SlideShare une entreprise Scribd logo
1  sur  25
NUDRAT MUFTI (LEGAL & DEVELOPMENT
CONSULTANT)
FREEDOM



 KNOWLEDGE



  EDUCATION
GLAMOUR



                                             UTUBE
FRIENDSHIP

                         MODERN
                         TRENDS
    EMAIL
                           POLLUTING   APPRECIATION
                             YOUTH
    LOTTERY
                                          RELATIONSHIP
             FINAICIAL
              CRIMES
PERSON

ORGANIZATION

  PROPERTY

  SOCIETY
Go to the Internet for information,
    entertainment, relationships and support. .
   Heavy users are at risk when they are plugged
    for More Than 18 Hours A Week. There is no
    official diagnosis for an addiction to the
    Internet. The proposed disorder is called
    Internet Addiction Disorder (IAD).
USING THE NET IS NOT A PROBLEM FOR INTERNET
USERS WHO ARE ON-LINE LESS THAN TWO HOURS
                       A WEEK.
The people going on-line excessively will
 encounter one or more of the following
 problems.
   Personal neglect
   Compulsive checking and "clicking"
   Isolation and avoidance from people
   Lost productivity
   Depression
   Marital problems
   Internet abuse in the workplace
   Academic failure.
  when people mistreat or misuse other
    people, showing no concern for their
integrity or innate worth as individuals, and
 in a manner that degrades their well being
 Am  I Being Abused?
 Domestic Violence
 Stalking
 Sexual Harassment
 Financial Abuse Credit
  card or debt, identity theft
  and other money matters.
BETTER
                                   FOCUS
                                             CONCERTATION




                 MEMORY                           FLEXIBILITY


IMPROVE INTELLIGENCE               SOLVE                THINK OUTSIDE THE
        & I.Q                     PROBLEM                      BOX




                          SPEED             ATTENEION

   THINK FASTER AND                                 BE A SHARPER AND
 IMPROVE REACTION TIME                                BETTER DRIVER
   Internet Security
   Safety with an Abuser think of ways to try to stay safe if
    you are currently living with someone who is violent.
   Getting Ready to Leave
   Ending the Abusive RelationshipIf you have left an
    abusive relationship, or you are trying to keep the
    abuser away,
   Safety in Rural AreasIf you live in a rural area or a small
    town, there are some extra things to keep in mind when
    you're making a safety plan.
   Safety Tips for Stalking Victims how to stay safe if you
    are a victim of stalking
   Safety with Social Media How to stay safe on Face book,
    MySpace, Twitter and Blog
   Where to Find Help Additional resources + create a
    safety plan that is right for you.
   STRONG PASSWORD
   BEING CAREFUL –FILE OR DOC SHARING
   EXTRA CONCERNED WITH UR ONLINE BILL
    PAYMENT
   DISCLOSING INFORMATIONS
   MISUSE OF PHOTOGRAPH
   CHILD CODE
   LATEST ANTI-VIRUS UPDATE
   AWARENESS
   BACK VOLUME-AVOID DATA LOSS
ILLEGAL ACCESS

ILLEGAL INTERCEPTION

DATA INTERFERENCE

SYSTEM INTERFERENCE

 MISUSE OF DEVICES

      FORGERY

       FRAUD

CHILD PORNOGRAPHY
• to two years
. Criminal
           • three hundred
  access.    thousand rupees


Criminal    • to three years
  data      • with fine
 access     • with both.
• three years,
  Data
          • with fine
damage    • or with both


          • three years,
 System
          • with fine
damage    • or with both
Whoever for wrongful
gain interferes with or
uses any data, electronic
system or device or
induces any person to
enter into a relationship                   • seven years,
or with intent to deceive ,    Electronic
which act or omission is                    • with fine,
likely to cause damage or        fraud      • with Both
harm to that person

wrongful gain interferes
with data, electronic
                                            • seven years,
system or device, with
intent to cause damage
                               Electronic
                                            • with fine
or injury to the public or
to any person, make
                                forgery     • with both
illegal claim or title or to
cause any person to part
with property or to enter
into any express or
implied contract, or with
intent to commit fraud
by any input
Misuse of       •three year
                           electronic system • with fine,
                          or electronic device


                                               •three year
                            . Unauthorized
                                               • with fine,
                            access to code


                                               •five years,
encrypts any                  Misuse of
                                               • with fine,
communication or data         encryption       • with both.
contained in electronic
system relating to that
crime or incriminating
evidence, commits the
offence of misuse of
encryption
• ten years
                              • with fine not less than one hundred
 . Cyber stalking              thousand rupees,
                              • with both




with intent to coerce , intimidate, or harass any person uses
computer, computer network, internet, network site ,electronic mail or any
other similar means of communication
 (a) communicate obscene, vulgar, profane, lewd, lascivious , or indecent
language, picture or image;
 (b) make any suggestion or proposal of an obscene nature
 (c) threaten any illegal or immoral act;
(d) take or distribute pictures or photographs of any person without his consent
or knowledge;
(e) display or distribute information in a manner that substantially increases the
risk of harm
or violence to any other person, commits the offence of cyber stalking.
•fine not exceeding fifty

                .           thousand rupees for the first
                            time

            Spamming       •imprisonment of three months
                           • with both.




transmits harmful, fraudulent , misleading, illegal or
unsolicited
electronic messages in bulk to any person without the
express permission of the recipient,

• causes any electronic system to show any such
message or involves in falsified online user account
registration

 falsified domain name registration for commercial
purpose commits the offence of
•ten years
                                Cyber       •with fine not less than ten million
                                             rupees,
                              terrorism     • with both.




a website, or sends an                      •to three years
electronic message with a                   • with fine,
counterfeit
                              Spoofing      •both.
source


                                            •to five years
                              Malicious      • with fine

                               code          • with both




                                            •to five years,
                            Unauthorized    •five hundred thousand rupees,

                             interception   • with both.
Enhanced punishment for •ten years,
   offences involving
                        •with fine not exceeding one
   sensitive electronic
         systems         million rupees, or with both.


   . Of abets, aids or   •oneha1f of the longest term of
  attempts to commits     imprisonment
         offence
   sections 193 and 228 of the Pakistan Penal
    Code 1860 (XLV of 1860 )
   sections 480 and 482 of the Code
       ESTABLISHMENT OF INVESTIGATION AND PROSECUTION
       AGENCIES –
        Federal Investigation Agency to
       investigate and prosecute the offences under this Act-
        retain its traffic data minimum for a period of ninety days –
       in writing to the Ministry of Foreign
       Affairs of Government of Pakistan I other relevant agencies as
       the case may be .
        the Information and Communication Technologies Tribunal
       whose principal seat shall be at Islamabad
Overview Most of the laws related to domestic
  violence and sexual assault are state laws.
 Restraining Orders A restraining order is a legal
  order requiring one person to stop harming
  another.
 Custody General information about custody and
  visitation laws.
 Parental Kidnapping the laws of taking your child
  away from another parent without that parent's
  consent.
 Divorce General information about the basic steps
  to get a divorce.
 Crimes General information about crimes the
  abuser may have committed.
 Suing Your Abuser You may have a right to sue
  your abuser for medical costs, destroyed property,
  or other damages.
   An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the
    EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011).

   ‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the
    EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010).

   ‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and
    Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal
    Justice, Salvador, Brazil, (April 12-19, 2010).

   ‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth
    common space after land, sea, air and outer space neeed international law as a framework. -
    EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to
    Cybersecurity» - Brussels (February 17, 2010).

   ‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts,
    Denver, USA, (September 2009) (pdf)

   ‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries (pdf)
    prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May
    2009)

   ‣The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva (pdf)
    Stein Schjolberg (December 2008)
 SMALL AND MICRO ENTERPRISES FOR
  DEVELOPMENT
 NEW TRENDS IN GOOD GOVERNANCE
 CONFLICT RESOLUTION
 SUSTAINABILITY ISSUES IN POVERTY
  REDUCTION
 SOCIAL MOBILIZATION IN
  DEVELOPMENT
 PLANNING TOOLS

Contenu connexe

Tendances

Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 

Tendances (20)

Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
File000165
File000165File000165
File000165
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Computer crime
 Computer crime Computer crime
Computer crime
 

Similaire à Cyber Laws -Nudrat Mufti

cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationgmtango
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptxmhavzgreda1
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Cyber ethics pp power point presentation
Cyber ethics pp power point presentationCyber ethics pp power point presentation
Cyber ethics pp power point presentationssuserd2cbf7
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 

Similaire à Cyber Laws -Nudrat Mufti (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Kinds of Cyber Crimes
Kinds of Cyber CrimesKinds of Cyber Crimes
Kinds of Cyber Crimes
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Online Safety and Security.pptx
Online Safety and Security.pptxOnline Safety and Security.pptx
Online Safety and Security.pptx
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Cyber ethics pp power point presentation
Cyber ethics pp power point presentationCyber ethics pp power point presentation
Cyber ethics pp power point presentation
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 

Plus de NUDRAT MUFTI

Incoterms and CISG NUDRAT MUFTI
Incoterms and CISG  NUDRAT MUFTIIncoterms and CISG  NUDRAT MUFTI
Incoterms and CISG NUDRAT MUFTINUDRAT MUFTI
 
International business law -nudrat mufti
International business law -nudrat muftiInternational business law -nudrat mufti
International business law -nudrat muftiNUDRAT MUFTI
 
Example-INCOTERMS -NUDRAT MUFTI
Example-INCOTERMS -NUDRAT MUFTIExample-INCOTERMS -NUDRAT MUFTI
Example-INCOTERMS -NUDRAT MUFTINUDRAT MUFTI
 
Registration laws,Pakistan,Nudrat Mufti
 Registration laws,Pakistan,Nudrat Mufti Registration laws,Pakistan,Nudrat Mufti
Registration laws,Pakistan,Nudrat MuftiNUDRAT MUFTI
 
India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...
India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...
India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...NUDRAT MUFTI
 
PLANNED VACATIONS
PLANNED VACATIONS PLANNED VACATIONS
PLANNED VACATIONS NUDRAT MUFTI
 
PROGRAM DEVELOPMENT- nudrat mufti
PROGRAM DEVELOPMENT- nudrat muftiPROGRAM DEVELOPMENT- nudrat mufti
PROGRAM DEVELOPMENT- nudrat muftiNUDRAT MUFTI
 
NGO Registration Laws -Nudrat Mufti
NGO Registration Laws -Nudrat MuftiNGO Registration Laws -Nudrat Mufti
NGO Registration Laws -Nudrat MuftiNUDRAT MUFTI
 
Registration frame work for npo(not for profit) nudrat mufti
Registration frame work for npo(not for profit) nudrat muftiRegistration frame work for npo(not for profit) nudrat mufti
Registration frame work for npo(not for profit) nudrat muftiNUDRAT MUFTI
 
GENDER &POLICIES - Nudrat Mufti
GENDER &POLICIES  - Nudrat MuftiGENDER &POLICIES  - Nudrat Mufti
GENDER &POLICIES - Nudrat MuftiNUDRAT MUFTI
 
USAID Grants-ADS Chapter 205 - Nudrat Mufti
USAID Grants-ADS Chapter 205 - Nudrat MuftiUSAID Grants-ADS Chapter 205 - Nudrat Mufti
USAID Grants-ADS Chapter 205 - Nudrat MuftiNUDRAT MUFTI
 
Ombudsman/Ombudsperson/public advocate In Pakistan
Ombudsman/Ombudsperson/public advocate In PakistanOmbudsman/Ombudsperson/public advocate In Pakistan
Ombudsman/Ombudsperson/public advocate In PakistanNUDRAT MUFTI
 
CIRDAP RURAL STARTUP STUDIO
CIRDAP RURAL STARTUP STUDIOCIRDAP RURAL STARTUP STUDIO
CIRDAP RURAL STARTUP STUDIONUDRAT MUFTI
 
FATA NGOs REGISTRATION LAWS
FATA NGOs  REGISTRATION LAWSFATA NGOs  REGISTRATION LAWS
FATA NGOs REGISTRATION LAWSNUDRAT MUFTI
 
Social Mobilization and Rural Development” -NUDRT MUFTI
Social Mobilization and Rural Development” -NUDRT MUFTISocial Mobilization and Rural Development” -NUDRT MUFTI
Social Mobilization and Rural Development” -NUDRT MUFTINUDRAT MUFTI
 
PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti
 PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti
PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat muftiNUDRAT MUFTI
 
Breastfeeding Laws-Infant and Young Child Feeding- Nudrat Mufti
Breastfeeding Laws-Infant and Young Child Feeding- Nudrat MuftiBreastfeeding Laws-Infant and Young Child Feeding- Nudrat Mufti
Breastfeeding Laws-Infant and Young Child Feeding- Nudrat MuftiNUDRAT MUFTI
 

Plus de NUDRAT MUFTI (20)

NUDRAT MUFTI
NUDRAT MUFTINUDRAT MUFTI
NUDRAT MUFTI
 
Incoterms and CISG NUDRAT MUFTI
Incoterms and CISG  NUDRAT MUFTIIncoterms and CISG  NUDRAT MUFTI
Incoterms and CISG NUDRAT MUFTI
 
International business law -nudrat mufti
International business law -nudrat muftiInternational business law -nudrat mufti
International business law -nudrat mufti
 
Example-INCOTERMS -NUDRAT MUFTI
Example-INCOTERMS -NUDRAT MUFTIExample-INCOTERMS -NUDRAT MUFTI
Example-INCOTERMS -NUDRAT MUFTI
 
Registration laws,Pakistan,Nudrat Mufti
 Registration laws,Pakistan,Nudrat Mufti Registration laws,Pakistan,Nudrat Mufti
Registration laws,Pakistan,Nudrat Mufti
 
Women empowerment
Women empowermentWomen empowerment
Women empowerment
 
India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...
India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...
India, Indonesia, Malaysia, Pakistan, Thailand, Bangladesh and Nepal,nudrat m...
 
PLANNED VACATIONS
PLANNED VACATIONS PLANNED VACATIONS
PLANNED VACATIONS
 
PROGRAM DEVELOPMENT- nudrat mufti
PROGRAM DEVELOPMENT- nudrat muftiPROGRAM DEVELOPMENT- nudrat mufti
PROGRAM DEVELOPMENT- nudrat mufti
 
NGO Registration Laws -Nudrat Mufti
NGO Registration Laws -Nudrat MuftiNGO Registration Laws -Nudrat Mufti
NGO Registration Laws -Nudrat Mufti
 
Registration frame work for npo(not for profit) nudrat mufti
Registration frame work for npo(not for profit) nudrat muftiRegistration frame work for npo(not for profit) nudrat mufti
Registration frame work for npo(not for profit) nudrat mufti
 
GENDER &POLICIES - Nudrat Mufti
GENDER &POLICIES  - Nudrat MuftiGENDER &POLICIES  - Nudrat Mufti
GENDER &POLICIES - Nudrat Mufti
 
USAID Grants-ADS Chapter 205 - Nudrat Mufti
USAID Grants-ADS Chapter 205 - Nudrat MuftiUSAID Grants-ADS Chapter 205 - Nudrat Mufti
USAID Grants-ADS Chapter 205 - Nudrat Mufti
 
Ombudsman/Ombudsperson/public advocate In Pakistan
Ombudsman/Ombudsperson/public advocate In PakistanOmbudsman/Ombudsperson/public advocate In Pakistan
Ombudsman/Ombudsperson/public advocate In Pakistan
 
CIRDAP RURAL STARTUP STUDIO
CIRDAP RURAL STARTUP STUDIOCIRDAP RURAL STARTUP STUDIO
CIRDAP RURAL STARTUP STUDIO
 
FATA NGOs REGISTRATION LAWS
FATA NGOs  REGISTRATION LAWSFATA NGOs  REGISTRATION LAWS
FATA NGOs REGISTRATION LAWS
 
Social Mobilization and Rural Development” -NUDRT MUFTI
Social Mobilization and Rural Development” -NUDRT MUFTISocial Mobilization and Rural Development” -NUDRT MUFTI
Social Mobilization and Rural Development” -NUDRT MUFTI
 
Project planning
Project planning Project planning
Project planning
 
PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti
 PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti
PUBLIC SECTOR &SOCIAL MOBLIZATION- nudrat mufti
 
Breastfeeding Laws-Infant and Young Child Feeding- Nudrat Mufti
Breastfeeding Laws-Infant and Young Child Feeding- Nudrat MuftiBreastfeeding Laws-Infant and Young Child Feeding- Nudrat Mufti
Breastfeeding Laws-Infant and Young Child Feeding- Nudrat Mufti
 

Dernier

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Dernier (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Cyber Laws -Nudrat Mufti

  • 1. NUDRAT MUFTI (LEGAL & DEVELOPMENT CONSULTANT)
  • 2. FREEDOM KNOWLEDGE EDUCATION
  • 3. GLAMOUR UTUBE FRIENDSHIP MODERN TRENDS EMAIL POLLUTING APPRECIATION YOUTH LOTTERY RELATIONSHIP FINAICIAL CRIMES
  • 5. Go to the Internet for information, entertainment, relationships and support. .  Heavy users are at risk when they are plugged for More Than 18 Hours A Week. There is no official diagnosis for an addiction to the Internet. The proposed disorder is called Internet Addiction Disorder (IAD). USING THE NET IS NOT A PROBLEM FOR INTERNET USERS WHO ARE ON-LINE LESS THAN TWO HOURS A WEEK.
  • 6. The people going on-line excessively will encounter one or more of the following problems.  Personal neglect  Compulsive checking and "clicking"  Isolation and avoidance from people  Lost productivity  Depression  Marital problems  Internet abuse in the workplace  Academic failure.
  • 7.  when people mistreat or misuse other people, showing no concern for their integrity or innate worth as individuals, and in a manner that degrades their well being
  • 8.  Am I Being Abused?  Domestic Violence  Stalking  Sexual Harassment  Financial Abuse Credit card or debt, identity theft and other money matters.
  • 9. BETTER FOCUS CONCERTATION MEMORY FLEXIBILITY IMPROVE INTELLIGENCE SOLVE THINK OUTSIDE THE & I.Q PROBLEM BOX SPEED ATTENEION THINK FASTER AND BE A SHARPER AND IMPROVE REACTION TIME BETTER DRIVER
  • 10. Internet Security  Safety with an Abuser think of ways to try to stay safe if you are currently living with someone who is violent.  Getting Ready to Leave  Ending the Abusive RelationshipIf you have left an abusive relationship, or you are trying to keep the abuser away,  Safety in Rural AreasIf you live in a rural area or a small town, there are some extra things to keep in mind when you're making a safety plan.  Safety Tips for Stalking Victims how to stay safe if you are a victim of stalking  Safety with Social Media How to stay safe on Face book, MySpace, Twitter and Blog  Where to Find Help Additional resources + create a safety plan that is right for you.
  • 11. STRONG PASSWORD  BEING CAREFUL –FILE OR DOC SHARING  EXTRA CONCERNED WITH UR ONLINE BILL PAYMENT  DISCLOSING INFORMATIONS  MISUSE OF PHOTOGRAPH  CHILD CODE  LATEST ANTI-VIRUS UPDATE  AWARENESS  BACK VOLUME-AVOID DATA LOSS
  • 12.
  • 13. ILLEGAL ACCESS ILLEGAL INTERCEPTION DATA INTERFERENCE SYSTEM INTERFERENCE MISUSE OF DEVICES FORGERY FRAUD CHILD PORNOGRAPHY
  • 14. • to two years . Criminal • three hundred access. thousand rupees Criminal • to three years data • with fine access • with both.
  • 15. • three years, Data • with fine damage • or with both • three years, System • with fine damage • or with both
  • 16. Whoever for wrongful gain interferes with or uses any data, electronic system or device or induces any person to enter into a relationship • seven years, or with intent to deceive , Electronic which act or omission is • with fine, likely to cause damage or fraud • with Both harm to that person wrongful gain interferes with data, electronic • seven years, system or device, with intent to cause damage Electronic • with fine or injury to the public or to any person, make forgery • with both illegal claim or title or to cause any person to part with property or to enter into any express or implied contract, or with intent to commit fraud by any input
  • 17. Misuse of •three year electronic system • with fine, or electronic device •three year . Unauthorized • with fine, access to code •five years, encrypts any Misuse of • with fine, communication or data encryption • with both. contained in electronic system relating to that crime or incriminating evidence, commits the offence of misuse of encryption
  • 18. • ten years • with fine not less than one hundred . Cyber stalking thousand rupees, • with both with intent to coerce , intimidate, or harass any person uses computer, computer network, internet, network site ,electronic mail or any other similar means of communication (a) communicate obscene, vulgar, profane, lewd, lascivious , or indecent language, picture or image; (b) make any suggestion or proposal of an obscene nature (c) threaten any illegal or immoral act; (d) take or distribute pictures or photographs of any person without his consent or knowledge; (e) display or distribute information in a manner that substantially increases the risk of harm or violence to any other person, commits the offence of cyber stalking.
  • 19. •fine not exceeding fifty . thousand rupees for the first time Spamming •imprisonment of three months • with both. transmits harmful, fraudulent , misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient, • causes any electronic system to show any such message or involves in falsified online user account registration falsified domain name registration for commercial purpose commits the offence of
  • 20. •ten years Cyber •with fine not less than ten million rupees, terrorism • with both. a website, or sends an •to three years electronic message with a • with fine, counterfeit Spoofing •both. source •to five years Malicious • with fine code • with both •to five years, Unauthorized •five hundred thousand rupees, interception • with both.
  • 21. Enhanced punishment for •ten years, offences involving •with fine not exceeding one sensitive electronic systems million rupees, or with both. . Of abets, aids or •oneha1f of the longest term of attempts to commits imprisonment offence
  • 22. sections 193 and 228 of the Pakistan Penal Code 1860 (XLV of 1860 )  sections 480 and 482 of the Code ESTABLISHMENT OF INVESTIGATION AND PROSECUTION AGENCIES – Federal Investigation Agency to investigate and prosecute the offences under this Act- retain its traffic data minimum for a period of ninety days – in writing to the Ministry of Foreign Affairs of Government of Pakistan I other relevant agencies as the case may be . the Information and Communication Technologies Tribunal whose principal seat shall be at Islamabad
  • 23. Overview Most of the laws related to domestic violence and sexual assault are state laws.  Restraining Orders A restraining order is a legal order requiring one person to stop harming another.  Custody General information about custody and visitation laws.  Parental Kidnapping the laws of taking your child away from another parent without that parent's consent.  Divorce General information about the basic steps to get a divorce.  Crimes General information about crimes the abuser may have committed.  Suing Your Abuser You may have a right to sue your abuser for medical costs, destroyed property, or other damages.
  • 24. An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011).  ‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010).  ‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, (April 12-19, 2010).  ‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth common space after land, sea, air and outer space neeed international law as a framework. - EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to Cybersecurity» - Brussels (February 17, 2010).  ‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts, Denver, USA, (September 2009) (pdf)  ‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries (pdf) prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May 2009)  ‣The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva (pdf) Stein Schjolberg (December 2008)
  • 25.  SMALL AND MICRO ENTERPRISES FOR DEVELOPMENT  NEW TRENDS IN GOOD GOVERNANCE  CONFLICT RESOLUTION  SUSTAINABILITY ISSUES IN POVERTY REDUCTION  SOCIAL MOBILIZATION IN DEVELOPMENT  PLANNING TOOLS