Download - Cyber Laws -Nudrat Mufti
FRIENDSHIP
LOTTERY
MODERN TRENDS
GLAMOUR
APPRECIATION
FEMALE FANTACIES
RELATIONSHI
PFINAICIAL CRIMES
UTUBE
POLLUTING YOUTH
Go to the Internet for information, entertainment, relationships and support. .
Heavy users are at risk when they are plugged for More Than 18 Hours A Week. There is no official diagnosis for an addiction to the Internet. The proposed disorder is called Internet Addiction Disorder (IAD).
IAD(INTERNET ADDICITION DISORDER)
USING THE NET IS NOT A PROBLEM FOR INTERNET USERS WHO ARE ON-LINE LESS THAN
TWO HOURS A WEEK.
The people going on-line excessively will encounter one or more of the following problems.
Personal neglect Compulsive checking and "clicking" Isolation and avoidance from people Lost productivity Depression Marital problems Internet abuse in the workplace Academic failure.
Problems
INTERNET ACTIVITIES
when people mistreat or misuse other people, showing no concern for their
integrity or innate worth as individuals, and in a manner that degrades their well being
ABUSE
Am I Being Abused?Domestic ViolenceStalkingSexual Harassment Financial Abuse Credit card or debt, identity theft and other money matters.
Learn about Abuse improper usage or treatment
for a bad purpose
SOLVE PROBLEM
FOCUS
FLEXIBILITY
ATTENEIONSPEED
MEMORY
ABUSE Is Acceptable Or Just Inevitable?
BETTER CONCERTATION
THINK OUTSIDE THE BOX
BE A SHARPER AND BETTER DRIVER
THINK FASTER AND IMPROVE REACTION
TIME
IMPROVE INTELLIGENCE & I.Q
Internet Security Safety with an Abuser think of ways to try to stay safe if
you are currently living with someone who is violent. Getting Ready to Leave Ending the Abusive RelationshipIf you have left an
abusive relationship, or you are trying to keep the abuser away,
Safety in Rural AreasIf you live in a rural area or a small town, there are some extra things to keep in mind when you're making a safety plan.
Safety Tips for Stalking Victims how to stay safe if you are a victim of stalking
Safety with Social Media How to stay safe on Face book, MySpace, Twitter and Blog
Where to Find Help Additional resources + create a safety plan that is right for you.
STAYING SAFE(QUICK ACTIONS)
STRONG PASSWORD BEING CAREFUL –FILE OR DOC SHARING EXTRA CONCERNED WITH UR ONLINE BILL
PAYMENT DISCLOSING INFORMATIONS MISUSE OF PHOTOGRAPH CHILD CODE LATEST ANTI-VIRUS UPDATE AWARENESS BACK VOLUME-AVOID DATA LOSS
TIPS
Prevention of Electronic Crimes Ordinance, Pakistan 2007
SERIOUS VIOLATIONS OF INTERNATIONAL CYBER LAWS,
ILLEGAL ACCESS
ILLEGAL INTERCEPTION
DATA INTERFERENCE
SYSTEM INTERFERENCE
MISUSE OF DEVICES
FORGERY
FRAUD
CHILD PORNOGRAPHY
CRIME AND PUNISHMENT
• to two years• three hundred
thousand rupees. Criminal access.
• to three years• with fine • with both.
Criminal data
access
• three years, • with fine• or with both Data
damage
• three years, • with fine• or with both System
damage
• seven years,• with fine, • with BothElectronic
fraud
• seven years,• with fine • with both Electronic
forgery
Whoever for wrongful gain interferes with or uses any data, electronic system or device or induces any person to enter into a relationship or with intent to deceive , which act or omission is likely to cause damage or harm to that person
wrongful gain interferes with data, electronic system or device, with intent to cause damage or injury to the public or to any person, make illegal claim or title or to cause any person to part with property or to enter into any express or implied contract, or with intent to commit fraud by any input
• three year• with fine, Misuse of electronic
system or electronic device
• three year• with fine,
. Unauthorized access to code
• five years, • with fine,• with both. Misuse of
encryptionencrypts any communication or data contained in electronic system relating to that crime or incriminating evidence, commits the offence of misuse of encryption
• ten years• with fine not less than one hundred
thousand rupees,• with both. Cyber stalking
with intent to coerce , intimidate, or harass any person uses computer, computer network, internet, network site ,electronic mail or any other similar means of communication (a) communicate obscene, vulgar, profane, lewd, lascivious , or indecent language, picture or image; (b) make any suggestion or proposal of an obscene nature (c) threaten any illegal or immoral act; (d) take or distribute pictures or photographs of any person without his consent or knowledge; (e) display or distribute information in a manner that substantially increases the risk of harm or violence to any other person, commits the offence of cyber stalking.
• fine not exceeding fifty thousand rupees for the first time
• imprisonment of three months• with both. .
Spamming
transmits harmful, fraudulent , misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient,
• causes any electronic system to show any such message or involves in falsified online user account registration
falsified domain name registration for commercial purpose commits the offence of spamming.
• ten years • with fine not less than ten million
rupees, • with both. Cyber
terrorism
• to three years• with fine, • both.
Spoofing
• to five years• with fine• with both
Malicious code
• to five years, • five hundred thousand rupees,• with both. Unauthorized
interception
a website, or sends an electronic message with a counterfeit source
• ten years, • with fine not exceeding one million
rupees, or with both. Enhanced punishment for
offences involving sensitive electronic
systems
• oneha1f of the longest term of imprisonment . Of abets, aids or
attempts to commits offence
who aids to
commit or does
any act
preparatory -
guilty of that
offence
sections 193 and 228 of the Pakistan Penal Code 1860 (XLV of 1860 )
sections 480 and 482 of the Code
Prosecution and trial of offences
ESTABLISHMENT OF INVESTIGATION AND PROSECUTION AGENCIES – Federal Investigation Agency to investigate and prosecute the offences under this Act- retain its traffic data minimum for a period of ninety days –in writing to the Ministry of Foreign Affairs of Government of Pakistan I other relevant agencies as the case may be . the Information and Communication Technologies Tribunal whose principal seat shall be at Islamabad
Overview Most of the laws related to domestic violence
and sexual assault are state laws. Restraining Orders A restraining order is a legal
order requiring one person to stop harming another. Custody General information about custody and
visitation laws. Parental Kidnapping the laws of taking your child
away from another parent without that parent's consent. Divorce General information about the basic steps to
get a divorce. Crimes General information about crimes the abuser
may have committed. Suing Your Abuser You may have a right to sue your
abuser for medical costs, destroyed property, or other damages.
LEGAL AID
An International Criminal Court or Tribunal for Cyberspace (ICTC). A presentation at the EastWest Institute Second Worldwide Cybersecurity Summit, London, UK, (June 1-2, 2011).
‣Wanted - A United Nations Cyberspace Treaty, including cybercrime. A presentation at the EastWest Institute First Worldwide Cybersecurity Summit, Dallas, USA, (May 3-5, 2010).
‣A Cyberspace Treaty - A United Nations Convention or Protocol on Cybersecurity and Cybercrime. A presentation at the United Nations Congress on Crime Prevention and Criminal Justice, Salvador, Brazil, (April 12-19, 2010).
‣A Cyberspace Treaty, including cybersecurity and cybercrime. Cyberspace, as the fifth common space after land, sea, air and outer space neeed international law as a framework. - EastWest Institute 7th Worldwide Conference, Special Consultation «International Pathways to Cybersecurity» - Brussels (February 17, 2010).
‣Court Technology Conference (CTC) 2009 - A brief introduction of the International Courts, Denver, USA, (September 2009) (pdf)
‣ITU Publication on Understanding Cybercrime: A Guide for Developing Countries (pdf) prepared by Dr. Marco Gercke; International Telecommunication Union (ITU), Geneva (May 2009)
‣The History of Global Harmonization on Cybercrime Legislation - The Road to Geneva (pdf)Stein Schjolberg (December 2008)
references