Tuesday, 2 June 2015

An Enough Cyber Law Code in Pakistan


 An Enough Code of Cyber Laws in Pakistan
S J Tubrazy


A proposed bill of cyber laws is under reading for legislation in Pakistan. A general discourse is being discussed as such that there are no cyber laws in Pakistan. In my assertive opinion we still have an enough code of cyber laws. The provisions of Electronic Transaction Ordinance 2002 and of Payment System Electronic Funds Transfer Act being substantive laws cover the almost all financial crimes and cyber privacy crimes.

Substantive Provisions Cyber Laws

The provisions of ETO 2002 deal with recognition and facilitation of electronic documentation and e-commerce however ETO 2002 also apprehend the cybercrimes relating to provisions of false information, issue of false certificate, Violation of privacy of information and Damage to information system.
Likewise the PSEFTA 2007 provides regulatory framework for payment systems and electronic fund transfers. It also provides standards for protection of the consumer and to determine respective rights and liabilities of the financial institutions and other Service Providers, their consumers and participants.
Electronic Transaction Ordinance 2002
CHAPTER 8
OFFENCES
34. Provision of false information, etc. by the subscriber. (1) Any subscriber who:
(a) provides information to a certification service provider knowing such information to be false or not believing it to be correct to the best of his knowledge and belief;
(b) fails to bring promptly to the knowledge of the certification service provider any change in circumstances as a consequence whereof any information contained in a certificate accepted by the subscriber or authroised by him for publication or reliance by any person, ceases to be accurate or becomes misleading, or
(c) knowingly causes or allows a certificate or his electronic signatures to be used in any fraudulent or unlawful manner, shall be guilty of an offence under this Ordinance.
(2) The offence under sub-section (1) shall be punishable with imprisonment either description of a term not exceeding seven years, or with fine which may extend to ten million rupees, or with both.
35. Issue of false certificate, etc.—(1) Every director, secretary and other responsible officer, by whatever designation called, connected with the management of the affairs of a certification service provider, which:
(a) issues, publishes or acknowledges a certificate containing false or misleading information;
(b) fails to revoke or suspend a certificate after acquiring knowledge that any information contained therein has become false or misleading;
(c) fails to revoke or suspend a certificate in circumstances where it ought reasonably to have been known that any information contained in the certificate is false or misleading;
(d) issues a certificate as accredited certification service provider while its accreditation is suspended or revoked; shall be guilty of any offence under this Ordinance.
(2) The offence under sub-section (l) shall be punishable with imprisonment either description of a term not exceeding seven years, or with fine which may extend to ten million rupees, or with both.
(3) The certification service provider or its employees specified in sub-section (1),
shall also be liable, upon conviction, to pay compensation for any foreseeable damage suffered by any person or subscriber as a direct consequence of any of the events specified in clauses (a) to (d) of sub-section (1).
(4) The compensation mentioned in sub-section (3) shall be recoverable as arrears of land revenue.
36. Violation of privacy of information.—Any person who gains or attempts to gain access to any information system with or without intent to acquire the information contained therein or to gain knowledge of such information, whether or not he is aware of the nature or contents of such information, when he is not authorised to gain access, as aforesaid, shall be guilty of an offence under this Ordinance punishable with either description of a term not exceeding seven years, or fine which may extend to one million rupees, or with both.
37. Damage to information system, etc.—(1) Any person who does or attempts to do any act with intent to alter, modify, delete, remove, generate, transmit or store any information through or in any information system knowingly that he is not authorised to do any of the foregoing, shall be guilty of an offence under this Ordinance.
(2) Any person who does or attempts to do any act with intent to impair the operation of, or prevent or hinder access to, any information contained in any information system, knowingly that he is not authorised to do any of the foregoing, shall be guilty of an offence under this Ordinance.
(3) The offences under sub-section (1) and (2) of this section will be punishable with either description of a term not exceeding seven years or fine which may extend to one million rupees, or with both.
38. Offences to be non-bailable, compoundable and cognizable.—All offences under this Ordinance shall be non-bailable, compoundable and cognizable.
39. Prosecution and trial of offences.—No Court inferior to the Court of Sessions shall try any offence under this Ordinance.

Payment Systems and Electronic Fund Transfers Act, 2007

56. Criminal Liability.- Whoever knowingly and willfully gives false information or inaccurate information or fails to provide information which he is required to disclose by this Act or any instruction issued thereunder, or otherwise fails to comply with any provision of this Act shall be punished with imprisonment of either description which may extend to three years, or with fine which may extend to three million rupees, or with both.
57. Violations Affecting Electronic Commerce.- Whoever –
 (1) knowingly, in a transaction effected by electronic commerce, uses or attempts or conspires to use any counterfeit, fictitious, altered, forged, lost, stolen, or fraudulently obtained Debit Instrument to obtain money, goods, services or anything else of value aggregating five thousand rupees or more, or
 (2) knowingly receives, conceals, uses or transports money, goods, services or anything else of value aggregating five thousand rupees or more obtained by use of any counterfeit, fictitious, altered, forged, lost, stolen, or fraudulently obtained Debit Instrument, or
 (3) knowingly receives, conceals, uses, sells, or transports one or more tickets for transportation, and which have been purchased or obtained with one or more counterfeit, fictitious, altered, forged, lost, stolen or fraudulently obtained Debit Instrument, shall be punished with imprisonment of either description for a term which may extend to seven years, or with fine which may extend to one million rupees, or with both.
Explanation.-For the purpose of this section e-commerce means the activity of buying, selling or contracting for goods, services and making payments using internet or worldwide web through communication networks including of wireless networks, within or outside Pakistan.
58. Cheating by Use of Electronic Device.- Whosoever cheats by pretending to be some other person, or by knowingly substituting one person for another, or representing that he or any other person is a person other than he or such other person really is, or by cheating by impersonation, fraudulently or dishonestly uses any credit or debit card, or code or any other means of access to an Electronic Fund Transfer device, and thereby causes any wrongful gain to himself or any wrongful loss to any other person, shall be punished with imprisonment of either description for a term which may extend to seven years, or with fine which shall not be less than the wrongful loss caused to any person, or with both.

 Anti-Money Laundering Act 2010

Act of money laundering through online method amount to cybercrime. Anti-money laundering laws properly knob such crimes. The section 2 f (v) of Anti-money Laundering Act 2010 recognizes the electronic money and the record maintained in the electronic device.

Pakistan Protection Act 2014

Crimes via internet and information technology against state and state owned institutions may be cybercrimes. The section 2(i) provides a schedule in The Pakistan Protection Act 2014 which sets the schedule cybercrimes as;
(ix) destruction of or attack on communication and interaction lines, devices, grids, stations, or systems etc
(xiv) crimes against computers including cybercrimes, internet offenses and other offences related to information technology etc

 Procedural Cyber Laws

To define the basic digital and cyber law terms and provide a procedural mechanism for trial and investigation of cybercrimes, Qanun-e-Shahdat Order 1984 has been necessarily amended.  Investigation for Fair Trial Act 2013 has been enacted for collection, seizure, discovery, forensic and investigation for digital evidence contain in modern digital devices. The relevant provisions and sections of enactments are given below;

Investigation of Fair Trial Act 2013
Preamble
An Act to provide for investigation for collection of evidence by means of modern techniques and devices to prevent and effectively deal with scheduled offences and to regulate the powers of the law enforcement and intelligence agencies and for matters connected therewith or ancillary thereto.
Whereas in order to prevent the law enforcement and intelligence agencies from using their powers arbitrarily it is necessary to regulate the said powers and provide for their permissible and fair uses in accordance with law and under proper executive and judicial oversight; And whereas further being mindful that the existing laws neither comprehensively provide for nor specifically regulate advance and modern investigative techniques such as covert surveillance and human intelligence, property interference, wiretapping and communication interception that are used extensively in other jurisdictions to successfully prevent the offences and as an indispensable aid to the law enforcement and administration of justice.
And whereas in order to neutralize and prevent the threat or any attempt to carry out scheduled offenses it is necessary that the law enforcement and other agencies be given certain specific authorizations to obtain evidence in time and only in accordance with law;
And whereas it is also in order to declare the admissibility and use of the material obtained during lawful investigation under the present law, in judicial proceedings and all other legal proceedings or processes to ensure fair trial;
Authorization under the warrant.---(1) The warrant of surveillance  or  interception  to  be  issued  by  the  Judge  may authorize and allow the lawful doing of any or all of the following acts; namely:--
(a)        interception and recording of telephonic communication of the suspect with any person;
(b)        video recording of any person, persons, premises, event, situation etc;
(c)        interception or recording or obtaining of any electronic transaction including but not limited to e-mails, SMS etc;
d)        interception and taking over of any equipment used in the communication in respect of which the warrant is issued, including but not limited to telephone, cell phone, mobile sims, electronic database, demonstrating linking of electronic communication with the database belonging to the person in respect of whom the warrant has been issued:
            Provided that the Judge shall authorize take-over of equipment only where the material or statement of the authorized officer discloses a substantial threat or possibility of an attempt to commit a scheduled offence;
(e)        collection of evidence through any modern devices in addition to the ones mentioned above;
(f)         use of human intelligence;
(g)        covert surveillance and property interference; and
(h)        access to any information or data in any form related to a transaction, communication or its content.
(2)        Any other form of surveillance or interception that the Federal Government may notify in this behalf.
17.       Method of executing the warrant.---(1) Where the warrant is issued, the applicant in case of the warrant of interception, shall approach the designated agency or body, for serving the same on service provider in the manner provided for in Schedule III and the designated agency or body shall duly serve the said warrant on the service provider or give effect to it within seven days.
 (2)        The service provider shall not extend technical facilities of interception to any person or organization other than the Designated Agency or Body.
 (3)        Where nature of surveillance or interception is such that it is not necessary to serve the warrant on anyone, then the same shall not be served and its issuance alone shall be sufficient basis to collect evidence.
 (4)        While executing the warrants each applicant shall act within the mandate provided for it under the law.
18.       Indemnity for service provider.---Access granted by the service provider in accordance with this law shall not be called in question under any law by any person who may have been prejudiced by such access.
19.       Immunity to service provider.---The service provider shall have immunity in any civil or criminal legal proceedings that any person may commence against his corporate entity or against his office bearers or employees, for having complied with the warrant issued under this Act.
20.       Service provider to cooperate.---In the event the service provider declines, fails or interferes in any manner in the execution of warrant then he shall be liable to have committed an offence under this Act for obstructing investigation and justice and shall be punished with fine upto ten million rupees.
21.       Service provider to ensure confidentiality.---The service provider shall also be responsible for ensuring the confidentiality of the execution or warrant from his staff members except those necessary to execute the warrant and in case of unauthorized disclosure or misuse of data by any of his staff member, the officials of the service provider and the concerned staff shall be punished with imprisonment which may extend  to  one  year  or  with  fine  which  may  extend  to  ten  million rupees.
Admissibility of warrant based information.---(1) Notwith-standing anything contained in the Qanun-e-Shahadat, 1984 (P.O.10 of 1984) or any other law for the time being in force, the evidence including data, information, documents or any other material collected or received under this Act shall be admissible as evidence in the legal proceedings.
 (2)        Nothing contained in subsection (1), shall debar the admissibility of evidence collected or received, prior to the coming into force or this Act,  under  the  provisions  of  any  other  law  for  the  time  being in force.
25.       Report of expert.---In case where an analysis of the intercepted material collected pursuant to the warrant of surveillance or interception is required, then the same shall be carried out by a person referred to in section 3(f) being suitably qualified, trained or experienced, who shall be deemed to be an expert as described under section 510 of the Code of Criminal Procedure, 1898 (Act V of 1898) and his report shall have the same effect as given to the report of the experts of different fields mentioned in the said section.
MUTUAL LEGAL ASSISTANCE
31.       Warrants to be served outside Pakistan.---(1) Warrants obtained under the Act shall be executable outside Pakistan as well as in foreign jurisdictions, either directly on the concerned service providers or through mutual legal assistance mechanism as agreed between Pakistanand the concerned foreign State as provided under the law, treaty or agreement.
(2)        The warrant issued under this Act shall be processed for execution outside Pakistan through the Designated Agency or Body.
32.       Warrants received from outside Pakistan.---Warrants received from outside Pakistan may be executed by the Designated Agency or Body in the light of mutual legal assistance mechanism as agreed betweenPakistan and the concerned foreign State as provided under the law, treaty or agreement.
35.       Unauthorized surveillance or interception.---Any person who carries out any surveillance or interception except in accordance with the provision of this Act shall in addition to any other punishment to which he may be liable under any other law for the time being in force be punished with imprisonment for up to three years and shall also be liable to fine.


QANUN –E-SHAHDAT ORDER 1984
AMENDMENT IN QANUN-E-SHAHADAT ORDER, 1984 (P.O. No. 10 OF 1984)
1. Amendment of Article 2, P.O. No. 10 of 1984.—In the Qanun-e-Shahadat  Order, 1984 (P.O. No. 10 of 1984), hereinafter referred to as the said Order, in clause (1), after sub-clause (d), the following new sub-clauses (e) and (f) shall be added, namely:
“(e) the expression, “automated”, “electronic”, “information”, “information system”, “electronic document”, “electronic signature”, “advanced electronic signature” and “security procedure”, shall bear the meanings given in the Electronic Transactions Ordinance, 2002;
(f) the expression “certificate”, where the context so admits, includes the meaning given to it in the Electronic Transactions Ordinance, 2002.
2. Amendment of Article 30, P.O. No. 10 of 1984.—In the said Order, in Article 30, for the full stop at the end a colon shall be substituted and thereafter the following explanation shall be added, namely:
“Explanation.—Statements gene rated by automated information systems may be attributed to the person exercising power or control over the said information system.”
3. Insertion of new Article 46, P.O. No. 10 of 1984.—In the said Order, after Article 46, the following new Article shall be inserted, namely:
“46-A. Relevance of information generated, received or recorded by automated information system.—Statements in the form of electronic documents generated, received or recorded by an automated information system while it is in working order, are relevant facts.
4. Amendment of Article 59, P.O. No. 10 of 1984.—In the said Order, in Article 59—
(a) after the word “impressions” the comma and the words “, or as to authenticity and integrity of electronic documents made by or through an information system” shall be inserted ; and
(b) for the words “are relevant facts” the words and commas “or as to the functioning, specifications, programming and operations of information systems, are relevant facts” shall be substituted.
5. Amendment of Article 73, P.O. No. 10 of 1984.—In the said Order, in Article
73, after the second Explanation, the following new Explanations shall be added, namely:
“Explanation 3.—A printout or other form of output of an automated information system shall not be denied the status of primary evidence solely for the reason that it was generated, sent, received or stored in electronic form if the automated information system was in working order at all material times and, for the purposes hereof, in the absence of evidence to the contrary, it shall be presumed that the automated information system was in working order at all material times.
“Explanation 4.—A printout or other form of reproduction of a Electronic Document, other than a Document mentioned in Explanation 3 above, first generated, sent, received or stored in electronic form, shall be treated as primary evidence where a security procedure was applied thereto at the time it was generated, sent, received or stored.”
6. Insertion of new Article, P.O No. 10 of 1984.—In the said Order, after Article 78, the following new Article shall be inserted, namely :—
“78-A. Proof of electronic signature and electronic document.—If an electronic document is alleged to be signed or to have been generated wholly or in part by any person through the use of an information system, and where such allegation is denied, the application of a security procedure to the signature or the electronic document must be proved.”
7. Amendment of Article 85, P.O No. 10 of 1984.—In the said Order, in Article 85, after clause (5), the following new clause (6) shall be added, namely:
“(6) certificates deposited in a repository pursuant to the provisions of the Electronic Transactions Ordinance, 2002.”



 Regulation of PTA Regulations
Pakistan Telecommunication Authority has issued S.R.O 713 (1)/2009 against spams which is called, Protection from Spam, Unsolicited, Fraudulent an Obnoxious Communication Regulations 2009.
PTA in its letter No. 1609/11/N&TA to all CMTOs has restrain from sending SMS contain bar-code or Masking.






Wednesday, 1 May 2013

Codification of Cyber Laws in Pakistan




By


S J Tubrazy
Abundant reliance and dependence upon information technology has made it inevitable part of modern life of man, present commercial life neither can run nor grow nor even survive cutting itself from the blessing of information technology mechanism. The conventional method of transaction now even has become familiar as electronic transaction and even conventional type crimes have critically mutate among the electronic or cyber crimes and same strongly need to be secure and save and required a complete and comprehensive code of laws regulating every electronic issue and transaction.


Pakistan while daring and initiating to further step from any advance countries, has introduced, enacted and amended various statutes namely;


(i) Electronic Transaction Ordinance 2002.


(ii) Prevention of Electronic Ordinance 2008.


(iii) Amended Article 2 (e) of Qanon-e-Shahdat 1984.


(iv) Payment System Electronic funds Transfer Act 2007.

(v) Anti Money Laundering Act 2010.

(vi) Investigation for Fair Trial Act 2013.


In 2002, Government of Pakistan passed an “Electronic Transaction Ordinance 2002 (ETO)” with the objective to recognize and facilitate documents, records, information, communications and transactions in electronic form, and to provide for the accreditation of certification service providers.


Now, electronic information and communication, along with appropriate procedures have legal backing as any written and signed document. With ETO in place, Pakistan has joined an exclusive posse of countries that grant necessary framework and a momentum for growth of electronic commerce.


The new law “Prevention of Electronic Crimes Ordinance, 2007″ is in force now, which was promulgated by the President of Pakistan on the 31st December 2007.The “Prevention of Electronic Crimes Ordinance, 2007″ extends to the whole of Pakistan.


The “Prevention of Electronic Crimes Ordinance, 2007″ will apply to every person who commits an offence under the said Ordinance irrespective of his nationality or citizenship whatsoever or in any place outside or inside Pakistan, having detrimental effect on the security if Pakistan or its nationals or national harmony or any property or any electronic system or data located in Pakistan or any electronic system or data capable of being connected, sent to, used by or with any electronic system in Pakistan.


The ordinance i.e. “Prevention of Electronic Crimes Ordinance, 2007″ gives exclusive powers to the Federal Investigation Agency (FIA) to investigate and charge cases against such crimes.


The ordinance covers provision for illegal and criminal acts such as data access, data damage, system damage, electronic fraud, electronic forgery, spamming, spoofing, cyber terrorism etc.


The endorsement of ETO 2002 and afterward PECO 2007 in Pakistan has made compelled to evolve the evidentionary mechanism at litigation. Being measured inadequate to fulfill the prerequisites of Electronic evidence, Article 2 (e) of the Qanun-e-Shahadat Order 1984 has amended; all information and documents generated, received or recorded by electronic system would be admissible.


Payment System Electronic Funds Transfer Act 2007 has been enacted and published in finance bill 2007, this act facilitates and provides a complete mechanism for transfer of funds through electronic mode. 

The Anti Money Laundering act 2010 is passed in 2010 by the parliament which prohibit every kind money laundering through physical or electronic modes. The punishments provided for money laundering are exemplary in AMLA 2010.

Recently parliament has passed Investigation for Fair trial Act 2013 which focuses on interception and warrant and procedure to apprehend the cyber criminal through a proper method by the investigation agency. 

Giving applause to the efforts and labors of the government of Pakistan and especially to the people of Pakistan to have a complete and comprehensive code of cyber laws, all the global community shall try to evolve and develop a code of cyber laws with spirit and nature of uniform recognition at global level.



Sunday, 21 April 2013

Validated Cyber Law Terms


Validated Cyber Law Terms


“A virtual approach defining the cyber world beyond the boundaries of nation states enforcement of cyber laws uniformly accepted”, (S J Tubrazy)
enforcement of cyber laws call cyber jurisdiction

“Assets or goods in digital form worth to be value simply call virtual property”, (S JTubrazy)
digital assets call virtual property

Conduct or attempt to conduct crimes by criminals for achieving their illegal ends using electronic devices with skill is called cyber crime”, (S J Tubrazy)
conducting crime using computer or electronic device is cyber crime
A will or testament in traditional legal form of will with its digital unique proved identification is a legal declaration by a person, to manage his physical or virtual estate for the online or physical transfer of his property at death wether physical or virtual. S JTubrazy
cyberwill will or testament
A digital will is will in digital contents equivalent to written will, seized by a lawyer. S JTubrazy
A digital will is in digital contents
Computer processor's power derived from the quantum physics properties of atoms or nuclei that allow them to work together as quantum bits commonly known as qubits is reffred as quantum computing.
Quantum Computing; Computer processor's power derived from the quantum physics properties of atoms
Multitude user’s interfaces which connect to the online value of an individual on internet.
online value of an individual is online assets
Certification Practice Statement is communal document with description of practices of Certification authority issuing, renewing, revoking and validating Digital / Electronic Certificates and for emphasizing to keep confidence on Certificates
Certification Practice Statement, communal document Certification, authority, issuing, renewing, revoking,validating, Electronic,

Electronic signatures a method which safe sanctity of electronic document and attribute the person who has full control over this electronic document, by using unique digital logarithm.
Electronic signatures, 100011001
Computer resources deliverable as services over internet is cloud computing.
cloud computing is computer resources deliver over internet
The digital system used for storage for digitized assets is digital storage.
storage for digitized assets is digital storage.
Value of set of digital assets is generally calls digital worth.
digital worth is value of digital assets or contents
value set digital assets worth 
by
 s j tubrazy Apr 12, 2013 add a video
The set of worth of digital assets or contents being placed upon by the user is digital value.
digital value is worth of digital assets
14. 
The virtual proprietary rights of digital assets belongs to someone is digital ownership.
digital assets belongs to someone is digital ownership
The right to transfer digital assets from one person to another is digital transfer of assets.
digital assets from one person to another is digital transfer of assets
Delivery of contents or value over the internet at specified destination calls digital delivery.
digital Delivery of contents or value over the internet
Online unique presence of user available across the world wide web.
Online unique presence of user is digital identity
Virtually connected network of interface of user over the internet is commonly known as digital connection
network of interface of user over the internet is commonly known as digital connection
The set of digital assets belong to user that comprise of a user digital worth.
Digital Inventory is set of digital assets of user
The virtual ownership of digital assets or value in cyberspace.
virtual ownership of digital assets is online property
A progressing virtual world of global computers having networks of interdependent information technology infrastructures, telecommunications networks and computer processing systems in which online interactions takes place.
Cyberspace is a progressing virtual world of global computers having networks.
A person including intelligent programs that uses computer or internet services often has online unique user account.
Online User often has online unique user account.