SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Cyber Crimes in Pakistan
Prevention of Electronic Crimes Act
2016 (PECA 2016)
by
S J Tubrazy Advocate
Prospect of Cybercrimes
• “We used to fear the atomic bomb when I was
young. Now, we fear all the cyber attacks and
hacking.”
– Apple co-founder Steve Wozniak
• Example-- Bangladesh Bank official's computer was hacked to carry out
$81 million heist
Cyber Crime?
• Cybercrime is defined as a crime in which a
computer is the object of the crime (hacking,
phishing, spamming)
Categories of Cyber Crimes
• Cybercrimes against persons. (cyber harassment, cyber
stalking, cyber bullying, cyber defamation, email spoofing, cracking,
sms spoofing, credit card frauds, online libel / slander, financial
frauds, identity theft, etc.)
• Cybercrimes against properties . (IPR violations, cyber
trespass, DDOS attacks, worm attacks, hacking, transmitting
viruses, etc)
• Cybercrimes against governments. ( cyber
terrorism, cyber warfare, possessing of un-authorized
information, hacking into confidential military data, etc)
Importance of Cyber Laws
• Inevitably, every technology is tending to be part of information
technology, in near future every species of law might be a part of
Cyber Laws.
• Prospective role of cyber laws:
• Cyber crimes often international nature (financial type)
• Cyber Laws have an important role in representing and defining the
norms of the cyber society.
• Cyber Laws help in giving the right to enter into legally enforceable
digital contracts.
• Cyber Laws help in maintaining and owning the Cyber properties.
• Cyber Laws help in to carry on online business.
• Cyber Laws help in providing legal reorganization for Electronic
documents and Digital signature.
PECA 2016
• Preamble - to make provisions for prosecution of
electronic crimes;
• WHEREAS it is expedient to prevent
unauthorized acts with respect to information
systems and provide for related offences as well
as mechanisms for their investigation,
prosecution, trial and international cooperation
with respect thereof and for matters connected
therewith or ancillary thereto:
PECA 2016
• 2. Definitions.- (i) in this Act, unless there is
anything repugnant in the subject or context,-
(i) "act" includes-
(a) a series of acts or omissions contrary to the
provisions of this Act; or
(b) causing an act to be done by a person either
directly or through an automated information
system or automated mechanism or self-
executing, adaptive or autonomous device and
whether having temporary or permanent impact;
PECA 2016
• 2(ii) "access to data" means gaining control or
ability to use, copy, modify or delete any data
held in or generated by any device or
information system;
• (iii) "access to information system" means
gaining control or ability to use any part or
whole of an information system whether: or
not through infringing any security measure;
PECA 2016
• (iv) "Authority means the Pakistan Telecommunication
Authority established under the Pakistan
Telecommunication (Re-organization) act , 1996 (XVII of
1996);
• (v) "authorization' means authorization by law or by
the person empowered to make such authorization
under the law:
Provided that where an information system or data is
available for open access by the general public, access
to or transmission of such information system or data
shall be deemed to be authorized for the purposes of
this Act;
PECA 2016
• (vi) "authorized officer" means an officer of the
investigation agency authorized to perform any function on
behalf of the investigation agency by or under this Act;
• (vii) "Code" means the Code of Criminal Procedure, 1898
{Act V of 1898);
• (viii) “Content data" means any representation of fact,
information or concept for processing in an information
system including source code or a program suitable to
cause an information system to perform a function;
• (ix) “Court" means the Court of competent jurisdiction
designated under this Act;
PECA 2016
• (x) "Critical infrastructure' means critical elements of
infrastructure namely assets, facilities, systems,
networks or processes the loss or compromise of which
could result in,-
(a) major detrimental impact on the availability,
integrity or delivery of essential services including
those services, whose integrity, if compromised, could
result in significant loss of life or casualties, taking into
account significant economic or social impacts; or
(b) significant impact on national security, national
defense, or the functioning of the state…
PECA 2016
• (xi) "Critical infrastructure information system or
data" means an information system, program or
data that supports or performs a function with
respect to a critical infrastructure;
• (xii) "damage to an information system' means
any unauthorized change in the ordinary working
of an information system that impairs its
performance, access, output or change in
location whether temporary or permanent and
with or without causing any change in the
system:
PECA 2016
• (xiii) "data" includes content data and traffic data;
• (xiv) 'data damage" means alteration, deletion,
deterioration, erasure, relocation, suppression of data or
making data temporarily or permanently unavailable;
• (xv) "device” includes,-
(a) physical device or article;
(b) any electronic or virtual tool that is not in physical form;
(c) a password, access code or similar data, in electronic or
other form, by which the whole or any part of any
information system is capable of being accessed; or
(d) automated, self-executing, adaptive or autonomous
devices, programs or information systems;
PECA 2016
• (xvi) "dishonest intention" means intention to
cause injury, wrongful gain or wrongful loss or
harm to any person or to create hatred or
incitement to violence;
• (xvii) "electronic" includes electrical, digital,
magnetic, optical, biometric, electrochemical,
electromechanical, wireless or
electromagnetic technology;
PECA 2016
• (xviii) "identity information" means an
information which may authenticate or identify
an individual or an information system and
enable access to any data or information system;
• (xix) "information" includes text, message, data,
voice, sound, database, video, signals, software,
computer programs, any forms of intelligence as
defined under the Pakistan Telecommunication
(Reorganization) Act, 1996 (XVII of 1996) and
codes including object code and source code;
PECA 2016
• (xx) "information system" means an electronic system for
creating, generating, sending, receiving, storing,
reproducing, displaying, recording or processing any
information;
• (xxi) "integrity means, in relation to an electronic
document, electronic signature or advanced electronic
signature, the electronic document, electronic signature or
advanced electronic signature that has not been tampered
with, altered or modified since a particular point in time;
• (xxii) "interference with information system or data" means
and includes an unauthorized act in relation to an
information system or data that may disturb its normal
working or form with or without causing any actual damage
to such system or data;
PECA 2016
• (xxiii) "Investigation agency means the law enforcement
agency established by or designated under this Act;
• (xxiv) "minor" means, notwithstanding anything contained
in any other law, any person who has not completed the
age of eighteen years;
• (xxv) "offence" means an offence punishable under this Act
except when committed by a person under ten years of age
or by a person above ten years of age and under fourteen
years of age, who has not attained sufficient maturity of
understanding to judge the nature and consequences of his
conduct on that occasion;
PECA 2016
• (xxvi) "rules" means :-rules made under this Act;
• (xxvii)"seize" with respect to an information system or data
includes taking possession of such system or data or making and
retaining a copy of the data;
• (xxviii)"service provider" includes a person who,-
acts as a service provider in relation to sending, receiving, storing,
processing or distribution of any electronic communication or the
provision of other services in relation to electronic
communication through an information system; owns, possesses,
operates, manages or controls a public switched network or
provides telecommunication services; or (c) processes or stores
data on behalf of such electronic communication service or users
of such service;
PECA 2016
• (xxix) "subscriber information" means any information
held in any form by a service provider relating to a
subscriber other than traffic data;
• (xxx) "traffic data" includes data relating to a
communication indicating its origin, destination, route,
time, size, duration or type of service;
• (ze) "unauthorized access" means access to an
information system or data which is not available for
access by general public, without authorization or in
violation of the terms and conditions of the
authorization;
PECA 2016
• (zf) "unauthorized interception" shall mean in
relation to an information system or data, any
interception without authorization; and
• (zg) 'unsolicited information" means the
information which is sent for commercial and
marketing purposes against explicit rejection
of the recipient and does not include
marketing authorized under the law.
Offences and Punishments (PECA
2016)
• 3. Unauthorized access to information system or data.-
Whoever with dishonest intention gains unauthorized
access to any information system or data shall be
punished with imprisonment for a term which may
extend to three months or with fine which may extend
to fifty thousand rupees or with both.
• 4. Unauthorized copying or transmission of data.-
Whoever with dishonest intention and without
authorization copies or otherwise transmits or causes
to be transmitted any data shall be punished with
imprisonment for a term which may extend to six
months, or with fine which may extend to one hundred
thousand rupees or with both.
Offences and Punishments (PECA
2016)
• 5. Interference with information system or data.- whoever
with dishonest intention interferes with or damages or
causes to be interfered with or damages any part or whole
of an information system or data shall be punished with
imprisonment which may extend to two years or with fine
which may extend to five hundred thousand rupees or with
both.
• 6. Unauthorized access to critical infrastructure information
system or data,-Whoever with dishonest intention gains
unauthorized access to any critical infrastructure
information system or data shall be punished with
imprisonment which may extend to three years or with fine
which may extend to one million rupees or with both.
Offences and Punishments (PECA
2016)
• 7. Unauthorized copying or transmission of critical
infrastructure data.- Whoever with dishonest intention and
without authorization copies or otherwise transmits or
causes to be transmitted any critical infrastructure data
shall be punished with imprisonment for a term which may
extend to five years, or with fine which may extend to five
million rupees or with both.
• 8. Interference with critical infrastructure information
system or data. Whoever with dishonest intention interfere
with or damages, or causes to be interfered with or
damaged, any part or whole of a critical information
system, or data , shall be punished with imprisonment
which may extend to seven years or with fine which may
extend to ten million rupees or with both.
Offences and Punishments (PECA
2016)
• 9. Glorification of an offence.- (1) whoever prepares or
disseminates information, through any information
system or device, with the intent to glorify an offence
relating to terrorism, or any person convicted of a
crime relating to terrorism, or activities of proscribed
organizations or individuals or groups shall be punished
with imprisonment for a term which may extend to
seven years or with fine which may extend to ten
million rupees or with both.
Explanation,- For the purposes of this section
"glorification" depiction of any form of praise or
celebration in a desirable manner.
Offences and Punishments (PECA
2016)
• 10. Cyber terrorism.-Whoever commits or threatens to commit
any of the offences under sections 6, 7 , 8 or 9, where the
commission or threat is with the intent to,-
(a) coerce, intimidate, create a sense of fear, panic or insecurity in
the Government or the public or a section of the public or
community or sect or create a sense of fear or insecurity in
society; or
(b) advance interfaith, sectarian or ethnic hatred; or
(c) advance the objectives of organizations or individuals or
groups proscribed under the law, shall be punished with
imprisonment of either description for a term which may extend
to fourteen years or with fine which may extend to fifty million
rupees or with both.
Offences and Punishments (PECA
2016)
• 11. Hate speech.- Whoever prepares or disseminates
information, through any information system or,
device, that advances or is likely to advance interfaith,
sectarian or racial hatred, shall be punished with
imprisonment for a term which may extend to seven
years or with fine or with both.
• 12. Recruitment, funding and planning of terrorism.-
Whoever prepares or disseminates information,
through any information system or device, that invites
or motivates to fund, or recruits people for terrorism
or plans for terrorism shall be punished with
imprisonment for a term which may extend to seven
years or with fine or with both.
Offences and Punishments (PECA
2016)
• 13. Electronic forgery-- (1) Whoever interferes with or uses any
information system, device or data, with the intent to cause damage or
injury to the public or to any person, or to make any illegal claim or title
or to cause any person to part with property or to enter into any express
or implied contract, or with intent to commit fraud by any input,
alteration, deletion, or suppression of data, resulting in unauthentic data
with the intent that it be considered or acted upon for legal purposes as
if it were authentic, regardless of the fact that the data is directly
readable and intelligible or not, shall be punished with imprisonment of
either description for a term which may extend to three years, or with
fine which may extend to two hundred and fifty thousand rupees or with
both.
• (2) Whoever commits offence under sub-section (1) in relation to a
critical infrastructure information system or data shall be punished with
imprisonment for a term which may extend to seven years or with fine
which may extend to five million rupees or with both.
Offences and Punishments (PECA
2016)
• 14. Electronic fraud.- Whoever with the intent for wrongful gain
interferes with or uses any information system, device or data or
induces any person to enter into a relationship or deceives any
person, which act or omission is likely to cause damage or harm to
that person or any other person shall be punished with
imprisonment for a term which may extend to two years or with
fine which may extend to ten million rupees or with both.
• 15. Making, obtaining, or supplying device for use in offence.-
Whoever produces, makes, generates, adapts, exports, supplies,
offers to supply or imports for use any information system, data
or device, with the intent to be used or believing that it is
primarily to be used to commit or to assist in the commission of
an offence under this Act shall, without prejudice to any other
liability that he may incur in this behalf, be punished with
imprisonment for a term which may extend to six months or with
fine which may extend to fifty thousand rupees or with both.
Offences and Punishments (PECA
2016)
• 16. Unauthorized use of identity information.-(1) Whoever
obtains, sells, possesses, transmits or uses another person's
identity information without authorization shall be
punished with imprisonment for a term which may extend
to three years or with fine which may extend to five million
rupees, or with both.
• (2) Any person whose identity information is obtained, sold,
possessed, used or transmitted may apply to the Authority
for securing, destroying, blocking access or preventing
transmission of identity information referred to in sub-
section (1) and the Authority on receipt of such application
may take such measures as deemed appropriate for
securing, destroying or preventing transmission of such
identity information.
Offences and Punishments (PECA
2016)
• 17. Unauthorized issuance of SIM cards etc.- Whoever
sells or otherwise provides subscriber identity module
(SIM) card, re usable identification module (RJUM) or
universal integrated circuit card (UICC) or other module
designed for authenticating users to establish
connection with the network and to be used in cellular
mobile, wireless phone or other digital devices such as
tablets, without obtaining and verification of the
subscriber's antecedents in the mode and manner for
the time being approved by the Authority shall be
punished with imprisonment for a term which may
extend to three years or with fine which may extend to
five hundred thousand rupees or with both.
Offences and Punishments (PECA
2016)
• 18. Tampering, etc, of communication equipment.- Whoever unlawfully
or without authorization changes, alters, tampers with or re-programs
unique device identifier of any communication equipment including a
cellular or wireless handset and starts using or marketing such device for
transmitting and receiving information shall be punished with
imprisonment which may extend to three years or with fine which may
extend to one million rupees or with both.
Explanation - A "unique device identifier" is an electronic equipment
identifier which is unique to a communication device.
• 19. Unauthorized interception.- Whoever with dishonest intention
commits unauthorized interception try technical means of-
(a) any transmission that is not intended to be and is not open to the
public, from or within an information system; or
(b) electromagnetic emissions from an information system that are
carrying data, shall be punished with imprisonment of either description
for a term which may extend to two years or with fine which may extend
to have hundred thousand rupees or with both.
Offences and Punishments (PECA
2016)
• 20. offences against dignity of a natural person.- (1) Whoever
intentionally and publicly exhibits or displays or transmits any
information through any information system, which he knows to
be false, and intimidates or harms the reputation or privacy of a
natural person, shall be punished with imprisonment for a term
which may extend to three years or with fine which may extend to
one million rupees or with both:
Provided that nothing; under this sub-section shall apply to
anything aired by a broadcast media or distribution service
licensed under the Pakistan Electronic Media Regulatory Authority
Ordinance, 2OO2 (XIII of 2OO2).
(2). Any aggrieved person may apply to Authority for removal,
destruction of or blocking access to such information referred to
in sub-section (1)...
Offences and Punishments (PECA
2016)
• 21. Offences against modesty of a natural person and minor.-(1)
Whoever intentionally and publicly exhibits or displays or transmits any
information which,-
(a) superimposes a photograph of the face of a natural person over any
sexually explicit image or video; or
(b) includes a photograph or a video of a natural person in sexually
explicit conduct; or
(c) intimidates a natural person with any sexual act, or any sexually
explicit image or video of a natural person; or
(d) cultivates, entices or induces a natural person to engage in a sexually
explicit act, through an information system to harm a natural person or
his reputation, or to take revenge, or to create hatred or to blackmail,
shall be punished with imprisonment for a term which may extend to
five years or with fine which may extend to five million rupees or with
both.
Offences and Punishments (PECA
2016) (Sec 21)
(2) whoever commits an offence under sub-section (1)
with respect to a minor shall be punished with
imprisonment for a term which may extend to seven
years and with fine which may extend to five million
rupees:
Provided that in case of a person who has been
previously convicted of an offence under sub-section
(1) with respect to a minor shall be punished with
imprisonment for a term of ten years and with fine.
(3) Any aggrieved person may contact with authority
for removal of unlawful content
Offences and Punishments (PECA
2016)
• 22. Child pornography,- (1) Whoever intentionally produces, offers
or makes available, distributes or transmits through an
information system or procures for himself or for another person
or without lawful justification possesses material in an
information system, that visually depicts-
(a) a minor engaged in sexually explicit conduct;
(b) a person appearing to be a minor engaged conduct; or in
sexually explicit
(c) realistic images representing a minor engaged in sexually
explicit conduct or
(d) discloses the identity of the minor, shall be punished with
imprisonment for a term which may extend to seven years, or
with fine which may extend to five million rupees or with both.
(2 Any aggrieved person may contact with authority for removal
of unlawful content…….
Offences and Punishments (PECA
2016)
• 23. Malicious code.- Whoever willfully and without
authorization writes, offers, makes available, distributes or
transmits malicious code through an information system or
device, with intent to cause harm to any information
system or data resulting in the corruption, destruction,
alteration, suppression, theft or loss of the information
system or data shall be punished with imprisonment for a
term which may extend to two years or with fine which
may extend to one million rupees or with both.
Explanation.-For the purpose of this section, the expression
"malicious code" includes, a computer program or a hidden
function in a program that damages an information system
or data or compromises the performance of such system or
availability of data or uses it without proper authorization.
Offences and Punishments (PECA
2016)
• 24. Cyber stalking.. (l) A person commits the offence of
cyber stalking who, with the intent to coerce or intimidate
or harass any person, uses information system, information
system: network, the Internet, website, electronic mail or
any other similar means of communication to –
(a) follow a person or contacts or attempts to contact such
person to foster personal interaction repeatedly despite a
clear indication of disinterest by such person;
(b) monitor the use by a person of the internet, electronic
mail, text massage or any other form of electronic
communication;
PECA 2016 (S.24) Cyber Stalking
(c) watch or spy upon a person in a manner that results in fear
of violence or serious alarm or distress, in the mind of such
person; or
(d) take a photograph or make a video of any person and
displays or distributes it without his consent in a manner
that harms a person.
(2) … punishment 3 years or fine one million or with both:
Provided that if victim of the cyber stalking under sub-
section (1) is a minor the punishment may extend to have
years or with fine which may extend to ten million rupees
or with both.
(3 Any aggrieved person may contact with authority for
removal of unlawful content.
Offences and Punishments (PECA
2016)
• 25. Spamming.- (1) A person commits the offence of spamming, who
with intent transmits harmful, fraudulent, misleading, illegal or
unsolicited information to any person without permission of the
recipient or who causes any information system to show any such
information for wrongful gain.
(2) A person including an institution or an organization engaged in direct
marketing shall provide the option to the recipient of direct marketing to
unsubscribe from such marketing.
(3) Whoever commits the offence of spamming as described in
subsection (1) by transmitting harmful, fraudulent, misleading or illegal
information, shall be punished with imprisonment for a term which may
extend to three months or with fine of rupees fifty thousand which may
extend up to rupees five million or with both.
(4) Whoever commits the offence of spamming … fifty thousand rupees,
and for every subsequent violation shall be punished with fine not less
than fifty thousand rupees that may extend up to one million rupees.
Offences and Punishments (PECA
2016)
• 26. Spoofing. -(1) Whoever with dishonest
intention establishes a website or sends any
information with a counterfeit source intended to
be believed by the recipient or visitor of the
website, to be an authentic source commits
spoofing.
(2) Whoever commits spoofing shall be punished
with imprisonment for a term which may extend
to three years or with fine which may extend to
five hundred thousand rupees or with both.
Offences and Punishments (PECA
2016)
• 27. Legal recognition of offence committed in relation to
information system .- (1) Notwithstanding anything contained in
any other law for the time being in force, an offence under this
Act or any other law shall not be denied legal recognition and
enforcement for the sole reason of such offence being committed
in relation to or through the use of an information system.
(2) References to 'property' in any law creating an offence in
relation to or concerning property, shall include information
system and data.
• 28. Pakistan Penal Code, 1860 (Act XLV of 186O) to apply.- The
provisions of the Pakistan Penal Code, 1860 (Act XLV of 1860), to
the extent not inconsistent with anything provided in this Act,
shall apply to the offences provided in this Act.
PECA 2016
• Section 42. international Cooperation. The
Federal Government may upon receipt of a
request, through the designated agency under
this Act, extend such cooperation to any
foreign government, 24 x 7 network, any
foreign agency or any international
organization or agency for the purposes of
investigations or proceedings concerning
offences related to information systems ……
Offences and Punishments (PECA
2016)
• 43. Offences to be compoundable and non-cognizable.-
(1) All offences under this Act, except the offences
under sections 10, 21 and 22 and abetment thereof
shall be non-cognizable, bail-able and compoundable:
Provided that offences under section 17 shall be
cognizable by the investigation agency on a written
complaint by the Authority.
(2| Offences under sections 10, 21 and 22 and
abetment thereof shall be non-bailable, non-
compoundable and cognizable by the investigation
agency.
Amendments (PECA 2016)
• 54. Amendment of Electronic Transactions
Ordinance, 2002 (LI of 2002) and pending
proceedings. (1) Section 36 and 37 of the
Electronic Transactions Ordinance, 2002 LI of
2002) are omitted.
(2) Any action taken by or with the approval of
the Authority or proceedings pending under the
provisions of the Electronic Transactions
Ordinance, 2002 (LI of 2002) repealed by sub-
section (1), shall continue and be deemed to have
been taken or initiated under this Act.
Books for Reference 1
• Cyber Jurisprudence by S J Tubrazy
Books for Reference 2
• The “Law of Digital Forensic ” by S J Tubrazy
Shahid Jamal Tubrazy
• Adv. Shahid Jamal Tubrazy is (LLM), Lahore
High Court Lawyer, Lecturer of Cyber Laws,
Speaker, Author & Expert in Cyber Law & Cyber
Security, Cyber Law Consulting.
• Email: shahy_legal@yahoo.com
• Cell: 03214505080

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)Yogendra Wagh
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics pptNikhil Mashruwala
 

Was ist angesagt? (20)

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Malicious
MaliciousMalicious
Malicious
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Ähnlich wie Onlinecrime and New Cyber Laws in Pakistan

Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02mark a villarin
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Data Protection Proclamation draft.pdf
Data Protection Proclamation draft.pdfData Protection Proclamation draft.pdf
Data Protection Proclamation draft.pdfAlemayehu
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfbadangayonmgb
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012John Macasio
 
Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Baldwin Cruz
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Sonnie Santos
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 

Ähnlich wie Onlinecrime and New Cyber Laws in Pakistan (20)

Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Digital-Security-Act-2020.pdf
Digital-Security-Act-2020.pdfDigital-Security-Act-2020.pdf
Digital-Security-Act-2020.pdf
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02Cybercrime 120130112234-phpapp02
Cybercrime 120130112234-phpapp02
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Data Protection Proclamation draft.pdf
Data Protection Proclamation draft.pdfData Protection Proclamation draft.pdf
Data Protection Proclamation draft.pdf
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012
 
Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01Cybercrimebill3rd reading-version-120329030422-phpapp01
Cybercrimebill3rd reading-version-120329030422-phpapp01
 
Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)Cybercrime Bill (House Bill 5808)
Cybercrime Bill (House Bill 5808)
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 

KĂźrzlich hochgeladen

Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 

KĂźrzlich hochgeladen (20)

Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 

Onlinecrime and New Cyber Laws in Pakistan

  • 1. Cyber Crimes in Pakistan Prevention of Electronic Crimes Act 2016 (PECA 2016) by S J Tubrazy Advocate
  • 2. Prospect of Cybercrimes • “We used to fear the atomic bomb when I was young. Now, we fear all the cyber attacks and hacking.” – Apple co-founder Steve Wozniak • Example-- Bangladesh Bank official's computer was hacked to carry out $81 million heist
  • 3. Cyber Crime? • Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming)
  • 4. Categories of Cyber Crimes • Cybercrimes against persons. (cyber harassment, cyber stalking, cyber bullying, cyber defamation, email spoofing, cracking, sms spoofing, credit card frauds, online libel / slander, financial frauds, identity theft, etc.) • Cybercrimes against properties . (IPR violations, cyber trespass, DDOS attacks, worm attacks, hacking, transmitting viruses, etc) • Cybercrimes against governments. ( cyber terrorism, cyber warfare, possessing of un-authorized information, hacking into confidential military data, etc)
  • 5. Importance of Cyber Laws • Inevitably, every technology is tending to be part of information technology, in near future every species of law might be a part of Cyber Laws. • Prospective role of cyber laws: • Cyber crimes often international nature (financial type) • Cyber Laws have an important role in representing and defining the norms of the cyber society. • Cyber Laws help in giving the right to enter into legally enforceable digital contracts. • Cyber Laws help in maintaining and owning the Cyber properties. • Cyber Laws help in to carry on online business. • Cyber Laws help in providing legal reorganization for Electronic documents and Digital signature.
  • 6. PECA 2016 • Preamble - to make provisions for prosecution of electronic crimes; • WHEREAS it is expedient to prevent unauthorized acts with respect to information systems and provide for related offences as well as mechanisms for their investigation, prosecution, trial and international cooperation with respect thereof and for matters connected therewith or ancillary thereto:
  • 7. PECA 2016 • 2. Definitions.- (i) in this Act, unless there is anything repugnant in the subject or context,- (i) "act" includes- (a) a series of acts or omissions contrary to the provisions of this Act; or (b) causing an act to be done by a person either directly or through an automated information system or automated mechanism or self- executing, adaptive or autonomous device and whether having temporary or permanent impact;
  • 8. PECA 2016 • 2(ii) "access to data" means gaining control or ability to use, copy, modify or delete any data held in or generated by any device or information system; • (iii) "access to information system" means gaining control or ability to use any part or whole of an information system whether: or not through infringing any security measure;
  • 9. PECA 2016 • (iv) "Authority means the Pakistan Telecommunication Authority established under the Pakistan Telecommunication (Re-organization) act , 1996 (XVII of 1996); • (v) "authorization' means authorization by law or by the person empowered to make such authorization under the law: Provided that where an information system or data is available for open access by the general public, access to or transmission of such information system or data shall be deemed to be authorized for the purposes of this Act;
  • 10. PECA 2016 • (vi) "authorized officer" means an officer of the investigation agency authorized to perform any function on behalf of the investigation agency by or under this Act; • (vii) "Code" means the Code of Criminal Procedure, 1898 {Act V of 1898); • (viii) “Content data" means any representation of fact, information or concept for processing in an information system including source code or a program suitable to cause an information system to perform a function; • (ix) “Court" means the Court of competent jurisdiction designated under this Act;
  • 11. PECA 2016 • (x) "Critical infrastructure' means critical elements of infrastructure namely assets, facilities, systems, networks or processes the loss or compromise of which could result in,- (a) major detrimental impact on the availability, integrity or delivery of essential services including those services, whose integrity, if compromised, could result in significant loss of life or casualties, taking into account significant economic or social impacts; or (b) significant impact on national security, national defense, or the functioning of the state…
  • 12. PECA 2016 • (xi) "Critical infrastructure information system or data" means an information system, program or data that supports or performs a function with respect to a critical infrastructure; • (xii) "damage to an information system' means any unauthorized change in the ordinary working of an information system that impairs its performance, access, output or change in location whether temporary or permanent and with or without causing any change in the system:
  • 13. PECA 2016 • (xiii) "data" includes content data and traffic data; • (xiv) 'data damage" means alteration, deletion, deterioration, erasure, relocation, suppression of data or making data temporarily or permanently unavailable; • (xv) "device” includes,- (a) physical device or article; (b) any electronic or virtual tool that is not in physical form; (c) a password, access code or similar data, in electronic or other form, by which the whole or any part of any information system is capable of being accessed; or (d) automated, self-executing, adaptive or autonomous devices, programs or information systems;
  • 14. PECA 2016 • (xvi) "dishonest intention" means intention to cause injury, wrongful gain or wrongful loss or harm to any person or to create hatred or incitement to violence; • (xvii) "electronic" includes electrical, digital, magnetic, optical, biometric, electrochemical, electromechanical, wireless or electromagnetic technology;
  • 15. PECA 2016 • (xviii) "identity information" means an information which may authenticate or identify an individual or an information system and enable access to any data or information system; • (xix) "information" includes text, message, data, voice, sound, database, video, signals, software, computer programs, any forms of intelligence as defined under the Pakistan Telecommunication (Reorganization) Act, 1996 (XVII of 1996) and codes including object code and source code;
  • 16. PECA 2016 • (xx) "information system" means an electronic system for creating, generating, sending, receiving, storing, reproducing, displaying, recording or processing any information; • (xxi) "integrity means, in relation to an electronic document, electronic signature or advanced electronic signature, the electronic document, electronic signature or advanced electronic signature that has not been tampered with, altered or modified since a particular point in time; • (xxii) "interference with information system or data" means and includes an unauthorized act in relation to an information system or data that may disturb its normal working or form with or without causing any actual damage to such system or data;
  • 17. PECA 2016 • (xxiii) "Investigation agency means the law enforcement agency established by or designated under this Act; • (xxiv) "minor" means, notwithstanding anything contained in any other law, any person who has not completed the age of eighteen years; • (xxv) "offence" means an offence punishable under this Act except when committed by a person under ten years of age or by a person above ten years of age and under fourteen years of age, who has not attained sufficient maturity of understanding to judge the nature and consequences of his conduct on that occasion;
  • 18. PECA 2016 • (xxvi) "rules" means :-rules made under this Act; • (xxvii)"seize" with respect to an information system or data includes taking possession of such system or data or making and retaining a copy of the data; • (xxviii)"service provider" includes a person who,- acts as a service provider in relation to sending, receiving, storing, processing or distribution of any electronic communication or the provision of other services in relation to electronic communication through an information system; owns, possesses, operates, manages or controls a public switched network or provides telecommunication services; or (c) processes or stores data on behalf of such electronic communication service or users of such service;
  • 19. PECA 2016 • (xxix) "subscriber information" means any information held in any form by a service provider relating to a subscriber other than traffic data; • (xxx) "traffic data" includes data relating to a communication indicating its origin, destination, route, time, size, duration or type of service; • (ze) "unauthorized access" means access to an information system or data which is not available for access by general public, without authorization or in violation of the terms and conditions of the authorization;
  • 20. PECA 2016 • (zf) "unauthorized interception" shall mean in relation to an information system or data, any interception without authorization; and • (zg) 'unsolicited information" means the information which is sent for commercial and marketing purposes against explicit rejection of the recipient and does not include marketing authorized under the law.
  • 21. Offences and Punishments (PECA 2016) • 3. Unauthorized access to information system or data.- Whoever with dishonest intention gains unauthorized access to any information system or data shall be punished with imprisonment for a term which may extend to three months or with fine which may extend to fifty thousand rupees or with both. • 4. Unauthorized copying or transmission of data.- Whoever with dishonest intention and without authorization copies or otherwise transmits or causes to be transmitted any data shall be punished with imprisonment for a term which may extend to six months, or with fine which may extend to one hundred thousand rupees or with both.
  • 22. Offences and Punishments (PECA 2016) • 5. Interference with information system or data.- whoever with dishonest intention interferes with or damages or causes to be interfered with or damages any part or whole of an information system or data shall be punished with imprisonment which may extend to two years or with fine which may extend to five hundred thousand rupees or with both. • 6. Unauthorized access to critical infrastructure information system or data,-Whoever with dishonest intention gains unauthorized access to any critical infrastructure information system or data shall be punished with imprisonment which may extend to three years or with fine which may extend to one million rupees or with both.
  • 23. Offences and Punishments (PECA 2016) • 7. Unauthorized copying or transmission of critical infrastructure data.- Whoever with dishonest intention and without authorization copies or otherwise transmits or causes to be transmitted any critical infrastructure data shall be punished with imprisonment for a term which may extend to five years, or with fine which may extend to five million rupees or with both. • 8. Interference with critical infrastructure information system or data. Whoever with dishonest intention interfere with or damages, or causes to be interfered with or damaged, any part or whole of a critical information system, or data , shall be punished with imprisonment which may extend to seven years or with fine which may extend to ten million rupees or with both.
  • 24. Offences and Punishments (PECA 2016) • 9. Glorification of an offence.- (1) whoever prepares or disseminates information, through any information system or device, with the intent to glorify an offence relating to terrorism, or any person convicted of a crime relating to terrorism, or activities of proscribed organizations or individuals or groups shall be punished with imprisonment for a term which may extend to seven years or with fine which may extend to ten million rupees or with both. Explanation,- For the purposes of this section "glorification" depiction of any form of praise or celebration in a desirable manner.
  • 25. Offences and Punishments (PECA 2016) • 10. Cyber terrorism.-Whoever commits or threatens to commit any of the offences under sections 6, 7 , 8 or 9, where the commission or threat is with the intent to,- (a) coerce, intimidate, create a sense of fear, panic or insecurity in the Government or the public or a section of the public or community or sect or create a sense of fear or insecurity in society; or (b) advance interfaith, sectarian or ethnic hatred; or (c) advance the objectives of organizations or individuals or groups proscribed under the law, shall be punished with imprisonment of either description for a term which may extend to fourteen years or with fine which may extend to fifty million rupees or with both.
  • 26. Offences and Punishments (PECA 2016) • 11. Hate speech.- Whoever prepares or disseminates information, through any information system or, device, that advances or is likely to advance interfaith, sectarian or racial hatred, shall be punished with imprisonment for a term which may extend to seven years or with fine or with both. • 12. Recruitment, funding and planning of terrorism.- Whoever prepares or disseminates information, through any information system or device, that invites or motivates to fund, or recruits people for terrorism or plans for terrorism shall be punished with imprisonment for a term which may extend to seven years or with fine or with both.
  • 27. Offences and Punishments (PECA 2016) • 13. Electronic forgery-- (1) Whoever interferes with or uses any information system, device or data, with the intent to cause damage or injury to the public or to any person, or to make any illegal claim or title or to cause any person to part with property or to enter into any express or implied contract, or with intent to commit fraud by any input, alteration, deletion, or suppression of data, resulting in unauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless of the fact that the data is directly readable and intelligible or not, shall be punished with imprisonment of either description for a term which may extend to three years, or with fine which may extend to two hundred and fifty thousand rupees or with both. • (2) Whoever commits offence under sub-section (1) in relation to a critical infrastructure information system or data shall be punished with imprisonment for a term which may extend to seven years or with fine which may extend to five million rupees or with both.
  • 28. Offences and Punishments (PECA 2016) • 14. Electronic fraud.- Whoever with the intent for wrongful gain interferes with or uses any information system, device or data or induces any person to enter into a relationship or deceives any person, which act or omission is likely to cause damage or harm to that person or any other person shall be punished with imprisonment for a term which may extend to two years or with fine which may extend to ten million rupees or with both. • 15. Making, obtaining, or supplying device for use in offence.- Whoever produces, makes, generates, adapts, exports, supplies, offers to supply or imports for use any information system, data or device, with the intent to be used or believing that it is primarily to be used to commit or to assist in the commission of an offence under this Act shall, without prejudice to any other liability that he may incur in this behalf, be punished with imprisonment for a term which may extend to six months or with fine which may extend to fifty thousand rupees or with both.
  • 29. Offences and Punishments (PECA 2016) • 16. Unauthorized use of identity information.-(1) Whoever obtains, sells, possesses, transmits or uses another person's identity information without authorization shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five million rupees, or with both. • (2) Any person whose identity information is obtained, sold, possessed, used or transmitted may apply to the Authority for securing, destroying, blocking access or preventing transmission of identity information referred to in sub- section (1) and the Authority on receipt of such application may take such measures as deemed appropriate for securing, destroying or preventing transmission of such identity information.
  • 30. Offences and Punishments (PECA 2016) • 17. Unauthorized issuance of SIM cards etc.- Whoever sells or otherwise provides subscriber identity module (SIM) card, re usable identification module (RJUM) or universal integrated circuit card (UICC) or other module designed for authenticating users to establish connection with the network and to be used in cellular mobile, wireless phone or other digital devices such as tablets, without obtaining and verification of the subscriber's antecedents in the mode and manner for the time being approved by the Authority shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five hundred thousand rupees or with both.
  • 31. Offences and Punishments (PECA 2016) • 18. Tampering, etc, of communication equipment.- Whoever unlawfully or without authorization changes, alters, tampers with or re-programs unique device identifier of any communication equipment including a cellular or wireless handset and starts using or marketing such device for transmitting and receiving information shall be punished with imprisonment which may extend to three years or with fine which may extend to one million rupees or with both. Explanation - A "unique device identifier" is an electronic equipment identifier which is unique to a communication device. • 19. Unauthorized interception.- Whoever with dishonest intention commits unauthorized interception try technical means of- (a) any transmission that is not intended to be and is not open to the public, from or within an information system; or (b) electromagnetic emissions from an information system that are carrying data, shall be punished with imprisonment of either description for a term which may extend to two years or with fine which may extend to have hundred thousand rupees or with both.
  • 32. Offences and Punishments (PECA 2016) • 20. offences against dignity of a natural person.- (1) Whoever intentionally and publicly exhibits or displays or transmits any information through any information system, which he knows to be false, and intimidates or harms the reputation or privacy of a natural person, shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to one million rupees or with both: Provided that nothing; under this sub-section shall apply to anything aired by a broadcast media or distribution service licensed under the Pakistan Electronic Media Regulatory Authority Ordinance, 2OO2 (XIII of 2OO2). (2). Any aggrieved person may apply to Authority for removal, destruction of or blocking access to such information referred to in sub-section (1)...
  • 33. Offences and Punishments (PECA 2016) • 21. Offences against modesty of a natural person and minor.-(1) Whoever intentionally and publicly exhibits or displays or transmits any information which,- (a) superimposes a photograph of the face of a natural person over any sexually explicit image or video; or (b) includes a photograph or a video of a natural person in sexually explicit conduct; or (c) intimidates a natural person with any sexual act, or any sexually explicit image or video of a natural person; or (d) cultivates, entices or induces a natural person to engage in a sexually explicit act, through an information system to harm a natural person or his reputation, or to take revenge, or to create hatred or to blackmail, shall be punished with imprisonment for a term which may extend to five years or with fine which may extend to five million rupees or with both.
  • 34. Offences and Punishments (PECA 2016) (Sec 21) (2) whoever commits an offence under sub-section (1) with respect to a minor shall be punished with imprisonment for a term which may extend to seven years and with fine which may extend to five million rupees: Provided that in case of a person who has been previously convicted of an offence under sub-section (1) with respect to a minor shall be punished with imprisonment for a term of ten years and with fine. (3) Any aggrieved person may contact with authority for removal of unlawful content
  • 35. Offences and Punishments (PECA 2016) • 22. Child pornography,- (1) Whoever intentionally produces, offers or makes available, distributes or transmits through an information system or procures for himself or for another person or without lawful justification possesses material in an information system, that visually depicts- (a) a minor engaged in sexually explicit conduct; (b) a person appearing to be a minor engaged conduct; or in sexually explicit (c) realistic images representing a minor engaged in sexually explicit conduct or (d) discloses the identity of the minor, shall be punished with imprisonment for a term which may extend to seven years, or with fine which may extend to five million rupees or with both. (2 Any aggrieved person may contact with authority for removal of unlawful content…….
  • 36. Offences and Punishments (PECA 2016) • 23. Malicious code.- Whoever willfully and without authorization writes, offers, makes available, distributes or transmits malicious code through an information system or device, with intent to cause harm to any information system or data resulting in the corruption, destruction, alteration, suppression, theft or loss of the information system or data shall be punished with imprisonment for a term which may extend to two years or with fine which may extend to one million rupees or with both. Explanation.-For the purpose of this section, the expression "malicious code" includes, a computer program or a hidden function in a program that damages an information system or data or compromises the performance of such system or availability of data or uses it without proper authorization.
  • 37. Offences and Punishments (PECA 2016) • 24. Cyber stalking.. (l) A person commits the offence of cyber stalking who, with the intent to coerce or intimidate or harass any person, uses information system, information system: network, the Internet, website, electronic mail or any other similar means of communication to – (a) follow a person or contacts or attempts to contact such person to foster personal interaction repeatedly despite a clear indication of disinterest by such person; (b) monitor the use by a person of the internet, electronic mail, text massage or any other form of electronic communication;
  • 38. PECA 2016 (S.24) Cyber Stalking (c) watch or spy upon a person in a manner that results in fear of violence or serious alarm or distress, in the mind of such person; or (d) take a photograph or make a video of any person and displays or distributes it without his consent in a manner that harms a person. (2) … punishment 3 years or fine one million or with both: Provided that if victim of the cyber stalking under sub- section (1) is a minor the punishment may extend to have years or with fine which may extend to ten million rupees or with both. (3 Any aggrieved person may contact with authority for removal of unlawful content.
  • 39. Offences and Punishments (PECA 2016) • 25. Spamming.- (1) A person commits the offence of spamming, who with intent transmits harmful, fraudulent, misleading, illegal or unsolicited information to any person without permission of the recipient or who causes any information system to show any such information for wrongful gain. (2) A person including an institution or an organization engaged in direct marketing shall provide the option to the recipient of direct marketing to unsubscribe from such marketing. (3) Whoever commits the offence of spamming as described in subsection (1) by transmitting harmful, fraudulent, misleading or illegal information, shall be punished with imprisonment for a term which may extend to three months or with fine of rupees fifty thousand which may extend up to rupees five million or with both. (4) Whoever commits the offence of spamming … fifty thousand rupees, and for every subsequent violation shall be punished with fine not less than fifty thousand rupees that may extend up to one million rupees.
  • 40. Offences and Punishments (PECA 2016) • 26. Spoofing. -(1) Whoever with dishonest intention establishes a website or sends any information with a counterfeit source intended to be believed by the recipient or visitor of the website, to be an authentic source commits spoofing. (2) Whoever commits spoofing shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to five hundred thousand rupees or with both.
  • 41. Offences and Punishments (PECA 2016) • 27. Legal recognition of offence committed in relation to information system .- (1) Notwithstanding anything contained in any other law for the time being in force, an offence under this Act or any other law shall not be denied legal recognition and enforcement for the sole reason of such offence being committed in relation to or through the use of an information system. (2) References to 'property' in any law creating an offence in relation to or concerning property, shall include information system and data. • 28. Pakistan Penal Code, 1860 (Act XLV of 186O) to apply.- The provisions of the Pakistan Penal Code, 1860 (Act XLV of 1860), to the extent not inconsistent with anything provided in this Act, shall apply to the offences provided in this Act.
  • 42. PECA 2016 • Section 42. international Cooperation. The Federal Government may upon receipt of a request, through the designated agency under this Act, extend such cooperation to any foreign government, 24 x 7 network, any foreign agency or any international organization or agency for the purposes of investigations or proceedings concerning offences related to information systems ……
  • 43. Offences and Punishments (PECA 2016) • 43. Offences to be compoundable and non-cognizable.- (1) All offences under this Act, except the offences under sections 10, 21 and 22 and abetment thereof shall be non-cognizable, bail-able and compoundable: Provided that offences under section 17 shall be cognizable by the investigation agency on a written complaint by the Authority. (2| Offences under sections 10, 21 and 22 and abetment thereof shall be non-bailable, non- compoundable and cognizable by the investigation agency.
  • 44. Amendments (PECA 2016) • 54. Amendment of Electronic Transactions Ordinance, 2002 (LI of 2002) and pending proceedings. (1) Section 36 and 37 of the Electronic Transactions Ordinance, 2002 LI of 2002) are omitted. (2) Any action taken by or with the approval of the Authority or proceedings pending under the provisions of the Electronic Transactions Ordinance, 2002 (LI of 2002) repealed by sub- section (1), shall continue and be deemed to have been taken or initiated under this Act.
  • 45. Books for Reference 1 • Cyber Jurisprudence by S J Tubrazy
  • 46. Books for Reference 2 • The “Law of Digital Forensic ” by S J Tubrazy
  • 47. Shahid Jamal Tubrazy • Adv. Shahid Jamal Tubrazy is (LLM), Lahore High Court Lawyer, Lecturer of Cyber Laws, Speaker, Author & Expert in Cyber Law & Cyber Security, Cyber Law Consulting. • Email: shahy_legal@yahoo.com • Cell: 03214505080

Hinweis der Redaktion

  1. In 2016 – US defence department has to deal 100000 cyber attacks per day. In 2016- Hackers managed to transfer $80 Million in Bangladesh Central Bank, without leaving any Trace. In 2017- "WannaCry" ransomware attack losses could reach $4 billion. 230,000/- computers in 150 countries.
  2. Bendelladj, who is alleged to be the co-creator of a banking Trojan horse called SpyEye.
  3. To "exceed authorized access" is defined as "to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter." Guest-Tek Interactive Entm't, Inc. v. Pullen, 2009 U.S. Dist. LEXIS 98737 (D. Mass. Oct. 19, 2009).
  4. Authorization The process of granting or denying access to a network resource. Most computer security systems are based on a two-step process. The first stage is authentication, which ensures that a user is who he or she claims to be. The second stage is authorization, which allows the user access to various resources based on the user's identity.- in banks, companies and corporation
  5. Source Code- computer instructions, human-readable programming language, as ordinary text. Object code - machine code language, like 1001001010
  6. The petitioner had secured access unauthorisedly to the protected system of the Legal Advisor, breaching confidentiality of I.S. (Shankar vs State Rep. By on 13 December, 2010 Madras High Court)
  7. - Terminating International Traffic is accessing critical infrastructure information system or data. (2011 YLR 2280 ISLAMABAD)
  8. - Traffic data - Network traffic refers to the amount of data moving across a network at a given point of time.”.
  9. Integrity - refers to methods of ensuring that data is real, Integrity is one of the five pillars of Information Assurance. The other four are authentication, availability, confidentiality and non-repudiation. 
  10. Subscriber information means (any information held by a service provider, relating to subscribers of its services, other than traffic data or content data), and by which can be established: (i) the type of communication service used, the technical provisions thereof, and the period of service; (ii) the subscriber’s identity, mail address, telephone and other access number, billing and payment information, and/or (iii) any information regarding the location of installed communications equipment.
  11.  Unauthorized interception: A person commits the criminal offense of illegal interception of computer data when he or she intercepts transmissions of computer data.
  12. - Offline access -- system repair administrator access unauthorized access – cover corporate body IS.
  13. In a case of 'Phishing', a person pretending to be a legitimate association such as a bank or an insurance company in order to extract personal data from a user, such as access codes, passwords etc., which are then used his own advantage, misrepresents on the identity of the legitimate party. (National Association for Safhwre and Service Companies v. Ajay Sood, AIR 2005 NOC269).
  14. The accused erased programs from a printed circuit card used to control his employer's computerised saw for cutting out timber sections for window frames, he found guilty on the basis that the printed circuit card had been damaged and was now useless. (Cox v Riley (1986) 83 Cr App R 54)
  15. Terrorism finance online Alqaeda supporting literature - Ardit Ferizi was arrested in September 2015, according to the US intelligence the man provided the data to the popular IS militant 
  16. Cyber terrorism: U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."
  17. The essence of any forgery crime is the intent to defraud or injure. So being, this author proposes that an e-mail must also fit into the definition of a written instrument, wherein changing the routing information or the content of the message would then constitute fraudulent and material alteration thereof. (Powers v. State, 333 So. 2d 205, 207 (Ala. Crim. App. 1976).
  18. Mostly fraudulent SMS, lucky draws, Prize winning Schemes, BISP SMS. To sell data unauthorized in bulk.
  19. In March 2014, after it was learned two passengers with online stolen passports were on board Malaysia Airlines Flight 370. Identity theft is one of the fastest growing crimes in the United States. Every year, around 15 million people report being victims of identity theft, which results in $50 billion worth of financial loss. (INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ARTIFICIAL INTELLIGENCE)
  20. The Unique Device Identification (UDI) System is intended to assign a unique identifier to medical devices – that helps to identify counterfeit products  Unauthorized interception: intercepts by technical means, transmissions of data to, from or within an electronic system including electromagnetic emissions from an electronic system 
  21. Child pornography offenses are international crimes. Child pornography is one of the fastest growing businesses online, with estimated annual revenue of $16 billion. Webroot.com; The Association of Sites Advocating Child Protection.
  22. -  1 million women and nearly 400,000 men are stalked each year in the United States. Huffingtonpost 2015
  23. The sending of any unsolicited email advertising messages to this domain will result in the imposition of civil liability. (California Bus. & Prof. Code Section 17538.45). Shahid Jamal Tubrazy Vs FOP. Writ petition. Court order issue is genuine, respondent PTA should redrees the greivances on the contact of petitioner.
  24. Spoofing is used more in email than websites
  25. Obaid ur Rahman V State 2015 . Inerpol docks back the cyber criminal from Saudia to Pakistan to face the trial.
  26. Hacking and Tempering with digital evidence ADNAN HAFEEZ v State 2016 PLD 318 LAHORE-HIGH-COURT-LAHORE. Cyber crimes are not victimless FAISAL RIAZ ETC VS STATE ETC (25-11-2014) 2014 LHC 8067. Illegal gateway exchange SHAHZAD ASGHAR GONDAL v State 2016 YLR 439 LAHORE-HIGH-COURT-LAHORE. Violation of privacy of information (2012 PCrLJ 1851 ISLAMABAD). Abetment and criminal misconduct (2010 SCMR 1221 SUPREME-COURT). Accused was terminating International Traffic (2011 YLR 2280 ISLAMABAD). Cheating and embezzlement. Beneficiary of fraud (2010 PCrLJ 67 LAHORE-HIGH-COURT-LAHORE)
  27. Movies referred: Mighty heart. Die Hard 4. The Hacker. Source Code.