SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Lahore School of economics
Cyber Crime Laws in
Pakistan
A Brief Overview
Ayesha Majid
Iza Haider
Kinza Babr
Mahnoor Saad
2-22-2018
0 | P a g e
Contents
Cyber Crime ................................................................................................................................... 2
Cyber Laws..................................................................................................................................... 2
Cyber Laws in the World ............................................................................................................ 2
Cyber Laws in Pakistan .................................................................................................................. 3
Electronic Transaction Ordinance (ETO) 2002.............................................................................. 3
Pre-ETO 2002 Scenario .............................................................................................................. 3
Post ETO 2002 ............................................................................................................................ 3
Sections of ETO 2002 ................................................................................................................. 4
Electronic/Cyber Crime Bill 2007.................................................................................................. 5
Prevention of Electronic Crimes Act (PECA) 2016....................................................................... 6
Punishments for Cyber Crime under Judicial Precedence.............................................................. 7
1 | P a g e
Cyber Crime
Cybercrime is an act in which computers or networks are a tool, a target, or a place of
criminal activity. Cybercrime is also stated as any use of a computer as an instrument to
further illegal ends, such as
• Committing fraud
• Stealing identities
• Violating privacy
It is also include traditional crimes in which computers or networks are used to enable the
illicit activity. As the computer has become central to commerce, entertainment, and
government. Cybercrime has grown in importance.
• E-mail account of a Federal Minister is hacked.
• Credit cards frauds reach to an alarming level.
• Visiting CEOs of Multinational Companies gets threatening E-mails.
• Financial institutions are the favourite targets of Cyber criminals, mostly effecting the
technological progress in the area of e –Commerce.
Cyber Crimes Reported in Pakistan
A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006.
Cyber Laws
The legal issues related to use of communications technology, particularly "cyberspace", i.e. the
Internet. It is an intersection of many legal fields, like:
• Intellectual property
• Privacy
Cyber laws is an attempt to apply laws designed for the physical world to human activity on
the Internet.
Cyber Laws in the World
• Electronic Commerce Act (Ireland)
• Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore)
2 | P a g e
• Electronic Transactions Ordinance (Hong Kong)
• Information Technology Act (India)
• Information Communication Technology Act Draft (Bangladesh)
Cyber Laws in Pakistan
There are different laws, promulgated in Pakistan. These laws not only deal with crime of
Internet. These deal with all dimensions related to computer & networks. Three of them
are most known. They are:
• Electronic Transaction Ordinance (ETO) 2002
• Electronic / Cyber Crime Bill 2007
• Prevention of Electronic Crimes Act (PECA) 2016
Electronic Transaction Ordinance
(ETO) 2002
The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation
created by national lawmakers. A first step and a solid foundation for legal sanctity and
protection for Pakistani e-Commerce locally and globally. The ordinance laid the foundation for
comprehensive Legal Infrastructure. It is heavily taken from foreign law related to cybercrime.
Pre-ETO 2002 Scenario
• No recognition of electronic documentation
• No recognition of electronic records
• No recognition of evidential basis of documents/records
• Failure to authenticate or identify digital or electronic signatures or forms of authentication
• No online transaction could be legally binding
• Electronic Data & Forensic Evidence not covered. No Rules
Post ETO 2002
• Electronic Documentation & Records recognized
• Electronic & Digital forms of authentication & identification given legal sanctity
3 | P a g e
• Messages through email, fax, mobile phones, Plastic Cards, Online recognized.
Sections of ETO 2002
There are 43 sections in this ordinance. It deals with following 8 main areas relating to e-
Commerce.
1. Recognition of Electronic Documents
2. Electronic Communications
3. Digital Signature regime and its evidential consequences
4. Web Site & Digital Signatures Certification Providers
5. Stamp Duty
6. Attestation, notarization, certified copies
7. Jurisdiction
8. Offences
Important Sections of the act are:
Sec 36. Violation of privacy information
• gains or attempts to gain access
• to any information system with or without intent
• to acquire the information
• Gain Knowledge
• Imprisonment 7 years
• Fine Rs. 1 million
• alter, modify, delete, remove, generate, transmit or store information
• to impair the operation of,
• or prevent or hinder access to, information
• knowingly not authorized
• Imprisonment 7 years
• Fine Rs. 1 million
Sec 38. Offences to be non-bail able, compoundable and cognizable
4 | P a g e
• All offences under this Ordinance shall be non-bail able, compoundable and
cognizable. Sec 39. Prosecution and trial of offences.
• No Court inferior to the Court of Sessions shall try any offence under this Ordinance.
Electronic/Cyber Crime Bill 2007
Prevention of Electronic Crimes Ordinance, 2007 was promulgated by the President of Pakistan
on the 31st December 2007 and approved by federal cabinet on 17 January 2007. The Prevention
of Electronic Crime Ordinance (PECO) 2007 was presented in the National Assembly under
article 89(2) of the Constitution. The bill deals with the electronic crimes included:
Cyber terrorism
Data damage
Electronic fraud
Electronic forgery
Unauthorized access to code
Cyber stalking
Cyber Spamming/spoofing
It offers penalties ranging from six months imprisonment to capital punishment for 17 types of
cybercrimes. It will apply to every person who commits an offence, irrespective of his
nationality or citizenship. It gives exclusive powers to the Federal Investigation Agency (FIA)
to investigate and charge cases against such crimes. The bill suggests maximum punishment of
death or life imprisonment for those booked under cybercrimes or involved in sensitive
electronic systems offences. The Minister for Information Technology Awais Ahmad Khan
Leghari stated for the bill: “the e-crime law would require the internet companies maintain their
traffic data for at least six months to enable the agencies to investigate cases involving data
stored by them.” He said the law would enable the government to seek extradition of foreign
nationals through Interpol for their involvement in criminal activities punishable under the law.
5 | P a g e
Prevention of Electronic Crimes Act
(PECA) 2016
National Assembly enacted the PECA to provide a comprehensive legal framework to define
various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in
relation to electronic crimes. Supports Cyber Crime Bill 2007. The legislation established new
offences including
illegal access of data (hacking)
DOS and DDOS attacks
electronic forgery and electronic fraud
cyber terrorism
The legislation provides new investigative powers which were unavailable before such as
search and seizure of digital forensic evidence using technological means, production orders for
electronic evidence, electronic evidence preservation order, partial disclosure of traffic data,
and real time collection of data under certain circumstances and other enabling power which are
necessary to effectively investigate cybercrime cases. On April 13, 2016 the National
Assembly's
Standing Committee on Information Technology and Telecommunication approved
the Prevention of Electronic Crimes Bill (PECB).
1. Up to three years imprisonment, Rs1 million fine or both for unauthorised access to
critical infrastructure information system or data
2. The government may cooperate with any foreign government, foreign or international
agency, organisation or 24x7 network for investigation or proceedings relating to an
offence or for collecting evidence
3. The government may forward any information to any foreign government, 24x7
network, foreign or international agency or organisation any information obtained from
its own investigation if the disclosure assists their investigations
4. Up to seven years, Rs10 million fine or both for interference with critical
infrastructure information system or data with dishonest intention
6 | P a g e
5. Up to seven years, Rs10 million fine or both for glorification of an offence relating to
terrorism, any person convicted of a crime relating to terrorism or proscribed individuals
or groups. Glorification is explained as “depiction of any form of praise or celebration in a
desirable manner”
6. Up to six months imprisonment, Rs50 thousand or both for producing, making, generating,
adapting, exporting, supplying, offering to supply or importing a device for use in an offence
7. Up to three years imprisonment, Rs5 million fine or both for obtaining, selling, possessing,
transmitting or using another person’s identity information without authorisation
8. If your identity information is used without authorisation, you may apply to the
authorities to secure, destroy or prevent transmission of your information
Conclusion:
In its present form PECB will criminalise conduct that shouldn’t be criminalised, equip
investigation agencies and PTA with overbroad and unguided powers that will be susceptible
to abuse, and chill free speech without any corresponding augmentation of the right to privacy
or dignity.
Punishments for Cyber Crime
under Judicial Precedence
Under law there are defined punishment for the offence. Every respective offence has
its distinctive punishment which can be imprisonment or fine.
Data Damage:
Whoever with intent to illegal gain or cause harm to the public or any person, damages any
data, shall come under this section.
Punishment
3 years imprisonment
Maximum damages of 3 lac rupees
Electronic fraud:
People for illegal gain get in the way or use any data, electronic system or device or with
intent to deceive any person, which act or omissions is likely to cause damage or harm.
7 | P a g e
Punishment
7 years imprisonment
Maximum damages of 7 Lac
Electronic Forgery:
Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause
harm or to commit fraud by any input, alteration, or suppression of data, resulting in
unauthentic data that it be considered or acted upon for legal purposes as if it were authentic,
regardless of the fact that the data is directly readable and intelligible or not.
Punishment
7 years imprisonment
Maximum damages of 7 Lac
Malicious code:
Whoever wilfully writes, offers, makes available, distributes or transmits malicious code
through an electronic system or device, with intent to cause harm to any electronic system or
resulting in the theft or loss of data commits the offence of malicious code.
Punishment
5 years imprisonment
Maximum damages of 5 Lac
Cyber stalking:
Whoever with intent to harass any person uses computer, computer network, internet, or any
other similar means of communication to communicate obscene, vulgar, profane, lewd,
lascivious, or indecent language, picture or image? Make any suggestion or proposal of an
obscene nature. Threaten any illegal or immoral act, take or distribute pictures or photographs of
any person without his consent or knowledge commits the offence of cyber stalking.
Punishment
3 Years of imprisonment
Maximum damages of 3 Lac
Spamming:
Whoever transmits harmful, fraudulent, misleading, illegal or unsolicited electronic messages in
bulk to any person without the express permission of the recipient, involves in falsified online
8 | P a g e
user account registration or falsified domain name registration for commercial purpose commits
the offence of spamming.
Punishment:
6 month of imprisonment
Maximum damages of 50,000/Cyber Crime Bill 2007
Spoofing:
Whoever establishes a website, or sends an electronic message with a counterfeit source
intended to be believed by the recipient or visitor or its electronic system to be an authentic
source with intent to gain unauthorized access or obtain valuable information. Later, Information
can be used for any lawful purposes commits the offence of spoofing. Punishment:
3 Years of imprisonment
Maximum damages of 3 Lac
Cyber terrorism:
Any person, group or organization who, with terroristic intent utilizes, accesses or causes to be
accessed a computer or computer network or electronic system or device or by any available
means, knowingly engages in or attempts to engage in a terroristic act commits the offence of
cyber terrorism.
Punishment:
Whoever commits the offence of cyber terrorism and causes death of any person shall be
punished with death
Or imprisonment for life, and with fine
Otherwise he shall be punishable with imprisonment of ten years or with fine ten million
rupees
9 | P a g e

Contenu connexe

Tendances

Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistanFahad Abbasi
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Punjab protection of women act 2016.f
Punjab protection of women act 2016.fPunjab protection of women act 2016.f
Punjab protection of women act 2016.fArooj Ashiq
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human RightStresemann Stiftung
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
CYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANshabanakousershabana
 

Tendances (20)

Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Punjab protection of women act 2016.f
Punjab protection of women act 2016.fPunjab protection of women act 2016.f
Punjab protection of women act 2016.f
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cyber law
Cyber lawCyber law
Cyber law
 
Freedom of Expression is a Human Right
Freedom of Expression is a Human RightFreedom of Expression is a Human Right
Freedom of Expression is a Human Right
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
CYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTANCYBER CRIME AND CYBER LAW IN PAKISTAN
CYBER CRIME AND CYBER LAW IN PAKISTAN
 

Similaire à Cyber crime laws in Pakistan

Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaakashsaqi444
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - CybersecurityGautam GR
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Cyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxCyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxMohaiUDin
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Information technology act
Information technology actInformation technology act
Information technology actbahubali1611
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public29 1 24 cyber law Information for Public
29 1 24 cyber law Information for PublicPrashantKanade5
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Ashish Karan
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 

Similaire à Cyber crime laws in Pakistan (20)

CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Indian IT Act - Cybersecurity
Indian IT Act - CybersecurityIndian IT Act - Cybersecurity
Indian IT Act - Cybersecurity
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Cyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptxCyber Crimes In Pakistan.pptx
Cyber Crimes In Pakistan.pptx
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public29 1 24 cyber law Information for Public
29 1 24 cyber law Information for Public
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 

Plus de Ayesha Majid

Lessons from 2000s
Lessons from 2000sLessons from 2000s
Lessons from 2000sAyesha Majid
 
Sustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over RivalsSustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over RivalsAyesha Majid
 
Cpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistanCpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistanAyesha Majid
 
Infrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistanInfrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistanAyesha Majid
 
An overview of Mercantile Law in Pakistan
An overview of Mercantile Law in PakistanAn overview of Mercantile Law in Pakistan
An overview of Mercantile Law in PakistanAyesha Majid
 
Microfinance service in pakistan over the decade
Microfinance service in pakistan over the decadeMicrofinance service in pakistan over the decade
Microfinance service in pakistan over the decadeAyesha Majid
 
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy Ayesha Majid
 
Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy Ayesha Majid
 
Phillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain AnalysisPhillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain AnalysisAyesha Majid
 
Apple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply ChainApple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply ChainAyesha Majid
 
Pakistan's supply chain resileince
Pakistan's supply chain resileincePakistan's supply chain resileince
Pakistan's supply chain resileinceAyesha Majid
 
Blue Economy of Pakistan
Blue Economy of PakistanBlue Economy of Pakistan
Blue Economy of PakistanAyesha Majid
 
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...Ayesha Majid
 
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...Ayesha Majid
 
Romantic Comedy in Netflix
Romantic Comedy in NetflixRomantic Comedy in Netflix
Romantic Comedy in NetflixAyesha Majid
 
The British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of PakistanisThe British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of PakistanisAyesha Majid
 
Reko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and DifferencesReko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and DifferencesAyesha Majid
 
Liquidity Risk as under Basel III
Liquidity Risk as under Basel IIILiquidity Risk as under Basel III
Liquidity Risk as under Basel IIIAyesha Majid
 
An Overview of Corporate law in Pakistan
An Overview of Corporate law in PakistanAn Overview of Corporate law in Pakistan
An Overview of Corporate law in PakistanAyesha Majid
 

Plus de Ayesha Majid (20)

Lessons from 2000s
Lessons from 2000sLessons from 2000s
Lessons from 2000s
 
Sustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over RivalsSustaining Competitive Advantage over Rivals
Sustaining Competitive Advantage over Rivals
 
Cpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistanCpec will galvanize industrailization and employment in pakistan
Cpec will galvanize industrailization and employment in pakistan
 
Infrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistanInfrastructural issues being addressed in the energy sector of pakistan
Infrastructural issues being addressed in the energy sector of pakistan
 
An overview of Mercantile Law in Pakistan
An overview of Mercantile Law in PakistanAn overview of Mercantile Law in Pakistan
An overview of Mercantile Law in Pakistan
 
Microfinance service in pakistan over the decade
Microfinance service in pakistan over the decadeMicrofinance service in pakistan over the decade
Microfinance service in pakistan over the decade
 
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy Presentation: Philip Morris (Pakistan) Limited: Business Strategy
Presentation: Philip Morris (Pakistan) Limited: Business Strategy
 
Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy Philip Morris (Pakistan) Limited: Business Strategy
Philip Morris (Pakistan) Limited: Business Strategy
 
Phillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain AnalysisPhillip Morris Pakistan Supply Chain Analysis
Phillip Morris Pakistan Supply Chain Analysis
 
Apple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply ChainApple INC.: Managing a Global Supply Chain
Apple INC.: Managing a Global Supply Chain
 
Pakistan's supply chain resileince
Pakistan's supply chain resileincePakistan's supply chain resileince
Pakistan's supply chain resileince
 
Blue Economy of Pakistan
Blue Economy of PakistanBlue Economy of Pakistan
Blue Economy of Pakistan
 
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
Factors Affecting Consumer Purchase Intention When Buying Toyota Corolla in P...
 
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
Factors Affecting Consumer's Purchase Intention When Buying Toyota Corolla in...
 
Corn Sillage
Corn SillageCorn Sillage
Corn Sillage
 
Romantic Comedy in Netflix
Romantic Comedy in NetflixRomantic Comedy in Netflix
Romantic Comedy in Netflix
 
The British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of PakistanisThe British Rule's lasting sway on lives of Pakistanis
The British Rule's lasting sway on lives of Pakistanis
 
Reko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and DifferencesReko-Diq and Saindaq Reserves Similarities and Differences
Reko-Diq and Saindaq Reserves Similarities and Differences
 
Liquidity Risk as under Basel III
Liquidity Risk as under Basel IIILiquidity Risk as under Basel III
Liquidity Risk as under Basel III
 
An Overview of Corporate law in Pakistan
An Overview of Corporate law in PakistanAn Overview of Corporate law in Pakistan
An Overview of Corporate law in Pakistan
 

Dernier

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Dernier (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Cyber crime laws in Pakistan

  • 1. Lahore School of economics Cyber Crime Laws in Pakistan A Brief Overview Ayesha Majid Iza Haider Kinza Babr Mahnoor Saad 2-22-2018 0 | P a g e
  • 2. Contents Cyber Crime ................................................................................................................................... 2 Cyber Laws..................................................................................................................................... 2 Cyber Laws in the World ............................................................................................................ 2 Cyber Laws in Pakistan .................................................................................................................. 3 Electronic Transaction Ordinance (ETO) 2002.............................................................................. 3 Pre-ETO 2002 Scenario .............................................................................................................. 3 Post ETO 2002 ............................................................................................................................ 3 Sections of ETO 2002 ................................................................................................................. 4 Electronic/Cyber Crime Bill 2007.................................................................................................. 5 Prevention of Electronic Crimes Act (PECA) 2016....................................................................... 6 Punishments for Cyber Crime under Judicial Precedence.............................................................. 7 1 | P a g e
  • 3. Cyber Crime Cybercrime is an act in which computers or networks are a tool, a target, or a place of criminal activity. Cybercrime is also stated as any use of a computer as an instrument to further illegal ends, such as • Committing fraud • Stealing identities • Violating privacy It is also include traditional crimes in which computers or networks are used to enable the illicit activity. As the computer has become central to commerce, entertainment, and government. Cybercrime has grown in importance. • E-mail account of a Federal Minister is hacked. • Credit cards frauds reach to an alarming level. • Visiting CEOs of Multinational Companies gets threatening E-mails. • Financial institutions are the favourite targets of Cyber criminals, mostly effecting the technological progress in the area of e –Commerce. Cyber Crimes Reported in Pakistan A total of 57 cases have been registered under the ETO 2002 in the years 2005 & 2006. Cyber Laws The legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is an intersection of many legal fields, like: • Intellectual property • Privacy Cyber laws is an attempt to apply laws designed for the physical world to human activity on the Internet. Cyber Laws in the World • Electronic Commerce Act (Ireland) • Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore) 2 | P a g e
  • 4. • Electronic Transactions Ordinance (Hong Kong) • Information Technology Act (India) • Information Communication Technology Act Draft (Bangladesh) Cyber Laws in Pakistan There are different laws, promulgated in Pakistan. These laws not only deal with crime of Internet. These deal with all dimensions related to computer & networks. Three of them are most known. They are: • Electronic Transaction Ordinance (ETO) 2002 • Electronic / Cyber Crime Bill 2007 • Prevention of Electronic Crimes Act (PECA) 2016 Electronic Transaction Ordinance (ETO) 2002 The Electronic Transactions Ordinance (ETO), 2002, was the first IT-relevant legislation created by national lawmakers. A first step and a solid foundation for legal sanctity and protection for Pakistani e-Commerce locally and globally. The ordinance laid the foundation for comprehensive Legal Infrastructure. It is heavily taken from foreign law related to cybercrime. Pre-ETO 2002 Scenario • No recognition of electronic documentation • No recognition of electronic records • No recognition of evidential basis of documents/records • Failure to authenticate or identify digital or electronic signatures or forms of authentication • No online transaction could be legally binding • Electronic Data & Forensic Evidence not covered. No Rules Post ETO 2002 • Electronic Documentation & Records recognized • Electronic & Digital forms of authentication & identification given legal sanctity 3 | P a g e
  • 5. • Messages through email, fax, mobile phones, Plastic Cards, Online recognized. Sections of ETO 2002 There are 43 sections in this ordinance. It deals with following 8 main areas relating to e- Commerce. 1. Recognition of Electronic Documents 2. Electronic Communications 3. Digital Signature regime and its evidential consequences 4. Web Site & Digital Signatures Certification Providers 5. Stamp Duty 6. Attestation, notarization, certified copies 7. Jurisdiction 8. Offences Important Sections of the act are: Sec 36. Violation of privacy information • gains or attempts to gain access • to any information system with or without intent • to acquire the information • Gain Knowledge • Imprisonment 7 years • Fine Rs. 1 million • alter, modify, delete, remove, generate, transmit or store information • to impair the operation of, • or prevent or hinder access to, information • knowingly not authorized • Imprisonment 7 years • Fine Rs. 1 million Sec 38. Offences to be non-bail able, compoundable and cognizable 4 | P a g e
  • 6. • All offences under this Ordinance shall be non-bail able, compoundable and cognizable. Sec 39. Prosecution and trial of offences. • No Court inferior to the Court of Sessions shall try any offence under this Ordinance. Electronic/Cyber Crime Bill 2007 Prevention of Electronic Crimes Ordinance, 2007 was promulgated by the President of Pakistan on the 31st December 2007 and approved by federal cabinet on 17 January 2007. The Prevention of Electronic Crime Ordinance (PECO) 2007 was presented in the National Assembly under article 89(2) of the Constitution. The bill deals with the electronic crimes included: Cyber terrorism Data damage Electronic fraud Electronic forgery Unauthorized access to code Cyber stalking Cyber Spamming/spoofing It offers penalties ranging from six months imprisonment to capital punishment for 17 types of cybercrimes. It will apply to every person who commits an offence, irrespective of his nationality or citizenship. It gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes. The bill suggests maximum punishment of death or life imprisonment for those booked under cybercrimes or involved in sensitive electronic systems offences. The Minister for Information Technology Awais Ahmad Khan Leghari stated for the bill: “the e-crime law would require the internet companies maintain their traffic data for at least six months to enable the agencies to investigate cases involving data stored by them.” He said the law would enable the government to seek extradition of foreign nationals through Interpol for their involvement in criminal activities punishable under the law. 5 | P a g e
  • 7. Prevention of Electronic Crimes Act (PECA) 2016 National Assembly enacted the PECA to provide a comprehensive legal framework to define various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in relation to electronic crimes. Supports Cyber Crime Bill 2007. The legislation established new offences including illegal access of data (hacking) DOS and DDOS attacks electronic forgery and electronic fraud cyber terrorism The legislation provides new investigative powers which were unavailable before such as search and seizure of digital forensic evidence using technological means, production orders for electronic evidence, electronic evidence preservation order, partial disclosure of traffic data, and real time collection of data under certain circumstances and other enabling power which are necessary to effectively investigate cybercrime cases. On April 13, 2016 the National Assembly's Standing Committee on Information Technology and Telecommunication approved the Prevention of Electronic Crimes Bill (PECB). 1. Up to three years imprisonment, Rs1 million fine or both for unauthorised access to critical infrastructure information system or data 2. The government may cooperate with any foreign government, foreign or international agency, organisation or 24x7 network for investigation or proceedings relating to an offence or for collecting evidence 3. The government may forward any information to any foreign government, 24x7 network, foreign or international agency or organisation any information obtained from its own investigation if the disclosure assists their investigations 4. Up to seven years, Rs10 million fine or both for interference with critical infrastructure information system or data with dishonest intention 6 | P a g e
  • 8. 5. Up to seven years, Rs10 million fine or both for glorification of an offence relating to terrorism, any person convicted of a crime relating to terrorism or proscribed individuals or groups. Glorification is explained as “depiction of any form of praise or celebration in a desirable manner” 6. Up to six months imprisonment, Rs50 thousand or both for producing, making, generating, adapting, exporting, supplying, offering to supply or importing a device for use in an offence 7. Up to three years imprisonment, Rs5 million fine or both for obtaining, selling, possessing, transmitting or using another person’s identity information without authorisation 8. If your identity information is used without authorisation, you may apply to the authorities to secure, destroy or prevent transmission of your information Conclusion: In its present form PECB will criminalise conduct that shouldn’t be criminalised, equip investigation agencies and PTA with overbroad and unguided powers that will be susceptible to abuse, and chill free speech without any corresponding augmentation of the right to privacy or dignity. Punishments for Cyber Crime under Judicial Precedence Under law there are defined punishment for the offence. Every respective offence has its distinctive punishment which can be imprisonment or fine. Data Damage: Whoever with intent to illegal gain or cause harm to the public or any person, damages any data, shall come under this section. Punishment 3 years imprisonment Maximum damages of 3 lac rupees Electronic fraud: People for illegal gain get in the way or use any data, electronic system or device or with intent to deceive any person, which act or omissions is likely to cause damage or harm. 7 | P a g e
  • 9. Punishment 7 years imprisonment Maximum damages of 7 Lac Electronic Forgery: Whoever for unlawful gain interferes with data, electronic system or device, with intent to cause harm or to commit fraud by any input, alteration, or suppression of data, resulting in unauthentic data that it be considered or acted upon for legal purposes as if it were authentic, regardless of the fact that the data is directly readable and intelligible or not. Punishment 7 years imprisonment Maximum damages of 7 Lac Malicious code: Whoever wilfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or device, with intent to cause harm to any electronic system or resulting in the theft or loss of data commits the offence of malicious code. Punishment 5 years imprisonment Maximum damages of 5 Lac Cyber stalking: Whoever with intent to harass any person uses computer, computer network, internet, or any other similar means of communication to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, picture or image? Make any suggestion or proposal of an obscene nature. Threaten any illegal or immoral act, take or distribute pictures or photographs of any person without his consent or knowledge commits the offence of cyber stalking. Punishment 3 Years of imprisonment Maximum damages of 3 Lac Spamming: Whoever transmits harmful, fraudulent, misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient, involves in falsified online 8 | P a g e
  • 10. user account registration or falsified domain name registration for commercial purpose commits the offence of spamming. Punishment: 6 month of imprisonment Maximum damages of 50,000/Cyber Crime Bill 2007 Spoofing: Whoever establishes a website, or sends an electronic message with a counterfeit source intended to be believed by the recipient or visitor or its electronic system to be an authentic source with intent to gain unauthorized access or obtain valuable information. Later, Information can be used for any lawful purposes commits the offence of spoofing. Punishment: 3 Years of imprisonment Maximum damages of 3 Lac Cyber terrorism: Any person, group or organization who, with terroristic intent utilizes, accesses or causes to be accessed a computer or computer network or electronic system or device or by any available means, knowingly engages in or attempts to engage in a terroristic act commits the offence of cyber terrorism. Punishment: Whoever commits the offence of cyber terrorism and causes death of any person shall be punished with death Or imprisonment for life, and with fine Otherwise he shall be punishable with imprisonment of ten years or with fine ten million rupees 9 | P a g e