:: ZAFAR & ASSOCIATES

Dr. Ilyas Zafar

DR. ILYAS ZAFAR

Founder & Sr. Partner

South Asia

Rana Munir Hussain

MUNIR HUSSAIN

Senior Partner

Lahore, Pakistan

Shagufta Jabeen

SHAGUFTA JABEEN

Business Law Consultant

Durban, South Africa

Verda Hussain

VERDA HUSSAIN

Business Law Consultant

Karachi, Pakistan

Waseem Akram Bhatti

WASEEM AKRAM

Business Law Consultant

Manchester, UK

Imran-ul-Haq Khan

IMRAN-UL-HAQ KHAN

Senior Litigator

Quetta, Pakistan

M. Ilyas Mian

M. ILYAS MIAN

Senior Litigator

Rawalpindi, Pakistan

M. Nadeem Qureshi

M. NADEEM QURESHI

Senior Litigator

Karachi, Pakistan

Zafar-ullah Khan Khakhwani

ZAFAR KHAKHWANI

Senior Litigator

Multan, Pakistan

Waseem Ashfaq

WASEEM ASHFAQ

Chartered Accountant

Lahore, Pakistan

Muneeb Zafar

MUNEEB ZAFAR

Business Law Consultant

Lahore, Pakistan

Syed Nasir Ali Gilani

NASIR ALI GILANI

Business Law Associate

Lahore, Pakistan

Iram Fatima

IRAM FATIMA

Business Law Associate

Lahore, Pakistan

Sana Hassan Tariq

SANA HASSAN TARIQ

Business Law Associate

Lahore, Pakistan

:: Core Competencies

  • Prevention of Electronic Crimes
  • Cross-border Transactions
  • Telecommunications
  • Broadcasting
  • Technology Practice
  • E-Commerce
  • Regulatory and Licensing
  • Contract Negotiations
  • Voice Telephony

:: Connect With Us

google plus facebook LinkedIn twitter RSS

:: E-Commerce & Cyber Law in Pakistan

Starting Business Pakistan

Here you may find information about e-commerce & cyber law in Pakistan. Our dedicated team of professional lawyers best assists their clients in understanding e-commerce and cyber law in Pakistan.

If your goal is to protect your commercial interests online or to design, implement, or revise your online marketing strategy, ZA-LLP's attorneys are a valuable resource for the protection of your website or internet based business. We provide your business with the tools and know-how to protect your property rights and information by designing and implementing best business practices that will ward-off potential litigation while making your online business more valuable.

At ZA-LLP, we are experts in internet law and e-commerce. Our attorneys have written extensively, lectured and taught on the legal and commercial issues involving both areas. We represent regional ISPs, website and online content developers, hosts, distributors and other electronic commerce enterprises. We also counsel more traditional companies on the legal and policy issues associated with their use both of existing and new technologies. We have consulted on electronic commercial transactions, online content management, data security, and information privacy issues for owners, operators and users of proprietary data networks (e.g., intranets and extranets). We also counsel on the commercial, legal and regulatory aspects of the internet and electronic business, including preparation of vendor and site licensing agreements and providing advice on linking, framing and other online content management issues.

We counsel technology businesses on the scope and applicability of competition and consumer protection laws to technology development, distribution and use. We seek to ensure that our clients' online standards development, and essential facilities management activities comply with these domestic and international laws. We also counsel on consumer protection requirements for online advertising, sales and marketing, and the management and use of personal consumer data.

:: Scope of Practice

Because we recognize that internet and e-commerce law impacts both high-tech companies and those that provide more traditional products and services, we provide all clients the opportunity to take advantage of our Internet Legal Audit. Each Audit is tailored to meet the client's specific business parameters and is designed to address many cutting-edge legal issues before they become significant business liabilities.

The firm’s services include:

  • Reviewing, negotiating and / or drafting a broad range of website agreements, contracts, business policies, disclaimers, and disclosures;

  • Monitoring and evaluating your web-based business operations and website content to ensure compliance with industry best-practices;

  • Organising and monetising your e-commerce activities;

  • Counseling regarding compliance with e-commerce, privacy & data security, intellectual property, user-generated content safe-harbors, and consumer protection directives, as well as the international expansion of Internet-based businesses and affiliate programmes;

  • Designing and documenting adequate data protection and security measures that protect both your own and your consumers’ privacy and security, including database systems analysis; and

  • Strategic advice and risk-analysis.

In addition to transactional assistance, we are available for internet and e-commerce business litigation matters involving: domain name and cybersquatting disputes, trademark, copyright, patent, trade secret and proprietary information disputes, breach of contract claims; antitrust and unfair competition disputes; privacy disputes and false advertising disputes.

:: Featured Domains Associated With Business Law Practice

Commercial Law

Company Law

Contract Enforcement

Commercial Law Company Law Contract Enforcement

Our aim is to always to add value to our clients' businesses by assisting them to achieve their commercial objectives in the most practical way. Click here to find more.

Our clients include companies of all sizes in many industries and the institutions that finance their operations and growth. Click here to find more.

We focus on helping clients maintain their current and long-term competitive positions, by advising them at every step in contracting process. Click here to find more.

Corporate Governance

Corporate Law

E-Commerce

Corporate Governance Corporate Law E-Commerce

Corporate governance is a term that refers broadly to the rules, processes, or laws by which businesses are operated, regulated, and controlled. Click here to find more.

Our range of corporate legal services will enable you to safely implement a variety of corporate law transactions in a cost-effective manner. Click here to find more.

There are a number of E-commerce laws and guidelines to follow when operating in the E-commerce world. Click here to find more.

Franchising

Investment Law

Joint Ventures

Franchising Investment Law Joint Ventures

We've gained substantial expertise in helping companies with strong unit economics use franchising as a means of exploiting market opportunities. Click here to find more.

The investors who want to make study for unforeseen problems may contact us for our reports on any project of their choice. Click here to find more.

A Joint Venture is a legal organization that takes the form of a short term partnership in which the persons jointly undertake a transaction for mutual profit. Click here to find more.

Computer Law in Pakistan

Computer law is a body of law that has been created for the acquisition, license, development, and usage of computers and related hardware as well as other forms of technology. Computer law protects buyers and sellers when entering into purchasing or leasing agreements as well as specifying the rights and obligations of the parties when entering into development or licensing agreements. Computer law allows for the ever changing world of technology to become more predictable and secure.

We've the expertise in clarification of contractual rights and obligations, development and licensing agreements, licensing of technology owned by third parties, Protection of ownership rights in high technology, purchasing, leasing and service agreements, requests for proposal or quotation and statement of work.

ZA-LLP's internationally recognized telecommunications group, based in the firm's Lahore, Karachi and Islamabad offices, advises on a broad range of telecommunications-related commercial, regulatory, and infrastructure matters, particularly those with an international dimension:

  • Regulations;

  • Transactions;

  • Disputes;

  • Service Providers;

  • Equipment Suppliers;

  • Government and Public Telecom Operators;

  • Privatization;

Our telecommunications lawyers have an in-depth understanding of the commercial and technological aspects of the telecommunications industry and continually monitor market developments in Pakistan. We offer our clients pragmatic and sector-specific legal advice in order to successfully meet the challenges of today's rapidly developing international telecommunications industry.

The attorneys at ZA-LLP provide a full spectrum of telecommunications advice, regarding regulation, transactions, and disputes in a variety of sectors, including wireline and broadband, wireless, satellite, and Internet and e-commerce, as well as information technology. Our clients include service providers, equipment suppliers, electric utilities, and governmental bodies.

The full capabilities of our firm—with more than 250 attorneys in several offices—are available to support our telecommunications clients. Our attorneys focus on other aspects of technology law, including intellectual property litigation, patent and technology protection, copyright and content protection, trademark and identity protection, unfair competition, and life sciences. Our attorneys also provide the traditional legal support often needed by telecom companies: corporate, litigation, employment, tax, antitrust, international trade, and property.

The ZA-LLP eTeam is a leading international technology legal group representing information technology, electronic commerce, financial services, telecommunications, and other technology-intensive companies on cutting-edge legal issues. With an integrated team based in our Lahore, Karachi, Islamabad, Peshawar and Quetta offices, we bring to bear critical technology, regulatory, corporate, and litigation experience with tax, anti-trust, and other capabilities, to ensure efficient, cost-effective representation.

Our IT and IP Group prides itself in keeping up to date with the latest developments in all areas of IT and the licensing and protection of IP. More importantly, the Group prides itself in understanding how Technology Law, IT Law, Commercial Law and global legal issues have to be integrated in order to provide a comprehensive solution.

Our focus on strategic issues and our familiarity with various industries allows us to assist our clients in negotiating terms that protect them throughout the lending relationship.

Cyber Crime Laws

There is no doubt that Information Technology has intruded in our life in such a manner and extent that presently nobody can imagine a well-facilitated and luxury life without it. Computers, Scanners, World Wide Web Sites, Intranet and Internet Electronic Messaging and Mails, Electronic Data Transfers and Exchange of Information, Electronic Commerce and Banking System, all are necessities of life based on or using different components based on the use of Information Technology, which are abundantly in use in our domestic, social and business life. Mobile phones, laptops and latest computers are using Digital Data Bases for different purposes. Similarly, Digital Data Bases are accessible through Intranet and Internet at International level without any problem or loss of time.

The dawning of Information Technology age has facilitated our life but at the same time it has given birth to different complex problems like its regulatory matters and use of the Information Technology for criminal and other heinous purposes by different anti-social elements. Regulatory matters regarding use of Information Technology require legal frame works and laws. Similarly, misuse and anti-social elements that are causing fear and disturbance not only in personal lives but also in the smooth of social and commercial life, as a whole.

However, as the use of Information Technology has no boundaries, thus it is very difficult to design its regulatory regimes and regulatory laws to determine strict liability in case wrong and criminal application of different Software, Information Technology techniques and other related matters. Presently, all the nations and countries are facing the same problems for establishing effective regulatory regimes and legal systems for proper benefit of Information Technology within certain parameters which are beneficial to the society.

In Pakistan, in addition to the Pakistan Telecommunication (Re-Organization) Act, 1996, (Act XVII of 1996), The Electronic Transactions Ordinance, 2002 (Ordinance LI of 2002) is the first law to regulate different aspects and uses of Information Technology but the same has not solved all the problems. Thereafter, other laws have been made and promulgated to address different issues relating to Information Technology and its use for different purposes. After promulgation and enforcement of these laws, there was a need to compile these laws with case laws developed during this period for the benefit of legal professionals, academicians, researchers and general public.

It is also to point out that the Pakistan Telecommunication (Re- organization) Act, 1996 (XVII of 1996), is the basic legal framework given by the Parliament to achieve the ambitious goals in the telecommunication and Information Technology Sector in Pakistan providing different key organizations including the Pakistan Telecommunication Authority. Pakistan Telecommunication Authority has made a lot of efforts to regulate each and every aspect of the telecommunication sector in Pakistan and to meet the internationally posed challenges of competition and transparency. However, the Pakistan Telecommunication (Re-organization) Act, (XVII of 1996), The Telegraph Act, 1885 (Act XIII of 1885), and the Wireless Telegraphy Act, 1993 (Act XVII of 1933), have been introduced in different regimes. Prevention of Electronic Crimes Ordinance, 2007 (Ordinance LXXII of 2007) relating to Telecommunication Sector in Pakistan covering all aspects regarding telecommunications and Information Technology in their legal, national and international perspectives which may be consulted and used if you feel necessary and suitable to boost up your knowledge and information about basic regulatory regimes and frameworks in the telecommunications and information fields.

The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information.

Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are inadequate will become increasingly less able to compete in the new economy. As cyber crime increasingly breaches national borders, nations perceived as havens run the risk of having their electronic messages blocked by the network. National Governments should examine their current statutes to determine whether they are sufficient to combat the kinds of crimes. Where gaps exist, Governments should draw on best practices from other countries and work closely with industry to enact enforceable legal protections against these new crimes.

What’s Different about Cyber Crime?

Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations’ security. Headlines of cyber attacks command our attention with increasing frequency. According to the Computer Emergency Response Team Coordination Center (CERT/CC), the number of reported incidences of security breaches in the first three quarters of 2000 has risen by 54 percent over the total number of reported incidences in 1999. Moreover, countless instances of illegal access and damage around the world remain unreported, as victims fear the exposure of vulnerabilities, the potential for Copycat Crimes, and the loss of public confidence. Cyber crimes—harmful acts committed from against a computer or network—differ from most terrestrial crimes in four ways. They are easy to learn how to commit; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present in it; and they are often not clearly illegal.

The laws of most countries do not clearly prohibit cyber crimes. Existing terrestrial laws against physical acts of trespass or breaking and entering often do not cover their “virtual” counterparts. Web pages such as the E-Commerce sites recently hit by widespread, distributed denial of service attacks may not be covered by outdated laws as protected forms of property. New kinds of crimes can fall between the cracks, as the Philippines learned when it attempted to prosecute the perpetrator of the May 2000 Love Bug virus, which caused billions of dollars of damage worldwide.

Effective Law Enforcement is complicated by the transnational nature of cyberspace. Mechanisms of cooperation across national borders to solve and prosecute crimes are complex and slow. Cyber criminals can defy the conventional jurisdictional realms of sovereign nations, originating an attack from almost any computer in the world, passing it across multiple national boundaries, or designing attacks that appear to be originating from foreign sources. Such techniques dramatically increase both the technical and legal complexities of investigating and prosecuting cyber crimes.

Six weeks after the Love Bug attack, the Philippines outlawed most computer crimes as part of a comprehensive e-commerce statute. In order to prevent a repeat of the catastrophe that prompted this action, however, the future of the networked world demands a more proactive approach, whereby Governments, Industry, and the Public Work together to devise enforceable laws that will effectively deter all but the most determined cyber criminals.

Poor Information Security Reduces the Competitiveness of Nations

In considering nations’ information security, the evaluated public trust in the security of information processed and stored on networks in each country. In this context, information security included: an assessment of the strength of legal protections and progress in protecting intellectual property rights, especially for software; the extent of efforts to protect electronic privacy; and the strength and effectiveness of the legal framework to authorize digital signatures. The existence of legal frameworks to prosecute cyber criminals, for a predictable environment of strong deterrence for computer crime is critical to the effective protection of valuable information and networks.

Although several countries, particularly in Europe and Asia, were found to have addressed a number of these broader information security factors, few countries were able to demonstrate that adequate legal measures had been taken to ensure that perpetrators of cyber crime would be held accountable for their actions. Overall, nearly half of the countries were rated as needing substantial improvement in information security. In addition, only a small fraction of countries needing substantial improvement indicated that progress was currently underway.

Outdated laws and regulations and weak enforcement mechanisms for protecting networked information, create an inhospitable environment in which to conduct e-business within a country and across national boundaries. Inadequate legal protection of digital information can create barriers to its exchange and stunt the growth of e-commerce. As e-business expands globally, the need for strong and consistent means to protect networked information will grow.

The Cyber Crime Laws of Nations

In the wake of the Philippines inability to prosecute the student responsible for the virus, McConnell International surveyed its global network of Information Technology policy officials to determine the state of cyber security laws around the world. Countries were asked to provide laws that would be used to prosecute criminal acts involving both private and public sector computers.

Over fifty national governments responded with recent pieces of legislation, copies of updated statutes, draft legislation or statements that no concrete course of action has been planned to respond to a cyber attack on the public or private sector. Countries were provided the opportunity to review the presentation of the results in draft, and this report reflects their comments.

Countries that provided legislation were evaluated to determine whether their criminal statutes had been extended into cyberspace to cover ten different types of cyber crime in four categories: Data-Related Crimes including interception, modification and theft; Network-Related Crimes including interference and sabotage; Crimes of Access including hacking and virus distribution and Associated Computer-Related Crimes including aiding and abetting cyber criminals, computer fraud and computer forgery.

Thirty-three of the countries surveyed have not yet updated their laws to address any type of cyber crime. Of the remaining countries, nine have enacted legislation to address five or fewer types of cyber crime, and ten have updated their laws to prosecute against six or more of the ten types of cyber crime.

Countries with fully, substantially or partially updated laws, in Canada, successful prosecutions of computer-related fraud have effectively updated the law. Canada also provides an example of a phenomenon in many countries—that law enforcement officials have strong confidence that existing laws provide sufficient coverage against the “computer-related crimes” of aiding and abetting cyber crimes, and computer-related fraud and forgery.

Even among these countries, crimes are not treated uniformly. In some, unauthorized access is a crime only if harmful intent is present; in others, data theft is a crime only if the data relates specifically to an individual’s religion or health, or if the intent is to defraud. Laws tend to be biased in favor of protecting public sector computers.

Discrepancies exist even within countries. For example, in September 2000, the Australian Democratic Party criticized the South Australian (state) government for creating a haven for cyber criminals by not having updated its laws to combat computer-based crime in accordance with the laws of Australia’s other states. Moreover, there is little uniformity across nations in terms of which types of crimes have been addressed through updated statutes.

The penalties provided in updated criminal statutes vary widely. Mauritius, the Philippines, and the United States have stronger penalties than many other countries for convictions of covered cyber crimes.

Finally, of the 33 countries with no updated laws in place, 13 indicated that progress toward the adoption of updated legislation to combat cyber crime is underway. Seven of these 13 countries are in Africa or the Middle East, indicating that, although these regions have not yet adequately addressed the issue of cyber crime, many countries is aware that action is needed.

Law Is Only Part of the Answer

Extending the rule of law into cyberspace is a critical step to create a trustworthy environment for people and businesses. Because that extension remains a work in progress, organizations today must first and foremost defend their own systems and information from attack, be it from outsiders or from within. They may rely only secondarily on the deterrence that effective law enforcement can provide.

Conclusion

1. Reliance on terrestrial laws is an untested approach

Despite the progress being made in many countries, most countries still rely on standard terrestrial law to prosecute cyber crimes. The majority of countries are relying on archaic statutes that predate the birth of cyberspace and have not yet been tested in court.

2. Weak penalties limit deterrence

The weak penalties in most updated criminal statutes provide limited deterrence for crimes that can have large-scale economic and social effects.

3. Self-protection remains the first line of defense

The general weakness of statutes increases the importance of private sector efforts to develop and adopt strong and efficient technical solutions and management practices for information security.

4. A global patchwork of laws creates little certainty

Little consensus exists among countries regarding exactly which crimes need to be legislated against, even in the 19 countries that have already taken steps to address cyber crimes. In the networked world, no island is an island. Unless crimes are defined in a similar manner across jurisdictions, coordinated efforts by law enforcement officials to combat cyber crime will be complicated.

5. A model approach is needed

Most countries, particularly those in the developing world, are seeking a model to follow. These countries recognize the importance of outlawing malicious computer-related acts in a timely manner in order to promote a secure environment for e-commerce. But few have the legal and technical resources necessary to address the complexities of adapting terrestrial criminal statutes to cyberspace. A coordinated, public-private partnership to produce a model approach can help eliminate the potential danger from the inadvertent creation of cyber crime havens.

Recommendations

The weak state of global legal protections against cyber crime suggests three kinds of action.

1. Firms should secure their networked information

Laws to enforce property rights work only when property owners take reasonable steps to protect their property in the first place. As one observer has noted, if homeowners failed to buy locks for their front doors, should towns solve the problem by passing more laws or hiring more police? Even where laws are adequate, firms dependent on the network must make their own information and systems secure. And where enforceable laws are months or years away, as in most countries, this responsibility is even more significant.

2. Governments should assure that their laws apply to cyber crimes

National governments remain the dominant authority for regulating criminal behavior in most places in the world. One nation already has struggled from, and ultimately improved, its legal authority after a confrontation with the unique challenges presented by cyber crime. It is crucial that other nations profit from this lesson and examine their current laws to discern whether they are composed in a technologically neutral manner that would not exclude the prosecution of cyber criminals. In many cases, nations will find that current laws ought to be updated. Enactment of enforceable computer crime laws that also respect the rights of individuals are an essential next step in the battle against this emerging threat.

3. Firms, governments, and civil society should work cooperatively to strengthen legal frameworks for cyber security

To be prosecuted across a border, an act must be a crime in each jurisdiction. Thus, while local legal traditions must be respected, nations must define cyber crimes in a similar manner. An important effort to craft a model approach is underway in the Council of Europe. The Council is crafting an international Convention on Cyber Crime. The Convention addresses Illegal Access, Illegal Interception, Data Interference, System Interference, Computer-related Forgery, Computer-related Fraud, and the Aiding and Abetting of these crimes. It also addresses investigational matters related to jurisdiction, extradition, the interception of communications and the production and preservation of data. Finally, it promotes cooperation among law enforcement officials across national borders.

Late in its process, the Council began to consider the views of affected industry and civil society. This process is making the Council’s product more realistic, practical, efficient, balanced and respectful of due process that protects individual rights. At this point, most observers support provisions to improve law enforcement cooperation across borders. However, industry, through the World Information Technology and Services Alliance argues that the requirements on service providers to monitor communications and to provide assistance to investigators, as outlined in the Draft Convention, would be unduly burdensome and expensive. Another provision considered objectionable could criminalize the creation and use of intrusive software, or hacking programs, which are designed for legitimate security testing purposes. This action could stifle the advances in technology vital to keep up with evolving cyber threats. Privacy and Human Rights Advocates object to the Draft Convention’s lack of procedural safeguards and due process to protect the rights of individuals, and to the possibility that the ensuing national laws would effectively place restrictions on privacy, anonymity and encryption.

Types of Cyber Crimes

  • Theft of Telecommunications Services

  • Communications in furtherance of Criminal Conspiracies

  • Telecommunications Piracy

  • Dissemination of Offensive Materials

  • Electronic Money Laundering and Tax Evasion

  • Electronic Vandalism, Terrorism and Extortion

  • Sales and Investment Fraud

  • Illegal Interception of Telecommunications

  • Eelectronic Funds Transfer Fraud

Problem Areas

  • Telecommunications

  • Electronic Vandalism, Terrorism and Extortion

  • Stealing Telecommunications Services

  • Telecommunications Piracy

  • Pornography and other Offensive Material

  • Telemarketing Fraud

  • Electronic Fund Transfer Crime

  • Electronic Money Laundering

LAWS RELATING TO CYBER CRIME IN PAKISTAN

The Electronic Transactions Ordinance, 2002

The purpose of this ordinance is to recognize and facilitate Documents, Records, Information, Communications and Transactions in electronic form, and to provide for the accreditation of Certification Service Providers.

Defendant, according to sales contract, was to supply 1,600 M.T. steel rods, but it supplied only 500 M.T. of steel rods. Plaintiff filed suit claiming damages against defendant in respect of balance 1,100 M.T. of steel rods. Defendant filed application for stay of plaintiff’s suit seeking direction from the Court to order plaintiff to refer the dispute to arbitration as the parties by the very said contract had agreed to settle all disputes by arbitration. Claim of plaintiff was that sale transaction was based on pro forma invoice, purchase order and correspondence by faxes and E-mails and that plaintiff had never entered into any sales contract containing an agreement to arbitration.

In a paragraph of the Order, it has been observed that “The learned counsel for the Plaintiff has also argued that the Sales Contract has not been signed and therefore is not enforceable. As discussed above, the Defendant has established that sales contract was electronically sent to the plaintiff who acted on the same and opened a Letter of Credit in accordance with its terms and conditions, which also contained an arbitration clause. The submissions of the learned Advocate for the Plaintiff have no force in view of the provisions of the Electronics Transactions Ordinance, 2002 (Ordinance LI of 2002) – It is further to be pointed out that after promulgation of Electronic Transactions Ordinance, 2002, the Qanun-e- Shahadat, 1984 (P.O. 10 of 1984) stands amended in terms of section 29 of the Ordinance, 2002 – By the said amendments various definitions of the Qanun-e-Shahadat Order have been changed and specifically by addition of section 2(e) in the said Order all the documents produced or generated through modern devices have been given evidentiary value...

It is further observed in Paragraph 11 of the Order thereof that in view of the aforesaid provisions of the Electronic Transactions Ordinance 2002, as well as amendment in the Qanun-e-Shahadat Order, it appears that it is no longer necessary for electronically transmitted documents, which include Commercial / Banking Contracts, to be manually signed or for the same to be attested by any witness.

The Payment Systems and Electronic Fund Transfers Act, 2007

The purpose of the Act is to provide regulatory framework for payment systems and electronic fund transfers. “Electronic fund” means the money transferred through an electronic terminal, ATM, telephone instrument, computer, magnetic medium or any other electronic device to order, instruct or authorize Banking Company, a Financial Institution or any other Company or Person to debit and credit an account. The Act gives powers to State Bank of Pakistan that if it finds it necessary in the public interest, it can designate a “Payment System” (means a system relating to payment of instruments, or transfer, clearing, payment settlement, supervision, regulation or infrastructure etc.) as a Designated Payment System by a written order. State Bank can revoke the designation of payment system.

It also deals with Payment Systems, Real Time Gross Settlement System (RTGS), Operator Arrangement, Clearing and other obligations, Documentation of Transfers, Notification of Error, Liability of parties and penalties etc.

The Prevention of Electronic Crimes Ordinance, 2007

Aim of the Ordinance is to make provision for prevention of Electronic Crimes. Prevention of any action directed against the confidentiality, integrity and availability of electronic system, networks and data as well as the misuse of such system, networks and data by providing punishment of such actions and to provide mechanism for investigation, prosecution and trial of offences and the other matters connected thereto.

It deals with Criminal access, Criminal data Access, Data damage, System damage, Electronic fraud, Electronic forgery, Misuse of Electronic System or Electronic Device, Unauthorized access to Code, Misuse of encryption, Malicious code, Cyber stalking, Spamming, Spoofing, Unauthorized Interception, Cyber Terrorism it also deals with their punishments, abetting, aiding and attempts to commit offences, prosecution and trial of offences, establishment of investigation and prosecution agencies etc.

The Pakistan Telecommunication (Re-Organization) Act, 1996

The aim of the Act is the re-organization of telecommunication system. It provides for re-organization of telecommunication system in Pakistan by establishing the Pakistan Telecommunication Authority, the Frequency Allocation Board, National Telecommunication Corporation and the Pakistan Telecommunication Employees Trust, Regulation of Telecommunication Industry, Transfer of Telecommunication Services to private sector and matters connected and incidental thereto.

It elaborates the powers, functions and responsibilities of the Pakistan Telecommunication Authority.

Cognizance of the offences punishable under the Pakistan Telecommunication (Re-Organization) Act, 1996, could only be taken by the Court on a complaint in writing by an officer authorized by the Authority or the Board.

The Telegraph Act, 1885

The Act deals with telegraphs in Pakistan. The Federal Government may grant a license to any person that he may establish, maintain or work a telegraph within any part of Pakistan. The Government and the telegraph officer both shall not responsible for any loss or damage which may occur in consequence of failure to the receipt, transmission or delivery of any message unless the telegraph officer is negligent in performing his duties.

The Wireless Telegraphy Act, 1933

Wireless Telegraphy Act deals with the possession of wireless telegraphy apparatus. It prohibits the possession of wireless telegraph apparatus without a license. The Federal Government has power to exempt any person or class of persons from the operation of this Act by making rules on it either generally or on conditions. It also prescribes offences and penalties in case of violation of this Act.

The Anti-Money Laundering Ordinance, 2007

The Ordinance is made for prevention of money laundering. A person shall be guilty of the offence of money laundering if he acquires, converts, possesses or transfers property, knowing or having reason to believe that such property is proceeds of crime, or renders assistance to another person for the acquisition, conversion, possession or transfer of, or for concealing or disguising the true nature, origin, location, disposition, movement or ownership of property, knowing or having reason to believe that such property is proceeds of crime. The punishment for money laundering shall be one year but may extend to ten years according to the gravity of the offence and he shall also liable to fine which may extend to one million rupees and shall also be liable to forfeiture of property involved in the money laundering.

ZA–LLP deal in all kinds of Cyber Crime Laws including Anti-Money Laundering Ordinance, 2007. If you have any queries please do not feel hesitate to contact us.

[ Home ] [ About ] [ Practice ] [ Profiles ] [ Clients ] [ Verdict ] [ Careers ] [ Contact ] [ Disclaimer ]
(C) Copyright 1999-2014 ZAFAR & ASSOCIATES - LLP - All rights reserved.