1 / 34

Cyber Law lecture

cyber law

ammar31
Download Presentation

Cyber Law lecture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Law INTRODUCTION TO CYBER LAW and Cyber Law Act 2016 Lecture by AMMAR ALI QAZI

  2. Google Classroom Link • https://classroom.google.com/c/NjUyMTI5MjEwMzA3?cjc=nfuyhrx

  3. Lecture Outlines • What is Cyber Crime • Cyber Crimes that reported in Pakistan • Cyber Law Act 2016

  4. Cyber Crime • Activity in which computers or networks are a tool, a target, or a place of criminal activity. • Cyber crime also stated as any use of a computer as an instrument to further illegal ends, such as • Committing fraud • Stealing identities • Violating privacy

  5. Cyber Crime (Cont’d) • It is also include traditional crimes in which computers or networks are used to unable the illicit activity. • As the computer has become central to ecommerce, entertainment and government • Cyber Crime has grown in importance.

  6. Example • Email account of Federal minister is hacked. • Credit cards frauds reach to an alarming level. • Visiting CEO’s of multinational companies gets threatening emails. • Financial Institution are the favourite targets of cyber criminals worstly affecting the technological progress in the area of e-commerce.

  7. Cyber crimes that reported in Pakistan • Cyber crime has become an increasingly severe problem in Pakistan in recent years. • Financial fraud is the most common type reported; in 2020, of 84,764 total complaints, 20,218 Pakistanis reported falling victim to financial fraud-related online crimes. • An increasing number of Pakistanis have experienced cyber crime through social media. Between 2018-2021, financial fraud through social media increased by 83%. Of 102,356 complaints received in 2021, 23% of cyber crimes used Facebook.

  8. Cyber Law Act 2016 • The Prevention of Electronic Crimes Act, 2016 (PECA) is the principal criminal law dealing with cybercrimes in Pakistan. It criminalizes different conducts that involve cyberspace and digital devices.  • The FIA is the competent authority and bound to arrest the violaters, however due to the non implementation of the law, the violators are still at large. • Many accounts on social media has been blocked but no one arrested yet.

  9. Cyber Law 2016 Detail • Some other authorities are involved • PTA etc • Federal Investigation Agency, National Response center for cyber crime • https://www.nr3c.`gov.pk/ • Examples are Ethical Hacking Training in UET

  10. Cyber Law 2016 Detail • Cyber Crimes reported details • FIA Sindh launches new website to report crimes. • https://fia.gov.pk/ccw • Last year FIA received 2019 reports total • 1,592 are related to blackmailing, harassment and defamation through social media. • 307 are related to financial fraud • 116 are regarding threatening calls.

  11. Cyber Law 2016 Detail • Remaining 186 are pertaining to email hacking spoofing etc. • There are over 50 million broadband subscribers in Pakistan and the number of cellular phone subscribers may be as high as high over 150 million. • FIA arrest Chinese for ATM Skimming, Credit Card Fraud • Two Chinese nationals, who were arrested over alleged involvement in ATM skimming scandal, have been remanded into FIA custody for three days

  12. Cyber Law 2016 Detail • Unauthorized access to information system or data up to 3 months prison or up to Rs. 50,000 fine or both. • Examples are: Access to information System means: gaining access, control or ability to use any part or whole of an system that could be a laptop, mobile phone tablet, or any other kind of computer system.

  13. Cyber Law 2016 Detail • Unauthorized copying or transmission of data: up to 6 months prison or up to Rs.100,000 Fine or both. • Examples are: If you copies data of someone else’s flash drive. • If you gain access to someone’s phone and copy a mobile number.

  14. Cyber Law 2016 Detail • Interference with information system or data: up to 2 years Prison or up to Rs 500,000 fine or both. • Examples are: You hack a website and delete the content of the server • You gain access to someone's mobile and delete its number.

  15. Cyber Law 2016 Detail • Unauthorized access to critical infrastructure information system or data: up to 3 years Prison or up to Rs 1 Million fine or both. • Examples are: you hack Nadra’s database and get an authorized access • You hack and intercept a fiber optic cable. and start listening to data.

  16. Cyber Law 2016 Detail • Interference with critical infrastructure information system or data: up to 7 years Prison or up to Rs 10 Million fine or both. • Examples are: You hack NADRA’S Database and delete everything • You hack and intercept a fiber optic cable and start transmitting it to someone.

  17. Cyber Law 2016 Detail • Glorification of an offence: up to 7 Years Prison or up to Rs 10 Million fine or both. • Examples are: You post on FACEBOOK about Talibaan and say that they are good people. • You SMS someone and say that Al- Qaida People will go to heaven

  18. Cyber Law 2016 Detail • Cyber Terrorism: Up to 14 years in Prison or up to Rs 50 Million fine or both • Examples are: You gain access to back end system of a TV channel and start broadcasting a message that may create panic. • You gain access to back end of a mobile company and start broadcasting a message that may trigger fear.

  19. Cyber Law 2016 Detail • Hate speech: up to 7 years in Prison or fine or both. • Examples are: You gain access to back end system of a TV channel and start broadcasting a message that may create panic. • You gain access to back end of a mobile company and start broadcasting a message that may trigger fear.

  20. Cyber Law 2016 Detail • Online Recruitment, Funding of Terrorism: Up to 7 Years in Prison or fine or both. • Examples are: You run a facebook group and encourage people to fund TTP. • You run a what Sapp group and plan a terror attack

  21. Cyber Law 2016 Detail • Electronic Forgery: up to 3 years in Prison or up to Rs. 250,000 fine or both • Examples are: Change a Contract/agreement/ invoice with intent to gain legal benefit

  22. Cyber Law 2016 Detail • Electronic Fraud: Up to 2 Years in Prison or up to Rs 10 Million fine or both • Examples are: You get into a relationship with someone with intents to cause financial damage.

  23. Cyber Law 2016 Detail • Making, Obtaining, or supplying device for use in offence: up to six months in Prison or up to Rs. 50,000 fine or both. • You Manufacture a Special purpose phone to communicate for planning an attack. • You make a Software to hack a website.

  24. Cyber Law 2016 Detail • Unauthorized use of identity information: Up to 3 Years in Prison or up to Rs. 5 Million fine or both • Examples are You use Someone’s email address to pose as someone you aren’t • You call someone and claim you are a person which you are not

  25. Cyber Law 2016 Detail • Unauthorized issuance of SIM cards etc. Up to 3 Years in Prison or up to Rs. 500,000 in fine or both. • Examples are: You sell SIM cards without verifying data • You provide a SIM card to someone else for usage, even temporarily

  26. Cyber Law 2016 Detail • Tampering of communication equipment: up to 3 Years in Prison or Up to Rs. 1 Million in fine or both • Examples are: You install a spy mobile app that can record calls and SMS and is able to send this data in email to you or someone else.

  27. Cyber Law 2016 Detail • Unauthorized interception: Up to 2 Years in Prison or Up to Rs. 500,000 in fine or both • Any Transmission that is not intended to be and is not open to the public, from or within an information system • Electromagnetic emissions from an information system that are carrying data.

  28. Cyber Law 2016 Detail • Against identity of a natural person or minor: up to 3 Years in prison or up to Rs. 1 Million in fine or both • Examples are : Spread false information against one’s identity.

  29. Cyber Law 2016 Detail • Against Modesty of a natural person or minor: up to 5 Years in Prison or up to Rs. 5 Million in fine or both • Examples are: You Photoshop an image of a person in a manner that face is used along side a nude body.

  30. Cyber Law 2016 Detail • Child Pornography: Up to years in Prison or Up to Rs. 5 Million in fine or both • Concept of a Dark Web • Examples are: You make an Sexually Explicit video or images of minor • You broadcast/ Post video or images

  31. Cyber Law 2016 Detail • Malicious code: Up to 2 Years in Jail or up to Rs. 1 Million in fine or both. • You write a virus • You Write a code that can be used to destruct a hard drive • You develop a mobile app to spy someone • You develop an app to spread virus • You DDoS attack someone.

  32. Cyber Law 2016 Detail • Cyber Stalking: Up to 3 Years in Jail or Up to Rs. 1 Million in fine or both. • Examples are: You repeatedly call someone, despite the other party asks you to not to • You send emails with no interest shown by the other party • You do something in a manner that other party is harassed out of your actions.

  33. Cyber Law 2016 Detail • Spamming for first time just 50,000 rupees, 2nd time up to 3 months in jail and up to Rs. 1 Million in fine. • Examples are: Spreading wrong information without permission of the recipient • Email from twitter, facebook right on the bottom you will see, unsubscribed.

  34. Cyber Law 2016 Detail • Spoofing: up to 3 Years in Jail or fine up to Rs. 500,000 or both. • Whoever with dishonest intention establishes a website or sends any information with a counterfeit source intended to be believed by the recipient or visitor of the website to be an authentic source commits spoofing.

More Related