infrastructure information system; program or data that performs a critical public function shall be punished with imprisonment of Fine Punishment Both 7000000 PKR 7 Years Yes Cyber Terrorism: (a) Whoever commits or threatens to commit any of the offences under 1. The use or threat is designed to coerce, intimidate, overawe or create a sense of fear in Government or public section.
  • 7. 2. The use or threat of purposes the advancing of the cause where political or religious with intention of— 3. Interfering or disrupting the system, 4. Severe interfere, serious disrupting or damaging the payment system of multiple institutions, 5. Severe Interfere, seriously damage the system at the public scale, 6. Severe interfere, serious disrupting or damaging the system of Civil forces, Armed forces and security forces, Fine Punishment Both 50,000,000 PKR 14 Years Yes Electronic Forgery: (a) Whoever; 1. Without authority, 2. In excess of authority, 3. Through an unauthorized act, Inputs, generates, modifies, delete or suppress data resulting in inauthentic data with any person or an information system shall be punished, Fine Punishment Both 250,000PKR 2 Years Yes (b)Whoever commits any offence; 1. for wrongfulgain; 2. for wrongfulloss; 3. for any economic benefit for oneself or for another person, Fine Punishment Both 250,000PKR 2 Years Yes (c) Whoever commits any offence, fraudulently, dishonestly or with similar intent;
  • 8. 1. To influence the public servantin the exercise of a public duty; 2. To influence a Governmentcontrolled information systemor public information system Shall be punished Fine Punishment Both 500,000PKR 3 Years Yes Electronic Fraud: Whoever with fraudulent or dishonest intent; 1. Without authority; 2. In excess of authority; 3. Through an unauthorized act; 4. Any illegal access to information system; 5. Any input, alteration or deletion or suppression theprogramor data 6. Any inference or hindrance data; 7. Copying , transferring the data or moving to any other information system i. Wrongful gain; ii. Wrongful loss; iii. Any economic benefit for oneself or another person; Shall be punished Fine Punishment Both 10,000,000PKR 5 Years Yes Making, Supplying or obtaining devices for use in offence: 1. Whoever produces, makes any device intending it primarily to be used or believing that it is primarily to be used to commit;
  • 9. Fine Punishment Both 50,000 PKR 6 Months Yes 2. Whoever transfer, imports, shares or distributes any device that it to be primarily used to commit; Fine Punishment Both 100,000 PKR 1 Years Yes Identify Crime: 1. Whoever knowingly obtains or process of any person’s identity information without law justification and use in offensivework shallbe punished; Fine Punishment Both 50,000 PKR 3 Months Yes 2. Whoever transmits or makes available identity of any person without permission for Fraud or deceit etc shall be punished ; Fine Punishment Both 100,000 PKR 6 Months Yes Special Protection of Women: 1. Whoever knowingly or publically displays electronic communication that harms the reputation of women, threatens sexual acts against women or any explicit images Shall be punished Fine Punishment Both 10,000,00 PKR 1 Year Yes