Analyzing the Cyberspace Laws to Protect Data Privacy in Pakistan
DOI:
https://doi.org/10.26512/lstr.v13i2.35977Keywords:
Cyberspace Technology. Cybercrimes. Pakistani Laws. Analysis. Recommendations.Abstract
[Purpose] Cyberspace technology has become an unavoidable forum for communications, connections, and transactions. This phenomenon, however, led to cybercrimes and hi-tech crimes such as data leaking, stealing, blackmailing, digital fraud, bullying and hacking, and all this has put the cyberspace technology at risk and a great threat to the security and privacy of the people. In Pakistan, cybercrimes are on the rise and despite several laws had been published on the topic, the rate of cybercrimes is increasing every passing year. In this context, this study examines the existing regulatory and legal framework for data protection in Pakistan and to find out the major challenges in the way of application and enforcement mechanism.
[Methodology] The conceptual framework of the research answers the question on to what extent the existing laws and enforcement mechanism of Pakistan is effective in protecting the data and information in the cyberspace? It highlights the importance of cyberspace technology nowadays and addresses the global agenda to combat cybercrimes, analyzes the Pakistani laws on the protection of data and privacy in cyberspace, and identifies major challenges in the way of the enforcement mechanism. The study focuses on the cyberspace laws of Pakistan with reference to the cybercrimes from a national perspective.
[Findings] This paper asserts that there is sufficient protection of cyberspace laws in Pakistan although they lack proper enforcement and are plagued with poor management.
Downloads
References
Adnan Chaudhry, "Content Regulation in Pakistan’s Digital Spaces June 2018", HRC Report, (2017).
KPMG, Global eFraud Survey, KPMG Forensic and Litigation Services, (2013).
Ghulam Muhammad Kundi, E-Business in Pakistan: Opportunities and Threats, Lap-Lambert Academic Publishing, Germany, (2010).
J. A. Shah, “Report of the Group of Experts on Privacy,” 12 Oct, (2012).
S. A. Ahsan, “Current situation and Issues of Illegal and harmful activities in the field of Information and Communication Technology in Pakistan,” 01 Nov, (2002).
A. Agha, “Social Capital in Village Organization SadaatHackra, Miani, Bahawalpur, Punjab,” 01 April, (2015).
http://www.pakcon.org/post-pakcon/pc-khi-04-jawad-electroniccommerceand- cyber-crime.pdf (Last accessed: 16 November, 2018).
Report “Pakistan Law,” Government Of Pakistan, 31 Dec, (2007).
Jamal Shahid, ‘Flawed’ Cybercrime Bill Approved, Dawn News, 17 April, (2015).
T. Ahmed, “Pakistan: National Assembly Passes New Cybercrime Law,” 21 Sep, (2016).
Haroon Baloch, "Internet Rights and Legislation in Pakistan: A Critique on Cyber Crime Bill", (2016).
R. Khan, “Dawn News,” 11 Aug, (2016).
D. Kaye, "Report on Protection of Sources and Whistleblowers", (2015).
Section 13 & 16 of PECA, (2016).
Report of Freedom House, “Freedom on the Net 2017,” 01 Jan, (2017).
Zahid Jamil, Cyber Law, Presented at "the 50th anniversary celebrations of the Supreme Court of Pakistan International Judicial Conference on 11-14 August", (2006).
Report of Privacy International, “State of Privacy Pakistan,” 01 Jan, (2018).
“Part II of Constitution, (1973).
Government of Pakistan, “Freedom of Information Ordinance 2002,” 26 Oct, (2002).
Report of Digital Rights Foundation, “Surveillance of Female Journalists in Pakistan”, (2016).
Privacy International, “State of Privacy Pakistan,” 01 Jan, (2018). Online available and retrieved from: https://privacyinternational.org/state-privacy/1008/state-privacy-pakistan (Last accessed: 16 November, 2018).
“Freedom on the Net 2016, Country Profile: Pakistan”, Freedom on the Net 2016 , Freedom House, 14 Nov. 2016, www.freedomhouse.org/report/freedom-net/2016/pakistan (Last accessed: 16 November, 2018).
PTA blocks Freedom on the Net Report, https://propakistani.pk/2017/11/17/pta-blocks-freedom-net-report-pakistan/ (Last accessed: 16 November, 2018).
Investigation for Fair Trials Act, National Assembly of Pakistan, 22 February, (2013).
Sadia Rasool, “Cyber security threat in Pakistan: causes Challenges and way forward,” International Scientific Online Journal, (2015).
"Liberty and security in a changing world: Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies", 12 December, (2013), Recommendation 4, p.25, online at: www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf (Last accessed: 16 November, 2018)
"The National Action Plan (NAP) was adopted after the terrorist attack on Army Public School, Peshawar in 2014". This Act was designed to curb the terrorist activities in the country.
Government of Pakistan, “The National Database and Registration Authority Ordinance", (2000).
A.S. Elmaghraby & M.M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy", Journal of Advanced Research, vol. 5, no. 4, (2014), pp491-497.
Pakistan World Press Freedom Index 2017, “Reporters Without Borders”, https://rsf.org/en/pakistan (Last accessed: 16 November, 2018)
M. A. Munir, “Draft Pakistan Electronic Crimes Act, 2004: The Proposed E-Law in a Judge’s Perspective,” 19 Aug 2005.
“Briefing on Privacy International Legal Case: 10 Human Rights Organisations v. the United Kingdom,” Privacy International, July 21, (2015), https://www.privacyinternational.org/sites/default/files/2018-02/Privacy-International-Legal-Briefing-10- Human.pdf. (Last accessed: 16 November, 2018).
“FAD FY 12 CCP Funding of Partners”, National Security Agency slide reproduced in Glenn Greenwald, No Place to Hide, p. 124. http://glenngreenwald.net/pdf/NoPlaceToHide-Documents-Compressed.pdf (Last accessed: 16 November, 2018).
"Liberty and security in a changing world: Report and Recommendations of The President’s Review Group on Intelligence and Communications Technologies", 12 December, (2013), Recommendation 4, p25, online at: www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf (Last accessed: 16 November, 2018).
M. Rice, “Tipping the scales: Security & surveillance in Pakistan”, (2015). https://www.privacyinter-national.org/sites/default/files/Pakistan%20report%20high%20res%2020150721_0.pd (Last accessed: 16 November, 2018).
J Lanchester, “The Snowden files: Why the British public should be worried about GCHQ”, The Guardian 3 October, (2014).
"Report of the Senate Committee on Defence and Defence Production, Senate of Pakistan, August-September", (2013), http://www.senate.gov.pk/uploads/documents/1378101374_113.pdf (Last accessed: 16 November, 2018
Barton Gellman and Ashkan Soltani, “NSA tracking cellphone locations worldwide: Snowden documents show”, Washington Post, 4 December, (2013).
The UNGA Resolution 68/167 of 18 December, 2013.
Article 17 of ICCPR, (1966).
Sadia Rasool, “Cyber security threat in Pakistan: causes Challenges and way forward,” International Scientific Online Journal, (2015).
Ibid;
Adnan Chaudhry, "Content Regulation in Pakistan’s Digital Spaces June 2018", HRC Report, (2017).
“Surveillance of Female Journalists in Pakistan”, Digital Rights Foundation, 31 December, (2016).
John Arquilla and David Ronfeldt, “Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy”, In Networks and Netwars: The Future of Terror, Crime, and Militancy, 50. Rand Corporation, (2001).
A. Ahmed and D.S. Khan, "Cyber Security Issues and Ethical Hacking in Pakistan", Department of Computer Science Karachi University, (2015).
Z. Ali, M. Jan and A. Iqbal, "Social media implication on politics of Pakistan; measuring the impact of Facebook", The international Asian research journal, 1(01), (2013), pp13-21.
Article 14 of Constitution of Pakistan, (1973).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Law, State and Telecommunications Review
This work is licensed under a Creative Commons Attribution 4.0 International License.
By submitting this paper to the Law, State and Telecommunications Review,
I hereby declare that I agree to the terms of the Creative Commons Attribution 4.0 International (CC BY 4.0).