SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Present Cyber Laws and Discovery of
Digital Evidence in Pakistan
Introduction of Cyber laws and
Discovery of Digital Evidence Forensic
Laws
Cyber Law Statutes
• Electronic Transaction Ordinance 2002
• Payment System Electronic Funds Transfer Act
2007
• Anti-Money Laundering Act 2010
• Pakistan Protection Act 2014
• PTA Regulation S.R.O 713 (1)/2009
• Investigation of Fair Trial Act 2013
• Qanun -e-Shahdat Order 1984 amended
ETO 2002 Cyber Law Offences
• Section 34, 35 of ETO covered the offences by
corporate body, punishment is 10 year and fine
10 million or both
• Sec. 36 of ETO is about Violation of privacy of
information, unauthorized access to information
system, punishment 7 years and fine one million
• Sec. 37 of ETO Damage to information system,
unauthorized alter, delete, modify, remove ,
transmit etc; punishment 7 years and one million
PSEFTA 2007 Cyber Law Offences
• 56. Criminal Liability; providing false information,
corporate offence, punish 3 yrs fine 3 million
• 57. Violations Affecting Electronic Commerce; whoever
uses or attempts or conspires to use any counterfeit,
fictitious, altered, forged, lost, stolen, or fraudulently
obtained Debit Instrument to obtain money etc, punish
7 yrs, one million
• 58. Cheating by Use of Electronic Device; Whosoever
cheats , fraudulently or dishonestly uses any credit or
debit card, or code or any other means of access to an
Electronic Fund Transfer device and thereby causes any
wrongful gain to him, punish 7 yrs and fine
Anti Money Laundering Act 2010
• The section 2 f (v) of Anti-money Laundering
Act 2010 recognizes the electronic money and
the record maintained in the electronic
device.
Pakistan Protection Act 2014
• Crimes via internet and information technology
against state and state owned institutions may be
cybercrimes. The section 2(i) provides a schedule
in The Pakistan Protection Act 2014 which sets
the schedule cybercrimes as;
• (ix) destruction of or attack on communication
and interaction lines, devices, grids, stations, or
systems etc
• (xiv) crimes against computers including
cybercrimes, internet offenses and other offences
related to information technology etc
PTA Regulations
• PTA has issued S.R.O 713 (1)/2009 against
spams which is called, Protection from Spam,
Unsolicited, Fraudulent an Obnoxious
Communication Regulations 2009
• PTA in its letter No. 1609/11/N&TA to all
CMTOs has restrain from sending SMS contain
bar-code or Masking
COPYRIGHT PROTECTION UNDER
COPYRIGHT ORDINANCE 1962
• Section 66 of the Ordinance, as amended by
the Amendment Act, provides that any person
who knowingly infringes or abets the
infringement of the copyright in a work
(defined to include computer programmes), or
any other right conferred by the Ordinance
shall be punishable with imprisonment which
may extend to 3 years with fine
QANUN -E-SHAHDAT ORDER 1984
• While enacting the ETO 2002 the QSO 1984 has
been amended
• Art 2 (e); (f) the expression, “automated”,
“electronic”, “information”, “information system”,
“electronic document”, “electronic signature etc
shall bear the meanings given in the ETO 2002
• Addition in Art. 30; “Statements gene rated by
automated information systems may be
attributed to the person exercising power or
control over the said information system”
QSO 1984
• Addition in Art. 46 A for Relevance of information
generated, received or recorded by automated information
system.
• Art 59 is about the authenticity or integrity of electronic
record.
• Art. 73 A printout or other form of output of an automated
information system shall not be denied the status of
primary evidence.
• Art. 78-A. Proof of electronic signature and electronic
document.
• Art. 85 is about certificates deposited in a repository.
• Case Law; Alamgir Khalid Chughtai V State 2009 PLD
254 Lahore
Investigation of Fair Trial Act 2013
• Preamble; An Act to provide for investigation for
collection of evidence by means of modern
techniques and devices
• To regulate advance and modern investigative
techniques such as covert surveillance and
human intelligence, property interference,
wiretapping and communication interception
• 16. Authorization under the warrant; video
recording, intercepting telephone, obtaining
email, SMS, electronic communication, electronic
database etc
IFTA 2013
• Sec 22. Registration of Case on the based on
evidence collected in pursuant of warrant
• 23. Admissibility of warrant based information
• 25. Report of expert ; In case where an
analysis of the intercepted material collected
pursuant to the warrant of surveillance or
interception is required, then the same shall
be carried out by a person referred to in
section 3(f) being suitably qualified
IFTA 2013
• 31. Warrants to be served outside Pakistan
• 32. Warrants received from outside Pakistan
• Case Laws
• Qurban Ali V State 2007 PCRLJ 675 KARACHI; held E-
mail could be retrieved from it by using computer
Forensics Tools, Prosecution, in the case had not taken
any effort to prove E-mail in accordance with law.
• WAQAS AHMED SIDDIQUI Vs THE STATE through Cyber
Circle FIA 2012 YLR 320 KARACHI; objectionable email
• Mst. MARIUM HAJI V Mrs. YASMIN R. MINHAS 2003
PLD 148 KARACHI (Evidence based on modern devices,
Pics can be manipulated)
Shahid Jamal Tubrazy
Adv. Shahid Jamal Tubrazy is Masters in
Law(LLM), Lahore High Court Lawyer, Lecturer of
Cyber Laws, Speaker, Author & Expert in Cyber
Law & Cyber Security, President – Cyber Law
Consulting(Advocates & Attorneys)
Email: shahy_legal@yahoo.com

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 

Was ist angesagt? (20)

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 

Andere mochten auch (12)

SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 

Ähnlich wie Present Cyber Laws and Discovery of Digital Evidence

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
22010122059
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
priya rana
 

Ähnlich wie Present Cyber Laws and Discovery of Digital Evidence (20)

Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Information technology and law and trai
Information technology and law and traiInformation technology and law and trai
Information technology and law and trai
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber securitylaw
Cyber securitylawCyber securitylaw
Cyber securitylaw
 
cyberlaw
cyberlawcyberlaw
cyberlaw
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber CrimesRelevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
Relevant Provisions under IT Act, 2000 related to Investigation of Cyber Crimes
 
Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2Cloud and security 6 jul2013 v2
Cloud and security 6 jul2013 v2
 
Section 69 Information technology act 2001
Section 69 Information technology act 2001Section 69 Information technology act 2001
Section 69 Information technology act 2001
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law/Business law
Cyber law/Business lawCyber law/Business law
Cyber law/Business law
 

Kürzlich hochgeladen

PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
mahikaanand16
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
MollyBrown86
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
PoojaGadiya1
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 

Kürzlich hochgeladen (20)

PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptxPresentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
Presentation on Corporate SOCIAL RESPONSIBILITY- PPT.pptx
 
Contract law. Indemnity
Contract law.                     IndemnityContract law.                     Indemnity
Contract law. Indemnity
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 

Present Cyber Laws and Discovery of Digital Evidence

  • 1. Present Cyber Laws and Discovery of Digital Evidence in Pakistan Introduction of Cyber laws and Discovery of Digital Evidence Forensic Laws
  • 2. Cyber Law Statutes • Electronic Transaction Ordinance 2002 • Payment System Electronic Funds Transfer Act 2007 • Anti-Money Laundering Act 2010 • Pakistan Protection Act 2014 • PTA Regulation S.R.O 713 (1)/2009 • Investigation of Fair Trial Act 2013 • Qanun -e-Shahdat Order 1984 amended
  • 3. ETO 2002 Cyber Law Offences • Section 34, 35 of ETO covered the offences by corporate body, punishment is 10 year and fine 10 million or both • Sec. 36 of ETO is about Violation of privacy of information, unauthorized access to information system, punishment 7 years and fine one million • Sec. 37 of ETO Damage to information system, unauthorized alter, delete, modify, remove , transmit etc; punishment 7 years and one million
  • 4. PSEFTA 2007 Cyber Law Offences • 56. Criminal Liability; providing false information, corporate offence, punish 3 yrs fine 3 million • 57. Violations Affecting Electronic Commerce; whoever uses or attempts or conspires to use any counterfeit, fictitious, altered, forged, lost, stolen, or fraudulently obtained Debit Instrument to obtain money etc, punish 7 yrs, one million • 58. Cheating by Use of Electronic Device; Whosoever cheats , fraudulently or dishonestly uses any credit or debit card, or code or any other means of access to an Electronic Fund Transfer device and thereby causes any wrongful gain to him, punish 7 yrs and fine
  • 5. Anti Money Laundering Act 2010 • The section 2 f (v) of Anti-money Laundering Act 2010 recognizes the electronic money and the record maintained in the electronic device.
  • 6. Pakistan Protection Act 2014 • Crimes via internet and information technology against state and state owned institutions may be cybercrimes. The section 2(i) provides a schedule in The Pakistan Protection Act 2014 which sets the schedule cybercrimes as; • (ix) destruction of or attack on communication and interaction lines, devices, grids, stations, or systems etc • (xiv) crimes against computers including cybercrimes, internet offenses and other offences related to information technology etc
  • 7. PTA Regulations • PTA has issued S.R.O 713 (1)/2009 against spams which is called, Protection from Spam, Unsolicited, Fraudulent an Obnoxious Communication Regulations 2009 • PTA in its letter No. 1609/11/N&TA to all CMTOs has restrain from sending SMS contain bar-code or Masking
  • 8. COPYRIGHT PROTECTION UNDER COPYRIGHT ORDINANCE 1962 • Section 66 of the Ordinance, as amended by the Amendment Act, provides that any person who knowingly infringes or abets the infringement of the copyright in a work (defined to include computer programmes), or any other right conferred by the Ordinance shall be punishable with imprisonment which may extend to 3 years with fine
  • 9. QANUN -E-SHAHDAT ORDER 1984 • While enacting the ETO 2002 the QSO 1984 has been amended • Art 2 (e); (f) the expression, “automated”, “electronic”, “information”, “information system”, “electronic document”, “electronic signature etc shall bear the meanings given in the ETO 2002 • Addition in Art. 30; “Statements gene rated by automated information systems may be attributed to the person exercising power or control over the said information system”
  • 10. QSO 1984 • Addition in Art. 46 A for Relevance of information generated, received or recorded by automated information system. • Art 59 is about the authenticity or integrity of electronic record. • Art. 73 A printout or other form of output of an automated information system shall not be denied the status of primary evidence. • Art. 78-A. Proof of electronic signature and electronic document. • Art. 85 is about certificates deposited in a repository. • Case Law; Alamgir Khalid Chughtai V State 2009 PLD 254 Lahore
  • 11. Investigation of Fair Trial Act 2013 • Preamble; An Act to provide for investigation for collection of evidence by means of modern techniques and devices • To regulate advance and modern investigative techniques such as covert surveillance and human intelligence, property interference, wiretapping and communication interception • 16. Authorization under the warrant; video recording, intercepting telephone, obtaining email, SMS, electronic communication, electronic database etc
  • 12. IFTA 2013 • Sec 22. Registration of Case on the based on evidence collected in pursuant of warrant • 23. Admissibility of warrant based information • 25. Report of expert ; In case where an analysis of the intercepted material collected pursuant to the warrant of surveillance or interception is required, then the same shall be carried out by a person referred to in section 3(f) being suitably qualified
  • 13. IFTA 2013 • 31. Warrants to be served outside Pakistan • 32. Warrants received from outside Pakistan • Case Laws • Qurban Ali V State 2007 PCRLJ 675 KARACHI; held E- mail could be retrieved from it by using computer Forensics Tools, Prosecution, in the case had not taken any effort to prove E-mail in accordance with law. • WAQAS AHMED SIDDIQUI Vs THE STATE through Cyber Circle FIA 2012 YLR 320 KARACHI; objectionable email • Mst. MARIUM HAJI V Mrs. YASMIN R. MINHAS 2003 PLD 148 KARACHI (Evidence based on modern devices, Pics can be manipulated)
  • 14. Shahid Jamal Tubrazy Adv. Shahid Jamal Tubrazy is Masters in Law(LLM), Lahore High Court Lawyer, Lecturer of Cyber Laws, Speaker, Author & Expert in Cyber Law & Cyber Security, President – Cyber Law Consulting(Advocates & Attorneys) Email: shahy_legal@yahoo.com

Hinweis der Redaktion

  1. Cyber Law Statutes Electronic Transaction Ordinance 2002 Payment System Electronic Funds Transfer Act 2007 Anti-Money Laundering Act 2010 Pakistan Protection Act 2014 PTA Regulation S.R.O 713 (1)/2009