Presentation On Cyber Laws in Pakistan Niaz SB
Presentation On Cyber Laws in Pakistan Niaz SB
Presentation On Cyber Laws in Pakistan Niaz SB
Crimes in Pakistan
( Conventional)
Telegraph Act, 1885
2015
Conflict of laws
Cyber Crime
Activity in which computers or
networks are a tool, a target, or a
place of criminal activity.
Cyber crime also stated as any use of
a computer as an instrument to
further illegal ends, such as
• Committing fraud
• Stealing identities
• Violating privacy (Cont)
Cont
It also includes traditional crimes in
which computers or networks are
used to enable the illicit activity.
As the computer has become central
to commerce, entertainment, and
government.
Cyber crime has grown in
importance.
(Cont)
Cont
Examples:
• E-mail account of a Federal Minister is
hacked.
• Credit cards frauds reach to an alarming
level.
• Visiting CEOs of Multinational Companies
gets threatening E-mails.
• Financial institutions are the favourite
targets of Cyber criminals --- worstly
effecting the technological progress in the
area of e –Commerce.
Cyber Laws
The legal issues related to use of
communications technology, particularly
"cyberspace", i.e. the Internet.
It is an intersection of many legal fields, like:
• Intellectual property,
• Privacy
Cyber laws is an attempt to apply laws
designed for the physical world to human
activity on the Internet
Cyber Laws in Pakistan
(Conventional)
Payment systems
Payment Instruments
Electronic Fund Transfer
Liability of Consumer and financial
institution
Secrecy (Cont)
Cont
Section 56. Criminal Liability.- Whoever
knowingly and willfully gives false
information or inaccurate information or
fails to provide information which he is
required to disclose by this Act or any
instruction issued thereunder, or otherwise
fails to comply with any provision of this Act
shall be punished with imprisonment of
either description which may extend to
three years, or with fine which may extend
to three million rupees, or with both.
(Cont)
Cont
Section 57. Violations Affecting
Electronic Commerce. – 7 Years &
one million fine
• Cyber terrorism
• Data damage
• Electronic fraud
• Electronic forgery
• Unauthorized access to code
• Identity Crime
• Unauthorized interception
(Cont)
Cont
• Cyber stalking
• Cyber Spamming
• Cyber Spoofing
(Cont)
Cont
Electronic fraud:
• People for illegal gain get in the way or use
any data, electronic system or device or
with intent to deceive any person, which act
or omissions is likely to cause damage or
harm. (Cont)
Cont
Electronic Forgery:
• Whoever for unlawful gain interferes with data,
electronic system or device, with intent to cause
harm or to commit fraud by any input, alteration, or
suppression of data, resulting in unauthentic data
that it be considered or acted upon for legal
purposes as if it were authentic, regardless of the
fact that the data is directly readable and intelligible
or not. (Cont0
Cont
Malicious code:
• Whoever willfully writes, offers, makes
available, distributes or transmits malicious
code through an electronic system or
device, with intent to cause harm to any
electronic system or resulting in the theft or
loss of data commits the offence of
malicious code. (Cont
Cont
Cyber stalking:
• Whoever with intent to harass any person uses
computer, computer network, internet, or any other
similar means of communication to communicate
obscene, vulgar, profane, lewd, lascivious, or
indecent language, picture or image.
• Make any suggestion or proposal of an obscene
nature
• Threaten any illegal or immoral act
• Take or distribute pictures or photographs of any
person without his consent or knowledge
• Commits the offence of cyber stalking. (Cont)
Cont
Spamming:
• Whoever transmits harmful, fraudulent,
misleading, illegal or unsolicited
electronic messages in bulk to any
person without the express permission of
the recipient, involves in falsified online
user account registration or falsified
domain name registration for commercial
purpose commits the offence of
spamming. (Cont)
Cont
Spoofing:
• Whoever establishes a website, or sends an
electronic message with a counterfeit
source intended to be believed by the
recipient or visitor or its electronic system
to be an authentic source with intent to gain
unauthorized access or obtain valuable
information
• Later, Information can be used for any
lawful purposes commits the offence of
spoofing. (Cot)
Cont
Cyber terrorism:
• Any person, group or organization who, with
terroristic intent utilizes,
• accesses or causes to be accessed a computer or
computer network or electronic system or device or
by any available means,
• knowingly engages in or attempts to engage in a
terroristic act commits the offence of cyber
terrorism
Conflict of Laws
How proper law is determined.lex
fori- lex patriae-- lex domicilii-- lex
situs- lex loci actus-lex loci delicti- lex
loci contractus (Cont)
Jurisdiction Issues in cyber crime
The extent to which the criminal or regulated activity
takes place, or has a substantial,direct, and foreseeable
effect, within the territory of the forum;