GFCW Peshawar. Name: Hina Bibi Roll: 28 Assignment: ICT (2nd Semester) Topic: Submitted to Madam Sumaila Deptt: BS English Cyber Crime Act in Pak in 2016 Law & Punishment

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

GFCW Peshawar. Name: Hina Bibi Roll: 28 Assignment: ICT (2 nd Semester) Topic: Submitted to Madam Sumaila Deptt : BS English Cyber Crime Act in Pak in 2016 Law & Punishment.

Scene 2 (13s)

Cyber crime Meaning:. Cyber crime is the generic term that refers to all criminals activities by the using computer technology. Cyber Crime Definition: A crime in which computer network or devices are called is a cyber crime..

Scene 3 (26s)

Cyber Law? • Cyber Law is the law governing cyberspace • Cyberspace refers to the virtual computer world, more specifically, is an electronic medium used to form a global computer network to facilitate online communication. It is a large computer network made up of many worldwide computer networks that employ IP protocol to aid in communication and data exchange activities..

Scene 4 (43s)

CYBERCRIME CATEGORIES Cybercrimes fall in different categories described as under There are different types of cybercrimes, classified in the following categories: • Hacking • Identity theft • Cyberbullying.

Scene 5 (54s)

• Cyberbullying • Cyberstalking • Spoofing • Financial fraud • Digital Piracy • Computer viruses and worms • Malicious Software • Intellectual property rights • Money Laundering • Denial of Service attack • Electronic Terrorism • Vandalism.

Scene 6 (1m 5s)

CYBERCRIMES PUNISHMENTS IN PAKISTAN Details regarding punishments for cybercrimes in Pakistan have been listed as under: Punishment Type of Cybercrime Data Damage 3 years imprisonment or PKR 3 lac fine Electronic Fraud 7 years imprisonment or PKR 7 lac fine Electronic Forgery 7 years imprisonment or PKR 7 lac fine Malicious Code 5 years imprisonment or PKR 5 lac fine Cyber talking 3 years imprisonment or PKR 3 lac fine.

Scene 7 (1m 22s)

Data Damage 3 years imprisonment or PKR 3 lac fine Electronic Fraud 7 years imprisonment or PKR 7 lac fine Electronic Forgery 7 years imprisonment or PKR 7 lac fine Malicious Code 5 years imprisonment or PKR 5 lac fine Cyberstalki ng 3 years imprisonment or PKR 3 lac fine Spamming 3 years imprisonment or PKR 3 lac fine Spoofing 6 months imprisonment or PKR 50 thousand fine Cyberterro rism 10 years imprisonment or PK 10 million fine.

Scene 8 (1m 41s)

What is electronic crime Act Prevention 2016? In 2016, the National Assembly enacted the Prevention of Electronic Crimes Act (“PECA”) to provide a comprehensive legal framework to define various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in relation to electronic crimes..

Scene 9 (1m 55s)

OOO 6. PECA 2016. Preamble - to make provisions for prosecution of electronic crimes; • WHEREAS it is expedient to prevent unauthorized acts with respect to information systems and provide for related offences as well as mechanisms for their investigation, prosecution, trial and international cooperation with respect thereof and for matters connected therewith or ancillary thereto: 7. PECA 2016 • 2. Definitions.- ( i ) in this Act, unle there is anything repugnant in the subject or context,- ( i ) "act" includes- (a) a series of acts or omissions contrary to the provisions of this Act; or (b) causing an act to be done by a person either directly or through an automated information system or automated mechanism or self- executing, adaptive or autonomous device and whether having temporary or permanent impact;.

Scene 10 (2m 27s)

8. PECA 2016 • 2(ii) "access to data" means gaining control or ability to use, copy, modify or delete any data held in or generated by any device or information system; • (iii) "access to information system" means gaining control or ability to use a part or whole of an information system whether or not through infringing any security measure;.

Scene 11 (2m 44s)

9. PECA 2016 • (iv) "Authority means the Pakistan Telecommunication Authority established under the Pakistan Telecommunication (Re-organization) act, 1996 (XVII of 1996); • (V) "authorization' means authorization by law or by the person empowered to make such authorization under the law: Provided that where an information system or data is available for open access by the general public, access to transmission of such information system or data shall be deemed to be authorized for the purposes of this Act;.

Scene 12 (3m 6s)

12. PECA 2016 • (xi) "Critical infrastructure information system or data" means an information system, program or data that supports or performs a function with respect to a critical infrastructure; (xii) "damage to an information system' means any unauthorized change in the ordinary working of an information system that impairs its performance, access, output or change in location whether temporary or permanent and with or without causing any change in the system: 13. PECA 2016.(xiii) "data" includes content data and traffic data; • (xiv) 'data damage" means alteration, deletion, deterioration, erasure, relocation, suppression of data or making data temporarily or permanently unavailable; • (xv) "device" includes,- (a) physical device or article; (b) any electronic or virtual tool that is not in physical form; (c) a password, access code or similar data, in electronic or other form, by which the whole or any part of any information system is capable of being accessed; or (d) automated, self-executing, adaptive or autonomous devices, programs or information systems;.