(As Passed by The National Assembly) A Bill: To Make Provisions For Prevention of Electronic Crimes
(As Passed by The National Assembly) A Bill: To Make Provisions For Prevention of Electronic Crimes
(As Passed by The National Assembly) A Bill: To Make Provisions For Prevention of Electronic Crimes
BILL
CHAPTER I
PRELIMINARY
1
(a) “act” includes_
2
(h) “content data” means any representation of fact,
information or concept for processing in an information
system including source code or a program suitable to cause
an information system to perform a function;
3
(i) physical device or article;
(ii) any electronic or virtual tool that is not in physical
form;
(iii) a password, access code or similar data, in electronic
or other form, by which the whole or any part of an
information system is capable of being accessed; or
(iv) automated, self-executing, adaptive or autonomous
devices, programs or information systems;
5
(zd) “traffic data” includes data relating to a communication
indicating its origin, destination, route, time, size, duration
or type of service;
(2) Unless the context provides otherwise, any other expression used
in this Act or rules made thereunder but not defined in this Act, shall have
the same meanings assigned to the expressions in the Pakistan Penal Code,
1860 (Act XLV of 1860), the Code of Criminal Procedure, 1898 (Act V of 1898)
and the Qanoon-e-Shahadat Order, 1984 (P.O.No.X of 1984), as the case may
be.
CHAPTER II
6
4. Unauthorized copying or transmission of data.- Whoever
with dishonest intention and without authorization copies or otherwise
transmits or causes to be transmitted any data shall be punished with
imprisonment for a term which may extend to six months, or with fine which
may extend to one hundred thousand rupees or with both.
7
Explanation.- “glorification” includes depiction of any form of
praise or celebration in a desirable manner.
12. Electronic fraud.- Whoever with the intent for wrongful gain
interferes with or uses any information system, device or data or induces any
person to enter into a relationship or deceives any person, which act or
omission is likely to cause damage or harm to that person or any other person
shall be punished with imprisonment for a term which may extend to two
years or with fine which may extend to ten million rupees or with both.
8
13. Making, obtaining, or supplying device for use in offence.-
Whoever produces, makes, generates, adapts, exports, supplies, offers to
supply or imports for use any information system, data or device, with the
intent to be used or believing that it is primarily to be used to commit or to
assist in the commission of an offence under this Act shall, without prejudice
to any other liability that he may incur in this behalf, be punished with
imprisonment for a term which may extend to six months or with fine which
may extend to fifty thousand rupees or with both.
9
Explanation.__ A “unique device identifier” is an electronic
equipment identifier which is unique to a mobile wireless
communication device.
12
(2) Whoever commits the offence specified in sub-section (1) shall be
punished with imprisonment for a term which may extend to one year or with
fine which may extend to one million rupees or with both:
13
24. Legal recognition of offences committed in relation to
information system.- (1) Notwithstanding anything contained in any other
law for the time being in force, an offence under this Act or any other law
shall not be denied legal recognition and enforcement for the sole reason of
such offence being committed in relation to or through the use of an
information system.
25. Pakistan Penal Code, 1860 (Act XLV of 1860) to apply.- The
provisions of the Pakistan Penal Code, 1860 (Act XLV of 1860), to the extent
not inconsistent with anything provided in this Act, shall apply to the
offences provided in this Act.
CHAPTER III
(2) Unless otherwise provided for under this Act, the investigation
agency and the authorized officer shall in all matters follow the procedure
laid down in the Code to the extent that it is not inconsistent with any
provision of this Act.
14
Provided that the Federal Government or the Provincial Government
may, as the case may be, constitute one or more joint investigation teams
comprising of an authorized officer of the investigation agency and any other
law enforcement agency for investigation of an offence under this Act and any
other law for the time being in force.
(2) The service providers shall retain the traffic data under sub-
section (1) by fulfilling all the requirements of data retention and its
15
originality as provided under sections 5 and 6 of the Electronic Transactions
Ordinance, 2002 (LI of 2002).
(3) Any person who contravenes the provisions of this section shall
be punished with imprisonment for a term which may extend to six months
or with fine which may extend to five hundred thousand rupees or with both.
the Court may issue a warrant which shall authorize an officer of the
investigation agency, with such assistance as may be necessary, to enter the
specified place and to search the premises and any information system, data,
device or storage medium relevant to the offence identified in the application
and access, seize or similarly secure any information system, data, device or
other articles relevant to the offence identified in the application.
16
may pass such orders as deemed appropriate in the circumstances of
the case.
(c) obtain and copy only relevant data, use equipment to make
copies and obtain an intelligible output from an
information system;
18
(3) When seizing or securing any data or information system, the
authorized officer shall make all efforts to use technical measures to
maintain its integrity and chain of custody. The authorized officer shall seize
an information system, data, device or articles, in part or in whole, as a last
resort only in the event where it is not possible under the circumstances to
use such technical measures or where use of such technical measures by
themselves shall not be sufficient to maintain the integrity and chain of
custody of the data or information system being seized.
19
(3) If the authorized officer has reasons to believe that providing
forensic image of the data or information system to the owner under sub-
section (2) may prejudice–
(a) the investigation in connection with which the search was
carried out; or
(b) another ongoing investigation; or
(c) any criminal proceedings that are pending or that may be
brought in relation to any of those investigations,
the authorized officer shall, within seven days of receipt of the application
under sub-section (2), approach the Court for seeking an order not to provide
copy of the seized data or information system.
(4) The Court, upon receipt of an application from an authorized
officer under sub-section (3), may after recording reasons in writing pass such
order as deemed appropriate in the circumstances of the case.
(5) The costs associated with the exercise of rights under this section
shall be borne by the person exercising these rights.
34. Unlawful on-line content.-(1) The Authority shall have the
power to remove or block or issue directions for removal or blocking of access
to any information through any information system if it considers it
necessary in the interest of the glory of Islam or the integrity, security or
defence of Pakistan or any part thereof, public order, decency or morality, or
in relation to contempt of court or commission of or incitement to an offence
under this Act.
(3) Until such procedure and standards are prescribed under sub-
section (2), the Authority shall exercise its powers under this Act or any other
law for the time being in force in accordance with the directions issued by the
Federal Government not inconsistent with the provisions of this Act.
20
through omission or failure to act, and thereby facilitated, aided or abetted
the use by any person of any information system, service, application, online
platform or telecommunication system maintained, controlled or managed by
the service provider in connection with a contravention of this Act or rules
made thereunder or any other law for the time being in force:
Provided that the burden to prove that a service provider had specific
actual knowledge, and willful intent to proactively and positively participate
in any act that gave rise to any civil or criminal liability shall be upon the
person alleging such facts and no interim or final orders, or directions shall
be issued with respect to a service provider by any investigation agency or
Court unless such facts have so been proved and determined:
Provided further that such allegation and its proof shall clearly identify
with specificity the content, material or other aspect with respect to which
civil or criminal liability is claimed including but not limited to unique
identifiers such as the Account Identification (Account ID), Uniform Resource
Locator (URL), Top Level Domain (TLD), Internet Protocol Addresses (IP
Addresses), or other unique identifier and clearly state the statutory
provision and basis of the claim.
Provided that the service provider, for a period not exceeding fourteen
days, shall keep confidential and not disclose the existence of any
investigation or exercise of any power under this Act when a notice to this
effect is served upon it by an authorized officer, which period of
confidentiality may be extended beyond fourteen days if, on an application by
the authorized officer, the Court authorizes an extension for a further
specified period upon being satisfied that reasonable cause for such
extension exists.
(4) No service provider shall be liable under this Act, rules made
thereunder or any other law for the disclosure of any data or other
21
information that the service provider discloses only to the extent of the
provisions of this Act.
(4) The Court may also require the designated agency to keep
confidential the fact of the execution of any power provided for in this section
and any information relating to it.
(5) The application under sub-sections (1) and (2) shall in addition to
substantive grounds and reasons also-
(g) why, to achieve the purpose for which the warrant is being
applied, real time collection or recording by the person in
control of the information system is necessary.
23
such material or data, shall be punished with imprisonment for a term which
may extend to three years or with fine which may extend to one million
rupees or with both.
CHAPTER IV
INTERNATIONAL COOPERATION
(4) The Federal Government may send and answer requests for
mutual assistance, the execution of such requests or their transmission to the
authorities competent for their execution.
24
CHAPTER – V
(4) To the extent not inconsistent with this Act, the procedure laid
down under the Code and the Qanoon-e-Shahadat Order, 1984 (P.O.No.X of
1984), shall be followed.
25
Provided that the compensation awarded by the Court shall not
prejudice any right to a civil remedy for the recovery of damages beyond the
amount of compensation so awarded.
CHAPTER VI
PREVENTIVE MEASURES
26
(2) A computer emergency response team constituted under sub-
section (1) may comprise of technical experts of known expertise officers of
any intelligence or agency or any sub-set thereof.
CHAPTER VII
MISCELLANEOUS
47. Relation of the Act with other laws.- (1) The provisions of
this Act shall have effect not in derogation of the Pakistan Penal Code, 1860
(Act XLV of 1860), the Code of Criminal Procedure, 1898 (Act V of 1898), the
Qanoon-e-Shahadat Order, 1984 (P.O.No.X of 1984), the Protection of
Pakistan Act, 2014 (X of 2014) and the Investigation for Fair Trial Act, 2013
(I of 2013).
(2) Subject to sub-section (1), the provisions of this Act shall have
effect notwithstanding anything to the contrary contained in any other law
on the subject for the time being in force.
27
(e) manner to deal with the seized data, information system,
device or other articles;
(f) working of joint investigation teams;
(g) requirements for seeking permission of the Authority to
change, alter or re-programme unique device identifier of
any communication equipment by any person for research
or any other legitimate purpose;
(h) procedure for seeking appropriate orders of the Authority
for removal, destruction or blocking access to information
under this Act;
(i) constitution of computer emergency response team and the
standard operating procedure to be adopted by such team;
(j) appointment of designated agency having capability to
collect real time information;
(k) manner of coordination between the investigation agency
and other law enforcement and intelligence agencies
including designated agency;
(l) for management and oversight of the forensic laboratory;
(m) qualifications and trainings of the officers, experts and staff
of the forensic laboratory;
(n) powers, functions and responsibilities of the forensic
laboratory, its officers, experts and staff;
(o) standard operating procedures of the forensic laboratory to
interact with the investigation agency;
(p) manner of soliciting and extending international
cooperation; and
(q) matters connected or ancillary thereto.
28
50. Amendment of Electronic Transactions Ordinance, 2002
(LI of 2002) and pending proceedings._ (1) Sections 36 and 37 of the
Electronic Transactions Ordinance, 2002 (LI of 2002) are omitted.
29
STATEMENT OF OBJECTS AND REASONS
30
protections afforded to citizens under the Constitution. This can only be
achieved through strengthening existing protections and establishing new
safeguards especially against abuse of these new and intrusive powers. The
Bill also includes specific safeguards to balance against these intrusive and
extensive procedural powers in order to protect the privacy of citizens and
avoid abuse of the exercise of these powers.
31