Cyber Laws -Nudrat Mufti

25
CYBER FANTACY CULTIVATE CRIME NUDRAT MUFTI (LEGAL & DEVELOPMENT CONSULTANT)

Transcript of Cyber Laws -Nudrat Mufti

CYBER FANTACY

CULTIVATE CRIME

NUDRAT MUFTI (LEGAL & DEVELOPMENT CONSULTANT)

Ur age----FOCUSED

FREEDOM

KNOWLEDGE

EDUCATION

FRIENDSHIP

LOTTERY

MODERN TRENDS

GLAMOUR

APPRECIATION

FEMALE FANTACIES

EMAIL

RELATIONSHI

PFINAICIAL CRIMES

UTUBE

POLLUTING YOUTH

PERSON

ORGANIZATION

PROPERTY

SOCIETY

CLASSIFICATIONS

Go to the Internet for information, entertainment, relationships and support. .

Heavy users are at risk when they are plugged for More Than 18 Hours A Week. There is no official diagnosis for an addiction to the Internet. The proposed disorder is called Internet Addiction Disorder (IAD).

IAD(INTERNET ADDICITION DISORDER)

USING THE NET IS NOT A PROBLEM FOR INTERNET USERS WHO ARE ON-LINE LESS THAN

TWO HOURS A WEEK.

The people going on-line excessively will encounter one or more of the following problems.

Personal neglect Compulsive checking and "clicking" Isolation and avoidance from people Lost productivity Depression Marital problems Internet abuse in the workplace Academic failure.

Problems

INTERNET ACTIVITIES

when people mistreat or misuse other people, showing no concern for their

integrity or innate worth as individuals, and in a manner that degrades their well being

ABUSE

Am I Being Abused?Domestic ViolenceStalkingSexual Harassment Financial Abuse Credit card or debt, identity theft and other money matters.

Learn about Abuse improper usage or treatment

for a bad purpose

SOLVE PROBLEM

FOCUS

FLEXIBILITY

ATTENEIONSPEED

MEMORY

ABUSE Is Acceptable Or Just Inevitable?

BETTER CONCERTATION

THINK OUTSIDE THE BOX

BE A SHARPER AND BETTER DRIVER

THINK FASTER AND IMPROVE REACTION

TIME

IMPROVE INTELLIGENCE & I.Q

Internet Security Safety with an Abuser think of ways to try to stay safe if

you are currently living with someone who is violent. Getting Ready to Leave Ending the Abusive RelationshipIf you have left an

abusive relationship, or you are trying to keep the abuser away,

Safety in Rural AreasIf you live in a rural area or a small town, there are some extra things to keep in mind when you're making a safety plan.

Safety Tips for Stalking Victims how to stay safe if you are a victim of stalking

Safety with Social Media How to stay safe on Face book, MySpace, Twitter and Blog

Where to Find Help Additional resources + create a safety plan that is right for you.

STAYING SAFE(QUICK ACTIONS)

STRONG PASSWORD BEING CAREFUL –FILE OR DOC SHARING EXTRA CONCERNED WITH UR ONLINE BILL

PAYMENT DISCLOSING INFORMATIONS MISUSE OF PHOTOGRAPH CHILD CODE LATEST ANTI-VIRUS UPDATE AWARENESS BACK VOLUME-AVOID DATA LOSS

TIPS

SERIOUS VIOLATIONS OF INTERNATIONAL CYBER LAWS,

ILLEGAL ACCESS

ILLEGAL INTERCEPTION

DATA INTERFERENCE

SYSTEM INTERFERENCE

MISUSE OF DEVICES

FORGERY

FRAUD

CHILD PORNOGRAPHY

CRIME AND PUNISHMENT

• to two years• three hundred

thousand rupees. Criminal access.

• to three years• with fine • with both.

Criminal data

access

• three years, • with fine• or with both Data

damage

• three years, • with fine• or with both System

damage

• seven years,• with fine, • with BothElectronic

fraud

• seven years,• with fine • with both Electronic

forgery

Whoever for wrongful gain interferes with or uses any data, electronic system or device or induces any person to enter into a relationship or with intent to deceive , which act or omission is likely to cause damage or harm to that person

wrongful gain interferes with data, electronic system or device, with intent to cause damage or injury to the public or to any person, make illegal claim or title or to cause any person to part with property or to enter into any express or implied contract, or with intent to commit fraud by any input

• three year• with fine, Misuse of electronic

system or electronic device

• three year• with fine,

. Unauthorized access to code

• five years, • with fine,• with both. Misuse of

encryptionencrypts any communication or data contained in electronic system relating to that crime or incriminating evidence, commits the offence of misuse of encryption

• ten years• with fine not less than one hundred

thousand rupees,• with both. Cyber stalking

with intent to coerce , intimidate, or harass any person uses computer, computer network, internet, network site ,electronic mail or any other similar means of communication (a) communicate obscene, vulgar, profane, lewd, lascivious , or indecent language, picture or image; (b) make any suggestion or proposal of an obscene nature (c) threaten any illegal or immoral act; (d) take or distribute pictures or photographs of any person without his consent or knowledge; (e) display or distribute information in a manner that substantially increases the risk of harm or violence to any other person, commits the offence of cyber stalking.

• fine not exceeding fifty thousand rupees for the first time

• imprisonment of three months• with both. .

Spamming

transmits harmful, fraudulent , misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient,

• causes any electronic system to show any such message or involves in falsified online user account registration

falsified domain name registration for commercial purpose commits the offence of spamming.

• ten years • with fine not less than ten million

rupees, • with both. Cyber

terrorism

• to three years• with fine, • both.

Spoofing

• to five years• with fine• with both

Malicious code

• to five years, • five hundred thousand rupees,• with both. Unauthorized

interception

a website, or sends an electronic message with a counterfeit source

• ten years, • with fine not exceeding one million

rupees, or with both. Enhanced punishment for

offences involving sensitive electronic

systems

• oneha1f of the longest term of imprisonment . Of abets, aids or

attempts to commits offence

who aids to

commit or does

any act

preparatory -

guilty of that

offence

sections 193 and 228 of the Pakistan Penal Code 1860 (XLV of 1860 )

sections 480 and 482 of the Code

Prosecution and trial of offences

ESTABLISHMENT OF INVESTIGATION AND PROSECUTION AGENCIES – Federal Investigation Agency to investigate and prosecute the offences under this Act- retain its traffic data minimum for a period of ninety days –in writing to the Ministry of Foreign Affairs of Government of Pakistan I other relevant agencies as the case may be . the Information and Communication Technologies Tribunal whose principal seat shall be at Islamabad

Overview Most of the laws related to domestic violence

and sexual assault are state laws. Restraining Orders A restraining order is a legal

order requiring one person to stop harming another. Custody General information about custody and

visitation laws. Parental Kidnapping the laws of taking your child

away from another parent without that parent's consent. Divorce General information about the basic steps to

get a divorce. Crimes General information about crimes the abuser

may have committed. Suing Your Abuser You may have a right to sue your

abuser for medical costs, destroyed property, or other damages.

LEGAL AID

An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011).

‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010).

‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, (April 12-19, 2010).  

‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth common space after land, sea, air and outer space neeed international law as a framework.  - EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to Cybersecurity» - Brussels (February 17, 2010).

‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts, Denver, USA, (September 2009) (pdf)

‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries  (pdf) prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May 2009)

‣The History of Global Harmonization on Cybercrime Legislation  - The Road to Geneva (pdf)Stein Schjolberg (December 2008)

references

SMALL AND MICRO ENTERPRISES FOR DEVELOPMENT

NEW TRENDS IN GOOD GOVERNANCE

CONFLICT RESOLUTION SUSTAINABILITY ISSUES IN POVERTY REDUCTION

SOCIAL MOBILIZATION IN DEVELOPMENT

PLANNING TOOLS

WOMEN PARTICIPATION IN NATION BUILDING PROCESS