SlideShare une entreprise Scribd logo
1  sur  27
CYBER
LAW IN PAKISTAN
MEDIA LAW &
ETHIC
BS 4 A NUML UNIVERSITY
Page no : 1
Media Law & Ethic ( Amna Ashraf )
PRESENTED BY
• Syed Ali Hassan Shah
• Furqan Idress
• Nida Imran
• Nirmal Bazla
Page no : 2
Media Law & Ethic (Amna
Ashraf)
NIDA
IMRAN
1st to present the slides
Page no : 3
Media Law & Ethic ( Amna Ashraf )
CONTENTS
• What is Cyber Crime?
• Who are Cyber Criminals?
• What Are Cyber Laws?
• Cyber Laws in the World
• Cyber Laws in Pakistan
• How to Prevent Cyber Crime?
Page no : 4
Media Law & Ethic ( Amna Ashraf )
 Crime Commmeitted using a Computer and the internet to steal a
persons identity or sell contraband or stalk victims or disrupt operations
with malicious programs, Threating Email, Defamation, Spam and
Phishing are some examples where computers are used to commit crime.
 Cyber crime also stated as any use of a computer as an instrument to
further illegal ends, such as
 Committing fraud
 Stealing identities
 Violating privacy
WHAT IS CYBER CRIME ?
Page no : 5
Media Law & Ethic ( Amna Ashraf )
EXAMPLES
 E-mail account of a Federal Minister is hacked.
 Credit cards frauds reach to an alarming level.
 Financial institutions are the favourite targets of Cyber criminals ---
worstly effecting the technological progress in the area of e –Commerce.
Page no : 6
Media Law & Ethic ( Amna Ashraf )
HISTORY
 The 1st recorded cyber crime took place in the year 1820 . In 1820,
Joseph-Marie a Textile manufacture in France, produced loom. This
device allowed the repetition of a series of steps in the weaving of
special fabrics. This Resulted in afear amongst Joseph employee that
their traditional employee & livelihood were being threatened.
Page no : 7
Media Law & Ethic ( Amna Ashraf )
CATEGORIES OF CYBER CRIME
• 1. The computer as a Target : using a computer to attack other
computer/device.
• 2. The computer as a Weapon : using a computer to commit real world
crimes.
Page no : 8
Media Law & Ethic ( Amna Ashraf )
CRIME REPORT IN PAKISTAN 2018 TO 2019
Offences 2006 2005 Total
IPR Crimes 34 44 78
Spurious Drugs 83 88
171
Cyber Crimes 102 115
217
Counterfeit Currencies 19 13
32
Others 299 331 630
Total: 537 591
1128
Page no : 9
Media Law & Ethic ( Amna Ashraf )
FURQAN IDRESS
2nd to present the slides
Page no : 10
Media Law & Ethic ( Amna Ashraf )
CYBER ATTACK
In Computer & Computer Network an
attack is any attempt to expose, alter ,
disable , destroy , steal or gain
unauthorized access or make unathorized
use of an asset.
TYPES
Hacking
Credit Card
Spoofing
Net Extortion
Virus Attack
WHAT IS CYBER ATTACK ?”
Page no : 11
Media Law & Ethic ( Amna Ashraf )
Teen
( Age Group 11-19 )
Organized
Hacktivists
Disgruntled
Employee
Professional
Hackers
Terrorists
WHO ARE
CYBER
CRIMINALS ?
Page no : 12
Media Law & Ethic ( Amna Ashraf )
 Cyber Laws is anAttempt to apply
laws designed for the physical world
to human activity on internet
WHAT IS CYBER
LAW ?
Page no : 13
Media Law & Ethic ( Amna Ashraf )
 The Legal issues related to use
of communication technology
i.e the internet .
 Privacy
 Intellectual property
WHAT IS CYBER
LAW ?
Page no : 14
Media Law & Ethic (Amna Ashraf )
These laws not only
deal with crime of
Internet
These deal with all
dimensions related to
computer & networks
Two of them are
most known
Electronic
Transaction
Ordinance 2002
Electronic / Cyber
Crime Bill 2007
CYBER LAW IN
PAKISTAN
Page no : 15
Media Law & Ethic ( Amna Ashraf )
NIRMAL BAZLA
3rd To present the slides
Page no : 16
Media Law & Ethic ( Amna Ashraf )
ELECTRONIC TRANSACTION ORDINANCE 2002
Overview
 The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by
national lawmakers.
 Laid the foundation for comprehensive Legal Infrastructure.
 It is heavily taken from foreign law related to cyber crime.
Page no : 17
Media Law & Ethic ( Amna Ashraf )
ELECTRONIC TRANSACTION ORDINANCE 2002
 There are 43 sections in this ordinance
 It deals with following 8 main areas relating to eCommerce.
 Important Sections are
 36. Violation of privacy information
 gains or attempts to gain access
 to acquire the information
 Imprisonment 7 years
 Fine Rs. 1 million
Page no : 18
Media Law & Ethic (Amna Ashraf )
ELECTRONIC TRANSACTION ORDINANCE 2002
 38. Offences to be non-bailable, compoundable and cognizable
 All offences under this Ordinance shall be non-bailable, compoundable and
cognizable.
 39. Prosecution and trial of offences.
 No Court inferior to the Court of Sessions shall try any offence under this
Ordinance.
Page no : 19
Media Law & Ethic ( Amna Ashraf )
ELECTRONIC/CYBER CRIME BILL 2007
 It was promulgated by the President of Pakistan on the 31st December 2007
 The bill deals with the electronic crimes included:
 Cyber terrorism
 Electronic fraud
 Unauthorized access to code
 Cyber stalking
 Cyber Spamming/spoofing
Page no : 20
Media Law & Ethic ( Amna Ashraf )
SYED ALI HASSAN
SHAH
Last to present the slides
Page no : 21
Media Law & Ethic ( Amna Ashraf )
PREVENTION OF ELECTRONIC CRIMES ACT
 Cyber Crime Bill 2007
 The legislation established new offences including
 illegal access of data (hacking)
 DOS and DDOS attacks
 electronic forgery and electronic fraud cyber terrorism
 Prevention
Page no : 22
Media Law & Ethic (Amna Ashraf )
PUNISHMENTS
 Under this law there are defined punishment for the offence.
 Every respective offence under this law has its distinctive punishment which can be imprisonment or fine.
Page no : 23
Media Law & Ethic ( Amna Ashraf )
PUNISHMENTS
Offence Imprisonment (years) Fine
CriminalAccess 3 3 Lac
Criminal DataAccess 3 3 Lac
Data Damage 3 3 Lac
System Damage 3 3 Lac
Electronic Fraud 7 7 Lac
Electronic Forgery 7 7 Lac
Misuse of Device 3 3 Lac
Defamation 5 5 Lac
Cyber stalking 3 3 Lac
Cyber terrorism Life 10 Million
MOST COMMON CRIME & PUNISHEMENT
• Cyber stalking Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both
• Spamming Three Months of Prison or Fine up to Rs. 5 Million or Both
• Spoofing Up to 3 Years in Jail or Fine up to Rs. 500,00 or both
• Malicious Code Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both
• Glorification of an offence Up to 7 Years Prison or up to Rs. 10 Million Fine or both
• Electronic forgery Up to 3 Years in Prison or up to Rs. 250,000 fine or bot
Page no : 25
Media Law & Ethic( Amna Ashraf)
HOW TO PREVENT CYBER CRIME ?
Continuously update software.
Encrypt all data
Use ad-blockers
Set and communicate email response policies
Update, distribute and get signatures on Acceptable Use agreements
Page no : 26
Media Law & Ethic ( Amna Ashraf)
• Thank you Bs 4 A
ANY QUESTION ?
Page no : 27
Media Law & Ethic ( Amna Ashraf )

Contenu connexe

Tendances

Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
gsmonga
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
Fahad Abbasi
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
Aryan Ajmer
 

Tendances (20)

Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Class cybercrime
Class cybercrimeClass cybercrime
Class cybercrime
 
Alsalem_Int Pres
Alsalem_Int PresAlsalem_Int Pres
Alsalem_Int Pres
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Computer forensics law and privacy
Computer forensics   law and privacyComputer forensics   law and privacy
Computer forensics law and privacy
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 

Similaire à Cyber law media law & ethic

CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
AJHSSR Journal
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Asish Verma
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
Nabarun Sarkar
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 

Similaire à Cyber law media law & ethic (20)

Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 

Plus de Syed Ali Hassan (7)

Media ethics & laws 5
Media ethics & laws   5Media ethics & laws   5
Media ethics & laws 5
 
Media ethics & laws 6
Media ethics & laws   6Media ethics & laws   6
Media ethics & laws 6
 
Data investigative reporting & ethical problem in pakistan journalism
Data investigative reporting & ethical problem in pakistan journalismData investigative reporting & ethical problem in pakistan journalism
Data investigative reporting & ethical problem in pakistan journalism
 
Impact of social media in pakistan
Impact of social media in pakistanImpact of social media in pakistan
Impact of social media in pakistan
 
Advertising Decision Making Frame Work
Advertising Decision Making Frame WorkAdvertising Decision Making Frame Work
Advertising Decision Making Frame Work
 
PEMRA
PEMRA PEMRA
PEMRA
 
Language & culture
Language & cultureLanguage & culture
Language & culture
 

Dernier

一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
F La
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
F La
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
Fir La
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
e9733fc35af6
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
Airst S
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
VarshRR
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 

Dernier (20)

How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 

Cyber law media law & ethic

  • 1. CYBER LAW IN PAKISTAN MEDIA LAW & ETHIC BS 4 A NUML UNIVERSITY Page no : 1 Media Law & Ethic ( Amna Ashraf )
  • 2. PRESENTED BY • Syed Ali Hassan Shah • Furqan Idress • Nida Imran • Nirmal Bazla Page no : 2 Media Law & Ethic (Amna Ashraf)
  • 3. NIDA IMRAN 1st to present the slides Page no : 3 Media Law & Ethic ( Amna Ashraf )
  • 4. CONTENTS • What is Cyber Crime? • Who are Cyber Criminals? • What Are Cyber Laws? • Cyber Laws in the World • Cyber Laws in Pakistan • How to Prevent Cyber Crime? Page no : 4 Media Law & Ethic ( Amna Ashraf )
  • 5.  Crime Commmeitted using a Computer and the internet to steal a persons identity or sell contraband or stalk victims or disrupt operations with malicious programs, Threating Email, Defamation, Spam and Phishing are some examples where computers are used to commit crime.  Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as  Committing fraud  Stealing identities  Violating privacy WHAT IS CYBER CRIME ? Page no : 5 Media Law & Ethic ( Amna Ashraf )
  • 6. EXAMPLES  E-mail account of a Federal Minister is hacked.  Credit cards frauds reach to an alarming level.  Financial institutions are the favourite targets of Cyber criminals --- worstly effecting the technological progress in the area of e –Commerce. Page no : 6 Media Law & Ethic ( Amna Ashraf )
  • 7. HISTORY  The 1st recorded cyber crime took place in the year 1820 . In 1820, Joseph-Marie a Textile manufacture in France, produced loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This Resulted in afear amongst Joseph employee that their traditional employee & livelihood were being threatened. Page no : 7 Media Law & Ethic ( Amna Ashraf )
  • 8. CATEGORIES OF CYBER CRIME • 1. The computer as a Target : using a computer to attack other computer/device. • 2. The computer as a Weapon : using a computer to commit real world crimes. Page no : 8 Media Law & Ethic ( Amna Ashraf )
  • 9. CRIME REPORT IN PAKISTAN 2018 TO 2019 Offences 2006 2005 Total IPR Crimes 34 44 78 Spurious Drugs 83 88 171 Cyber Crimes 102 115 217 Counterfeit Currencies 19 13 32 Others 299 331 630 Total: 537 591 1128 Page no : 9 Media Law & Ethic ( Amna Ashraf )
  • 10. FURQAN IDRESS 2nd to present the slides Page no : 10 Media Law & Ethic ( Amna Ashraf )
  • 11. CYBER ATTACK In Computer & Computer Network an attack is any attempt to expose, alter , disable , destroy , steal or gain unauthorized access or make unathorized use of an asset. TYPES Hacking Credit Card Spoofing Net Extortion Virus Attack WHAT IS CYBER ATTACK ?” Page no : 11 Media Law & Ethic ( Amna Ashraf )
  • 12. Teen ( Age Group 11-19 ) Organized Hacktivists Disgruntled Employee Professional Hackers Terrorists WHO ARE CYBER CRIMINALS ? Page no : 12 Media Law & Ethic ( Amna Ashraf )
  • 13.  Cyber Laws is anAttempt to apply laws designed for the physical world to human activity on internet WHAT IS CYBER LAW ? Page no : 13 Media Law & Ethic ( Amna Ashraf )
  • 14.  The Legal issues related to use of communication technology i.e the internet .  Privacy  Intellectual property WHAT IS CYBER LAW ? Page no : 14 Media Law & Ethic (Amna Ashraf )
  • 15. These laws not only deal with crime of Internet These deal with all dimensions related to computer & networks Two of them are most known Electronic Transaction Ordinance 2002 Electronic / Cyber Crime Bill 2007 CYBER LAW IN PAKISTAN Page no : 15 Media Law & Ethic ( Amna Ashraf )
  • 16. NIRMAL BAZLA 3rd To present the slides Page no : 16 Media Law & Ethic ( Amna Ashraf )
  • 17. ELECTRONIC TRANSACTION ORDINANCE 2002 Overview  The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers.  Laid the foundation for comprehensive Legal Infrastructure.  It is heavily taken from foreign law related to cyber crime. Page no : 17 Media Law & Ethic ( Amna Ashraf )
  • 18. ELECTRONIC TRANSACTION ORDINANCE 2002  There are 43 sections in this ordinance  It deals with following 8 main areas relating to eCommerce.  Important Sections are  36. Violation of privacy information  gains or attempts to gain access  to acquire the information  Imprisonment 7 years  Fine Rs. 1 million Page no : 18 Media Law & Ethic (Amna Ashraf )
  • 19. ELECTRONIC TRANSACTION ORDINANCE 2002  38. Offences to be non-bailable, compoundable and cognizable  All offences under this Ordinance shall be non-bailable, compoundable and cognizable.  39. Prosecution and trial of offences.  No Court inferior to the Court of Sessions shall try any offence under this Ordinance. Page no : 19 Media Law & Ethic ( Amna Ashraf )
  • 20. ELECTRONIC/CYBER CRIME BILL 2007  It was promulgated by the President of Pakistan on the 31st December 2007  The bill deals with the electronic crimes included:  Cyber terrorism  Electronic fraud  Unauthorized access to code  Cyber stalking  Cyber Spamming/spoofing Page no : 20 Media Law & Ethic ( Amna Ashraf )
  • 21. SYED ALI HASSAN SHAH Last to present the slides Page no : 21 Media Law & Ethic ( Amna Ashraf )
  • 22. PREVENTION OF ELECTRONIC CRIMES ACT  Cyber Crime Bill 2007  The legislation established new offences including  illegal access of data (hacking)  DOS and DDOS attacks  electronic forgery and electronic fraud cyber terrorism  Prevention Page no : 22 Media Law & Ethic (Amna Ashraf )
  • 23. PUNISHMENTS  Under this law there are defined punishment for the offence.  Every respective offence under this law has its distinctive punishment which can be imprisonment or fine. Page no : 23 Media Law & Ethic ( Amna Ashraf )
  • 24. PUNISHMENTS Offence Imprisonment (years) Fine CriminalAccess 3 3 Lac Criminal DataAccess 3 3 Lac Data Damage 3 3 Lac System Damage 3 3 Lac Electronic Fraud 7 7 Lac Electronic Forgery 7 7 Lac Misuse of Device 3 3 Lac Defamation 5 5 Lac Cyber stalking 3 3 Lac Cyber terrorism Life 10 Million
  • 25. MOST COMMON CRIME & PUNISHEMENT • Cyber stalking Up to 3 Years in Jail or Up to Rs. 1 Million in Fine or both • Spamming Three Months of Prison or Fine up to Rs. 5 Million or Both • Spoofing Up to 3 Years in Jail or Fine up to Rs. 500,00 or both • Malicious Code Up to 2 Years in Jail or up to Rs. 1 Million in Fine or Both • Glorification of an offence Up to 7 Years Prison or up to Rs. 10 Million Fine or both • Electronic forgery Up to 3 Years in Prison or up to Rs. 250,000 fine or bot Page no : 25 Media Law & Ethic( Amna Ashraf)
  • 26. HOW TO PREVENT CYBER CRIME ? Continuously update software. Encrypt all data Use ad-blockers Set and communicate email response policies Update, distribute and get signatures on Acceptable Use agreements Page no : 26 Media Law & Ethic ( Amna Ashraf)
  • 27. • Thank you Bs 4 A ANY QUESTION ? Page no : 27 Media Law & Ethic ( Amna Ashraf )