5. Go to the Internet for information,
entertainment, relationships and support. .
Heavy users are at risk when they are plugged
for More Than 18 Hours A Week. There is no
official diagnosis for an addiction to the
Internet. The proposed disorder is called
Internet Addiction Disorder (IAD).
USING THE NET IS NOT A PROBLEM FOR INTERNET
USERS WHO ARE ON-LINE LESS THAN TWO HOURS
A WEEK.
6. The people going on-line excessively will
encounter one or more of the following
problems.
Personal neglect
Compulsive checking and "clicking"
Isolation and avoidance from people
Lost productivity
Depression
Marital problems
Internet abuse in the workplace
Academic failure.
7. when people mistreat or misuse other
people, showing no concern for their
integrity or innate worth as individuals, and
in a manner that degrades their well being
8. Am I Being Abused?
Domestic Violence
Stalking
Sexual Harassment
Financial Abuse Credit
card or debt, identity theft
and other money matters.
9. BETTER
FOCUS
CONCERTATION
MEMORY FLEXIBILITY
IMPROVE INTELLIGENCE SOLVE THINK OUTSIDE THE
& I.Q PROBLEM BOX
SPEED ATTENEION
THINK FASTER AND BE A SHARPER AND
IMPROVE REACTION TIME BETTER DRIVER
10. Internet Security
Safety with an Abuser think of ways to try to stay safe if
you are currently living with someone who is violent.
Getting Ready to Leave
Ending the Abusive RelationshipIf you have left an
abusive relationship, or you are trying to keep the
abuser away,
Safety in Rural AreasIf you live in a rural area or a small
town, there are some extra things to keep in mind when
you're making a safety plan.
Safety Tips for Stalking Victims how to stay safe if you
are a victim of stalking
Safety with Social Media How to stay safe on Face book,
MySpace, Twitter and Blog
Where to Find Help Additional resources + create a
safety plan that is right for you.
11. STRONG PASSWORD
BEING CAREFUL –FILE OR DOC SHARING
EXTRA CONCERNED WITH UR ONLINE BILL
PAYMENT
DISCLOSING INFORMATIONS
MISUSE OF PHOTOGRAPH
CHILD CODE
LATEST ANTI-VIRUS UPDATE
AWARENESS
BACK VOLUME-AVOID DATA LOSS
14. • to two years
. Criminal
• three hundred
access. thousand rupees
Criminal • to three years
data • with fine
access • with both.
15. • three years,
Data
• with fine
damage • or with both
• three years,
System
• with fine
damage • or with both
16. Whoever for wrongful
gain interferes with or
uses any data, electronic
system or device or
induces any person to
enter into a relationship • seven years,
or with intent to deceive , Electronic
which act or omission is • with fine,
likely to cause damage or fraud • with Both
harm to that person
wrongful gain interferes
with data, electronic
• seven years,
system or device, with
intent to cause damage
Electronic
• with fine
or injury to the public or
to any person, make
forgery • with both
illegal claim or title or to
cause any person to part
with property or to enter
into any express or
implied contract, or with
intent to commit fraud
by any input
17. Misuse of •three year
electronic system • with fine,
or electronic device
•three year
. Unauthorized
• with fine,
access to code
•five years,
encrypts any Misuse of
• with fine,
communication or data encryption • with both.
contained in electronic
system relating to that
crime or incriminating
evidence, commits the
offence of misuse of
encryption
18. • ten years
• with fine not less than one hundred
. Cyber stalking thousand rupees,
• with both
with intent to coerce , intimidate, or harass any person uses
computer, computer network, internet, network site ,electronic mail or any
other similar means of communication
(a) communicate obscene, vulgar, profane, lewd, lascivious , or indecent
language, picture or image;
(b) make any suggestion or proposal of an obscene nature
(c) threaten any illegal or immoral act;
(d) take or distribute pictures or photographs of any person without his consent
or knowledge;
(e) display or distribute information in a manner that substantially increases the
risk of harm
or violence to any other person, commits the offence of cyber stalking.
19. •fine not exceeding fifty
. thousand rupees for the first
time
Spamming •imprisonment of three months
• with both.
transmits harmful, fraudulent , misleading, illegal or
unsolicited
electronic messages in bulk to any person without the
express permission of the recipient,
• causes any electronic system to show any such
message or involves in falsified online user account
registration
falsified domain name registration for commercial
purpose commits the offence of
20. •ten years
Cyber •with fine not less than ten million
rupees,
terrorism • with both.
a website, or sends an •to three years
electronic message with a • with fine,
counterfeit
Spoofing •both.
source
•to five years
Malicious • with fine
code • with both
•to five years,
Unauthorized •five hundred thousand rupees,
interception • with both.
21. Enhanced punishment for •ten years,
offences involving
•with fine not exceeding one
sensitive electronic
systems million rupees, or with both.
. Of abets, aids or •oneha1f of the longest term of
attempts to commits imprisonment
offence
22. sections 193 and 228 of the Pakistan Penal
Code 1860 (XLV of 1860 )
sections 480 and 482 of the Code
ESTABLISHMENT OF INVESTIGATION AND PROSECUTION
AGENCIES –
Federal Investigation Agency to
investigate and prosecute the offences under this Act-
retain its traffic data minimum for a period of ninety days –
in writing to the Ministry of Foreign
Affairs of Government of Pakistan I other relevant agencies as
the case may be .
the Information and Communication Technologies Tribunal
whose principal seat shall be at Islamabad
23. Overview Most of the laws related to domestic
violence and sexual assault are state laws.
Restraining Orders A restraining order is a legal
order requiring one person to stop harming
another.
Custody General information about custody and
visitation laws.
Parental Kidnapping the laws of taking your child
away from another parent without that parent's
consent.
Divorce General information about the basic steps
to get a divorce.
Crimes General information about crimes the
abuser may have committed.
Suing Your Abuser You may have a right to sue
your abuser for medical costs, destroyed property,
or other damages.
24. An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the
EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011).
‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the
EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010).
‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and
Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal
Justice, Salvador, Brazil, (April 12-19, 2010).
‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth
common space after land, sea, air and outer space neeed international law as a framework. -
EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to
Cybersecurity» - Brussels (February 17, 2010).
‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts,
Denver, USA, (September 2009) (pdf)
‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries (pdf)
prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May
2009)
‣The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva (pdf)
Stein Schjolberg (December 2008)
25. SMALL AND MICRO ENTERPRISES FOR
DEVELOPMENT
NEW TRENDS IN GOOD GOVERNANCE
CONFLICT RESOLUTION
SUSTAINABILITY ISSUES IN POVERTY
REDUCTION
SOCIAL MOBILIZATION IN
DEVELOPMENT
PLANNING TOOLS