AGL 39.58 Decreased By ▼ -0.42 (-1.05%)
AIRLINK 131.22 Increased By ▲ 2.16 (1.67%)
BOP 6.81 Increased By ▲ 0.06 (0.89%)
CNERGY 4.71 Increased By ▲ 0.22 (4.9%)
DCL 8.44 Decreased By ▼ -0.11 (-1.29%)
DFML 41.47 Increased By ▲ 0.65 (1.59%)
DGKC 82.09 Increased By ▲ 1.13 (1.4%)
FCCL 33.10 Increased By ▲ 0.33 (1.01%)
FFBL 72.87 Decreased By ▼ -1.56 (-2.1%)
FFL 12.26 Increased By ▲ 0.52 (4.43%)
HUBC 110.74 Increased By ▲ 1.16 (1.06%)
HUMNL 14.51 Increased By ▲ 0.76 (5.53%)
KEL 5.19 Decreased By ▼ -0.12 (-2.26%)
KOSM 7.61 Decreased By ▼ -0.11 (-1.42%)
MLCF 38.90 Increased By ▲ 0.30 (0.78%)
NBP 64.01 Increased By ▲ 0.50 (0.79%)
OGDC 192.82 Decreased By ▼ -1.87 (-0.96%)
PAEL 25.68 Decreased By ▼ -0.03 (-0.12%)
PIBTL 7.34 Decreased By ▼ -0.05 (-0.68%)
PPL 154.07 Decreased By ▼ -1.38 (-0.89%)
PRL 25.83 Increased By ▲ 0.04 (0.16%)
PTC 17.81 Increased By ▲ 0.31 (1.77%)
SEARL 82.30 Increased By ▲ 3.65 (4.64%)
TELE 7.76 Decreased By ▼ -0.10 (-1.27%)
TOMCL 33.46 Decreased By ▼ -0.27 (-0.8%)
TPLP 8.49 Increased By ▲ 0.09 (1.07%)
TREET 16.62 Increased By ▲ 0.35 (2.15%)
TRG 57.40 Decreased By ▼ -0.82 (-1.41%)
UNITY 27.51 Increased By ▲ 0.02 (0.07%)
WTL 1.37 Decreased By ▼ -0.02 (-1.44%)
BR100 10,504 Increased By 59.3 (0.57%)
BR30 31,226 Increased By 36.9 (0.12%)
KSE100 98,080 Increased By 281.6 (0.29%)
KSE30 30,559 Increased By 78 (0.26%)

The word 'cyber crimes' usually raise eyebrows among the computer users, IT experts and especially among the countrymen where majority of the people are not familiar with the relevant laws.
The number of Internet users is growing very rapidly worldwide. Estimate shows that 70 percent information is now digital and there are about 800 billion pages on the web. This vast invasion creates potent threats and vulnerabilities to cyber crime.
In our country, cyber crime laws are wide ranging which required to be implemented rigorously. The Electronic Transaction Ordinance 2002 and Prevention of Electronic Crimes Ordinance, 2007 are some of the steps taken to control this menace.
The latest ordinance is aimed at fighting cyber crimes under which accused could be jailed for more than seven years or fined up to one million. Under the Ordinance, a tribunal with the name of Information and Communication Technologies would hear cases of crimes registered under cyber crimes.
"As soon as possible after the commencement of this ordinance, the federal government shall, by notification in the official gazette, constitute the Information and Communication Technologies Tribunal whose principal seat shall be Islamabad," the Ordinance says.
The tribunal would work under section 193 and 228 of Pakistan Penal Code 1960. The tribunal would have the status of a court and will work under section 480 and 482 of Pakistan Penal Code. The tribunal would comprise seven members, headed by a Chairman with principal seat at Islamabad.
The Chairman may constitute Benches of the Tribunal and unless otherwise directed by him a Bench will consists not less than two members. A Bench will exercise such powers and discharge such functions as may be prescribed with at least one Bench in each province.
The ordinance, while carrying 18 different offenses, will be effective in curbing cyber-related crimes. According to the text of the Ordinance, accessing any electronic system or electronic devices without permission would legally be a crime.
Similarly, accessing, destroying, hacking and sabotaging any criminal data set up by any organisation or the government, or committing a fraud using an electronic system or Internet, or making unauthorised changes, or using someone else's code or password to access information, or to harass anyone using Internet, or to transmit immoral matter or images, or using electronic system, device or Internet, or to participate in a terrorist or destructive activity are all crimes.
Before the promulgation of the new ordinance, Federal Investigation Agency dealt with fraud and cyber crime under the Electronic Transaction Ordinance, 2002. It was a reporting centre for all types of cyber crimes and provided necessary technical support in making systems secure.
It provides timely warning of cyber threats to all concerned and advises on recovery techniques after the actual cyber attacks. But ignorance of the intricacies of information technology and the related laws usually lead to susceptible misinterpretation.
For example, online transactions are common phenomenon all around the world, which is imperative for the companies to have foolproof security.
An IT expert Kaneez Akhtar said: "Security flaws or vulnerabilities in software should be the first responsibility of a software developer."
But ironical, the end receivers are the users who have to endure mental agony and financial loss.
It is the joint responsibility of all stakeholders especially the cyber business companies to co-ordinate with each other and help eradicate this menace.
"Co-ordination is a must for all the people concerned because individual efforts would not bring that respite required in the country," Jabar Baloch, an executive director of IT company in G-8 commented.

Copyright Associated Press of Pakistan, 2008

Comments

Comments are closed.