You are on page 1of 5

CYBER CRIMES

Definition: A cybercrime is defined as any criminal or other offence that is facilitated by or


involves the use of electronic communications or information systems, including the use of a
device or the Internet or both.

Examples of Cybercrimes:

 Computer viruses and worms


 Hacking
 Malicious Software
 Identity theft
 Money Laundering
 Cyber Bullying
 Electronic Terrorism, Vandalism
 Cyber Stalking
and Extortion
 Financial fraud
 Glorification of an offence
 Digital Piracy
 Spamming
 Pornography of minors
 Spoofing

Relevant Legislation: Prevention of Cybercrimes Act 2016, also known as Prevention of


Electronic Crimes Act 2016.

The Need for a Cybercrimes/Electronic Crimes Act


 The rate of cybercrimes in Pakistan is increasing day by day. It is one of the fastest
growing felonies which are hard to detect.

 Increasing number of victims of abuse on social media sites. People can get a number
of years for such involvement under the law.

 Rather than making a good and constructive use of information technology, people
are more interested in its misuse. Many developed countries have introduced different
policies and laws to restrain the destructive use of cyber facilities. But in Pakistan
there is still a lack of proper system to deal with this. After passing many bills still the
government has failed to overcome from this crime.

 Cybercrime cell receives 10 to 12 complaints daily. Serious steps have to be taken in


order to solve these crimes, so that people feel secure while using the internet.
 Cybercrime has now surpassed illegal drug trafficking as a criminal money maker
 Somebody’s identity is stolen every 3 seconds as a result of cybercrime

 Without a sophisticated security package, your unprotected PC can become infected


within four minutes of connecting to the Internet.
Scope of the Act: The Act is applicable to all persons and activities in Pakistan and applies
to all Pakistani nationals in Pakistan.

Purpose of the legislation: To prevent unauthorized acts with respect to information systems
and provide for related offences as well as mechanisms for their investigation, prosecution,
trial and international cooperation.

Reactions to the Act

 Human rights activists say the Act can restrict freedom or expression, freedom of
speech and the right to information, and allow for unfair prosecution against innocent
users of the Internet.
 The Act is criticised for giving Pakistan Telecommunication Authority (PTA)
unlimited powers to decide what is illegal.
 The Act gives PTA sweeping powers to block and destroy online material, without a
court order.
 The Act does not give any provisions to protect sensitive data of Pakistani users.
 The Act’s language leaves it open to abuse by law enforcement agents, agencies, and
the government
 Authorized officers and legal enforcement agents can unlock any computer or mobile
device on mere suspicion of an offence during an investigation.
 Spoofing law is heavily contested as it is a new concept that Pakistani users are not
aware is a crime, rather it is generally considered to be entertainment.
 Members of opposition political parties have also expressed concern about the
potential for misuse of the Act by government authorities and the possibility that it
may stifle political debate online.
 Government officials stand by the Act, saying that the restrictions it places on the
internet are needed to ensure security against growing threats such as terrorism.

Information System/Data v Critical Information System


An information system can be a computer or any device that has the capability to store, share
and produce data. (S 3-S5)

Harsher penalties for cybercrimes are imposed if they involve information systems or data
connected to critical infrastructure. (S6-S8.)

Critical infrastructure is defined in S2(k) as “any system or data that supports or performs a
function with respect to critical infrastructure.” In broader terms, any data or infrastructure
that has sensitive information that could affect state security.
List of Cybercrimes
S3 – Unauthorized access to information system or data
S4 – Unauthorized copying of information system or data
S5 – Interference of information system or data
S6 – Unauthorized access to critical information system
S7 – Unauthorized copying of critical information system
S9 – Glorification of an offence – Preparing or disseminating information with the intent to
glorify that offence relating to terrorism. 7 years imprisonment, 10 million rupees fine.

S10 – Cyber terrorism – Anyone who commits or threatens to commit ss6-9 offences with
intent to:

a) Coerce or intimidate
b) Advance hatred
c) Advance objectives of terrorism

S10A – Hate speech – Preparing or disseminating information, through any information


system or device, that advances or is likely to advance inter-faith, sectarian or racial hatred.
S10B – Recruitment, funding and planning of terrorism

S11 – Electronic forgery - Whoever interferes with or uses any information system, device or
data, with the intent to cause damage or injury to the public or to any person, … make any
illegal claim or title or … cause any person to part with property … with intent to commit
fraud … shall be punished with imprisonment of either description for a term which may
extend to three years, or with fine which may extend to two hundred and fifty thousand
rupees or with both.

S12 – Electronic fraud - Whoever with the intent for wrongful gain interferes with or uses
any information system, device or data or induces any person to enter into a relationship or
deceives any person, which act or omission is likely to cause damage or harm to that person
or any other person shall be punished with imprisonment for a term which may extend to two
years or with fine which may extend to ten million rupees or with both
S13 – Making and supplying devices to commit an offence

S14 – Unauthorized use of identity information – Whoever obtains, sells, possesses, transmits
or uses another person’s identity information without authorization shall be punished with
imprisonment for a term which may extend to three years or with fine which may extend to
five million rupees, or with both.

S15 – Unauthorized issuance of SIM cards - Whoever sells or otherwise provides subscriber
identity module (SIM) card … or other portable memory chip designed to be used in cellular
mobile or wireless phone for transmitting information … shall be punished with
imprisonment for a term which may extend to three years or with fine which may extend to
five hundred thousand rupees or with both
S17 – Unauthorized interception of signals

S18 – Offences against the dignity of a natural person – Whoever intentionally and publicly
exhibits or displays or transmits any information through any information system, which he
knows to be false, and intimidates or harms the reputation or privacy of a natural person, shall
be punished with imprisonment for a term which may extend to three years of a fine which
may extend to one million rupees or both.

S19 – Offences against modesty of a natural person and minor – Whoever intentionally and
publicly exhibits, displays or transmits any information which

a) Superimposes a photograph of the face of a natural person over any sexually explicit
image or video, or
b) Includes a photograph or a video of a natural person in sexually explicit conduct,
c) Intimidates a natural person with any sexual act,
d) Cultivates, entices or induces a natural person to engage in a sexually explicit act
through an information system to harm a natural person or his reputation, to take
revenge, create hatred or blackmail them, shall be punished with imprisonment for a
term which may extend up to five years with a fine that may extend to five million
rupees or both
S19A – Child pornography

S20 – Malicious code - Whoever willfully and without authorization writes, offers, makes
available, distributes or transmits malicious code through an information system or device,
with intent to cause harm to any information system or data resulting in the corruption,
destruction, alteration, suppression, theft or loss of the information system or data, shall be
punished with imprisonment for a term which may extend to two years or with fine which
may extend to one million rupees or with both.

Explanation.- For the purpose of this section, the expression “malicious code” includes, a
computer program or a hidden function in a program that damages an information system or
data or compromises the performance of such system or availability of data or uses it without
proper authorization
S21 – Cyber stalking – A person commits the offence of cyber stalking when, with the intent
to coerce, intimidate or harass a person, uses an information system, network, Internet,
website, email or similar means of communication to:

a) Follow, contact, or attempt to contact a person to foster personal interaction


repeatedly, despite clear indication of disinterest by such person,
b) Monitor someone’s use of the Internet, email, texts or any form of electronic
communication,
c) Watch or spy on someone resulting in their fear of violence, serious alarm or distress,
d) Photograph or make a video of any person without their consent, displaying and
distributing it in a manner that harms that person

S22 – Spamming – (1) A person commits the offence of spamming when he, with intent,
transmits harmful, fraudulent, misleading, illegal or unsolicited information to any person
without permission of the recipient or who causes any information system to show any such
information for wrongful gain.

(2) A person including an institution or an organization engaged in direct marketing shall


provide the option to the recipient of direct marketing to unsubscribe from such marketing.

S23 – Spoofing – Whoever with dishonest intention establishes a website or sends any
information with a counterfeit source intended to be believed by the recipient or visitor of the
website, to be an authentic source commits spoofing. For example creating a fake page
claiming to be the official page of a celebrity, or pages which make fun of politicians or
celebrities.

S27 – Power to investigate – Only an authorized officer of the investigation agency shall
have the powers to investigate an offence under this Act.

S30 – Warrant for search or seizure – (1) Upon an application by an authorized officer that
demonstrates to the satisfaction of the Court that there exist reasonable grounds … that (a)
may … require … a criminal investigation … or (b) has been acquired by a person as a result
of the commission of an offence, the Court may issue a warrant which shall authorize an
officer of the investigation agency … to enter the specified place and to search the premises
and any … storage medium relevant to the offence … and access, seize or similarly secure
any … other articles relevant to the offence.

S 34 – Powers of Pakistan Telecommunication Authority – “power to remove or block or


issue directions for removal or blocking of access to information through any information
system if it considers it necessary in the interest of the glory of Islam or the integrity, security
or defence of Pakistan or any part thereof, public order, decency or morality, or in relation to
contempt of court or commission of or incitement to an offence under this Act.”

You might also like