Peca 16
Peca 16
CONTENTS
CHAPTER I
PRELIMINARY
2. Definitions.
CHAPTER II
9. Glorification of an offence.
Page 1 of 26
13. Electronic forgery.
25. Spamming.
26. Spoofing.
CHAPTER III
Page 2 of 26
35. Powers of an authorized officer.
CHAPTER IV
INTERNATIONAL COOPERATION
CHAPTER - V
47. Appeal.
CHAPTER VI
PREVENTIVE MEASURES
CHAPTER VII
MISCELLANEOUS
Page 3 of 26
52 Removal of difficulties.
54. Amendment of Electronic Transactions Ordinance, 2002 (LI of 2002) and pending proceedings.
Page 4 of 26
THE PREVENTION OF ELECTRONIC CRIMES ACT, 2016
ACT NO. XL OF 2016
WHEREAS it is expedient to prevent unauthorized acts with respect to information systems and
provide for related offences as well as mechanisms for their investigation, prosecution, trial and
international cooperation with respect thereof and for matters connected therewith or ancillary thereto;
CHAPTER I
PRELIMINARY
1. Short title, extent, application and commencement.— (1) This Act may be called the
Prevention of Electronic Crimes Act, 2016.
(3) It shall apply to every citizen of Pakistan wherever he may be and also to every other person
for the time being in Pakistan.
(4) It shall also apply to any act committed outside Pakistan by any person if the act constitutes
an offence under this Act and affects a person, property, information system or data located in Pakistan.
2. Definitions.— (1) In this Act, unless there is anything repugnant in the subject or context,—
(ii) “access to data” means gaining control or ability to use, copy, modify or delete
any data held in or generated by any device or information system;
(iii) “access to information system” means gaining control or ability to use any part
or whole of an information system whether or not through infringing any
security measure;
Page 5 of 26
(iv) “Authority” means the Pakistan Telecommunication Authority established
under the Pakistan Telecommunication (Re-organization) Act, 1996 (XVII of
1996);
(vii) “Code” means the Code of Criminal Procedure, 1898 (Act V of 1898);
(viii) “content data” means any representation of fact, information or concept for
processing in an information system including source code or a program suitable
to cause an information system to perform a function;
(ix) “Court” means the Court of competent jurisdiction designated under this Act;
Page 6 of 26
(xiv) “data damage” means alteration, deletion, deterioration, erasure, relocation,
suppression of data or making data temporarily or permanently unavailable;
(xix) “information” includes text, message, data, voice, sound, database, video,
signals, software, computer programmes, any forms of intelligence as defined
under the Pakistan Telecommunication (Reorganization) Act, 1996 (XVII of
1996) and codes including object code and source code;
(xxiv) “minor” means, notwithstanding anything contained in any other law, any
person who has not completed the age of eighteen years;
Page 7 of 26
(xxv) “offence” means an offence punishable under this Act except when committed
by a person under ten years of age or by a person above ten years of age and
under fourteen years of age, who has not attained sufficient maturity of
understanding to judge the nature and consequences of his conduct on that
occasion;
(xxvii) “seize” with respect to an information system or data includes taking possession
of such system or data or making and retaining a copy of the data;
(xxix) “subscriber information” means any information held in any form by a service
provider relating to a subscriber other than traffic data;
(xxx) “traffic data” includes data relating to a communication indicating its origin,
destination, route, time, size, duration or type of service;
(xxxiii) “unsolicited information” means the information which is sent for commercial
and marketing purposes against explicit rejection of the recipient and does not
include marketing authorized under the law.
(2) Unless the context provides otherwise, any other expression used in this Act or rules made
thereunder but not defined in this Act, shall have the same meanings assigned to the expressions in the
Pakistan Penal Code, 1860 (Act XLV of 1860), the Code of Criminal Procedure, 1898 (Act V of
1898) and the Qanoon-e-Shahadat, 1984 (P.O.No.X of 1984), as the case may be.
______________
Page 8 of 26
CHAPTER II
Explanation.—For the purposes of this section “glorification” includes depiction of any form
of praise or celebration in a desirable manner.
10. Cyber terrorism.— Whoever commits or threatens to commit any of the offences under
sections 6, 7, 8 or 9, where the commission or threat is with the intent to,—
(a) coerce, intimidate, create a sense of fear, panic or insecurity in the Government
or the public or a section of the public or community or sect or create a sense of
fear or insecurity in society; or
Page 9 of 26
(c) advance the objectives of organizations or individuals or groups proscribed
under the law, shall be punished with imprisonment of either description for a
term which may extend to fourteen years or with fine which may extend to fifty
million rupees or with both.
11. Hate speech.— Whoever prepares or disseminates information, through any information
system or device, that advances or is likely to advance interfaith, sectarian or racial hatred, shall be
punished with imprisonment for a term which may extend to seven years or with fine or with both.
13. Electronic forgery.— (1) Whoever interferes with or uses any information system, device
or data, with the intent to cause damage or injury to the public or to any person, or to make any illegal
claim or title or to cause any person to part with property or to enter into any express or implied
contract, or with intent to commit fraud by any input, alteration, deletion, or suppression of data,
resulting in unauthentic data with the intent that it be considered or acted upon for legal purposes as if
it were authentic, regardless of the fact that the data is directly readable and intelligible or not, shall be
punished with imprisonment of either description for a term which may extend to three years, or with
fine which may extend to two hundred and fifty thousand rupees or with both.
(2) Whoever commits offence under sub-section (1) in relation to a critical infrastructure
information system or data shall be punished with imprisonment for a term which may extend to seven
years or with fine which may extend to five million rupees or with both.
14. Electronic fraud.—Whoever with the intent for wrongful gain interferes with or uses any
information system, device or data or induces any person to enter into a relationship or deceives any
person, which act or omission is likely to cause damage or harm to that person or any other person
shall be punished with imprisonment for a term which may extend to two years or with fine which may
extend to ten million rupees or with both.
15. Making, obtaining, or supplying device for use in offence. — Whoever produces,
makes, generates, adapts, exports, supplies, offers to supply or imports for use any information system,
data or device, with the intent to be used or believing that it is primarily to be used to commit or to
assist in the commission of an offence under this Act shall, without prejudice to any other liability that
he may incur in this behalf, be punished with imprisonment for a term which may extend to six months
or with fine which may extend to fifty thousand rupees or with both.
16. Unauthorized use of identity information.— (1) Whoever obtains, sells, possesses,
transmits or uses another person's identity information without authorization shall be punished with
imprisonment for a term which may extend to three years or with fine which may extend to five million
rupees, or with both.
(2) Any person whose identity information is obtained, sold, possessed, used or transmitted
may apply to the Authority for securing, destroying, blocking access or preventing transmission of
identity information referred to in sub-section (1) and the Authority on receipt of such application may
take such measures as deemed appropriate for securing, destroying or preventing transmission of such
identity information.
Page 10 of 26
17. Unauthorized issuance of SIM cards etc.—Whoever sells or otherwise provides
subscriber identity module (SIM) card, re-usable identification module (R-IUM) or universal
integrated circuit card (UICC) or other module designed for authenticating users to establish
connection with the network and to be used in cellular mobile, wireless phone or other digital devices
such as tablets, without obtaining and verification of the subscriber's antecedents in the mode and
manner for the time being approved by the Authority shall be punished with imprisonment for a term
which may extend to three years or with fine which may extend to five hundred thousand rupees or
with both.
(a) any transmission that is not intended to be and is not open to the public, from or
within an information system; or
(b) electromagnetic emissions from an information system that are carrying data,
shall be punished with imprisonment of either description for a term which may
extend to two years or with fine which may extend to five hundred thousand
rupees or with both.
20. Offences against dignity of a natural person.— (1) Whoever intentionally and publicly
exhibits or displays or transmits any information through any information system, which he knows to
be false, and intimidates or harms the reputation or privacy of a natural person, shall be punished with
imprisonment for a term which may extend to three years or with fine which may extend to one million
rupees or with both:
Provided that nothing under this sub-section shall apply to anything aired by a broadcast media
or distribution service licensed under the Pakistan Electronic Media Regulatory Authority Ordinance,
2002 (XIII of 2002).
(2) Any aggrieved person or his guardian, where such person is a minor, may apply to the
Authority for removal, destruction of or blocking access to such information referred to in sub-section
(1) and the Authority on receipt of such application, shall forthwith pass such orders as deemed
reasonable in the circumstances including an order for removal, destruction, preventing transmission
of or blocking access to such information and the Authority may also direct any of its licensees to
secure such information including traffic data.
21. Offences against modesty of a natural person and minor.—(1) Whoever intentionally
and publicly exhibits or displays or transmits any information which,—
Page 11 of 26
(a) superimposes a photograph of the face of a natural person over any sexually
explicit image or video; or
(c) intimidates a natural person with any sexual act, or any sexually explicit image
or video of a natural person; or
through an information system to harm a natural person or his reputation, or to take revenge, or to
create hatred or to blackmail, shall be punished with imprisonment for a term which may extend to
five years or with fine which may extend to five million rupees or with both.
(2) Whoever commits an offence under sub-section (1) with respect to a minor shall be
punished with imprisonment for a term which may extend to seven years and with fine which may
extend to five million rupees:
Provided that in case of a person who has been previously convicted of an offence under sub-
section (1) with respect to a minor shall be punished with imprisonment for a term of ten years and
with fine.
(3) Any aggrieved person or his guardian, where such person is a minor, may apply to the
Authority for removal, destruction of or blocking access to such information referred to in sub-section
(1) and the Authority, on receipt of such application, shall forthwith pass such orders as deemed
reasonable in the circumstances including an order for removal, destruction, preventing transmission
of or blocking access to such information and the Authority may also direct any of its licensees to
secure such information including traffic data.
22. Child pornography.— (1) Whoever intentionally produces, offers or makes available,
distributes or transmits through an information system or procures for himself or for another person or
without lawful justification possesses material in an information system, that visually depicts—
shall be punished with imprisonment for a term which may extend to seven years, or with fine which
may extend to five million rupees or with both.
(2) Any aggrieved person or his guardian, where such person is a minor, may apply to the
Authority for removal, destruction of or blocking access to such information referred to in sub-section
(1) and the Authority, on receipt of such application, shall forthwith pass such orders as deemed
reasonable in the circumstances, including an order for removal, destruction, preventing transmission
Page 12 of 26
of or blocking access to such information and the Authority may also direct any of its licensees to
secure such information including traffic data.
23. Malicious code.—Whoever willfully and without authorization writes, offers, makes
available, distributes or transmits malicious code through an information system or device, with intent
to cause harm to any information system or data resulting in the corruption, destruction, alteration,
suppression, theft or loss of the information system or data shall be punished with imprisonment for a
term which may extend to two years or with fine which may extend to one million rupees or with both.
Explanation.—For the purpose of this section, the expression “malicious code” includes, a
computer program or a hidden function in a program that damages an information system or data or
compromises the performance of such system or availability of data or uses it without proper
authorization.
24. Cyber stalking.— (1) A person commits the offence of cyber stalking who, with the intent
to coerce or intimidate or harass any person, uses information system, information system network,
the Internet, website, electronic mail or any other similar means of communication to—
(a) follow a person or contacts or attempts to contact such person to foster personal
interaction repeatedly despite a clear indication of disinterest by such person;
(b) monitor the use by a person of the internet, electronic mail, text message or any
other form of electronic communication;
(c) watch or spy upon a person in a manner that results in fear of violence or serious
alarm or distress, in the mind of such person; or
(d) take a photograph or make a video of any person and displays or distributes it
without his consent in a manner that harms a person.
(2) Whoever commits the offence specified in sub-section (1) shall be punished with
imprisonment for a term which may extend to three years or with fine which may extend to one million
rupees or with both:
Provided that if victim of the cyber stalking under sub-section (1) is a minor the punishment
may extend to five years or with fine which may extend to ten million rupees or with both.
(3) Any aggrieved person or his guardian, where such person is a minor, may apply to the
Authority for removal, destruction of or blocking access to such information referred to in sub-section
(1) and the Authority, on receipt of such application, shall forthwith pass such orders as deemed
reasonable in the circumstances including an order for removal, destruction, preventing transmission
of or blocking access to such information and the Authority may also direct any of its licensees to
secure such information including traffic data.
25. Spamming.— (1) A person commits the offence of spamming, who with intent transmits
harmful, fraudulent, misleading, illegal or unsolicited information to any person without permission of
the recipient or who causes any information system to show any such information for wrongful gain.
Page 13 of 26
(3) Whoever commits the offence of spamming as described in sub-section (1) by transmitting
harmful, fraudulent, misleading or illegal information, shall be punished with imprisonment for a term
which may extend to three months or with fine of rupees fifty thousand which may extend upto rupees
five million or with both.
(4) Whoever commits the offence of spamming as described in sub-section (1) by transmitting
unsolicited information, or engages in direct marketing in violation of sub-section (2), for the first time,
shall be punished with fine not exceeding fifty thousand rupees, and for every subsequent violation
shall be punished with fine not less than fifty thousand rupees that may extend up to one million rupees.
26. Spoofing.— (1) Whoever with dishonest intention establishes a website or sends any
information with a counterfeit source intended to be believed by the recipient or visitor of the website,
to be an authentic source commits spoofing.
(2) Whoever commits spoofing shall be punished with imprisonment for a term which may
extend to three years or with fine which may extend to five hundred thousand rupees or with both.
28. Pakistan Penal Code, 1860 (Act XLV of 1860) to apply.— The provisions of the Pakistan
Penal Code, 1860 (Act XLV of 1860), to the extent not inconsistent with anything provided in this Act,
shall apply to the offences provided in this Act.
CHAPTER III
29. Establishment of investigation agency.— (1) The Federal Government may establish or
designate a law enforcement agency as the investigation agency for the purposes of investigation of
offences under this Act.
(2) Unless otherwise provided for under this Act, the investigation agency and the authorized
officer shall in all matters follow the procedure laid down in the Code to the extent that it is not
inconsistent with any provision of this Act.
(3) The investigation agency shall establish its own capacity for forensic analysis of the data
or in information systems and the forensic analysis reports generated by the investigation agency shall
not be inadmissible in evidence before any court for the sole reason that such reports were generated
by the investigation agency.
(4) Notwithstanding provisions of any other law, the Federal Government shall make rules for
appointment and promotion in the investigation agency including undertaking of specialized courses
Page 14 of 26
in digital forensics, information technology, computer science and other related matters for training of
the officers and staff of the investigation agency.
30. Power to investigate.— Only an authorized officer of the investigation agency shall have
the powers to investigate an offence under this Act:
Provided that the Federal Government or the Provincial Government may, as the case may be,
constitute one or more joint investigation teams comprising of an authorized officer of the investigation
agency and any other law enforcement agency for investigation of an offence under this Act and any
other law for the time being in force.
31. Expedited preservation and acquisition of data.— (1) If an authorised officer is satisfied
that—
(b) there is a risk or vulnerability that the data may be modified, lost, destroyed or
rendered inaccessible,
the authorized officer may, by written notice given to the person in control of the information system,
require that person to provide that data or to ensure that the data specified in the notice be preserved
and the integrity thereof is maintained for a period not exceeding ninety days as specified in the notice:
Provided that the authorized officer shall immediately but not later than twenty-four hours bring
to the notice of the Court, the fact of acquisition of such data and the Court on receipt of such
information may pass such orders as deemed appropriate in the circumstances of the case including
issuance of warrants for retention of such data or otherwise.
(2) The period provided in sub-section (1) for preservation of data may be extended by the
Court if so deemed necessary upon receipt of an application from the authorized officer in this behalf
32. Retention of traffic data.— (1) A service provider shall, within its existing or required
technical capability, retain its specified traffic data for a minimum period of one year or such period
as the Authority may notify from time to time and, subject to production of a warrant issued by the
Court, provide that data to the investigation agency or the authorized officer whenever so required.
(2) The service providers shall retain the traffic data under sub-section (1) by fulfilling all the
requirements of data retention and its originality as provided under sections 5 and 6 of the Electronic
Transactions Ordinance, 2002 (LI of 2002).
(3) Any owner of the information system who is not a licensee of the Authority and violates
sub- section (1) shall be guilty of an offence punishable, if committed for the first time, with fine which
may extend to ten million rupees and upon any subsequent conviction shall be punishable with
imprisonment which may extend to six months or with fine or with both:
Provided that where the violation is committed by a licensee of the Authority, the same shall
be deemed to be a violation of the terms and conditions of the licensee and shall be treated as such
under the Pakistan Telecommunication (Re-organization) Act, 1996 (XVII of 1996).
Page 15 of 26
33. Warrant for search or seizure.— (1) Upon an application by an authorized officer that
demonstrates to the satisfaction of the Court that there exist reasonable grounds to believe that there
may be in a specified place an information system, data, device or other articles that—
(b) has been acquired by a person as a result of the commission of an offence, the
Court may issue a warrant which shall authorize an officer of the investigation
agency, with such assistance as may be necessary, to enter the specified place
and to search the premises and any information system, data, device or storage
medium relevant to the offence identified in the application and access, seize or
similarly secure any information system, data, device or other articles relevant
to the offence identified in the application.
(2) In circumstances involving an offence under section 10, under which a warrant may be
issued but cannot be obtained without the apprehension of destruction, alteration or loss of data,
information system, data, device or other articles required for investigation, the authorized officer, who
shall be a Gazetted officer of the investigation agency, may enter the specified place and search the
premises and any information system, data, device or other articles relevant to the offence and access,
seize or similarly secure any information system, data, device or other articles relevant to the offence:
Provided that the authorized officer shall immediately but not later than twenty-four hours bring
to the notice of the Court, the fact of such search or seizure and the Court on receipt of such information
may pass such orders as deemed appropriate in the circumstances of the case.
34. Warrant for disclosure of content data.— (1) Upon an application by an authorised
officer that demonstrates to the satisfaction of the Court that there exist reasonable grounds to believe
that the content data stored in an information system is reasonably required for the purpose of a
criminal investigation or criminal proceedings with respect to an offence made out under this Act, the
Court may, after recording reasons, order that the person in control of the data or information system,
to provide such data or access to such data to the authorized officer.
(2) The period of a warrant issued under sub-section (1) may be extended beyond seven days
if, an application, a Court authorizes an extension for a further period of time as may be specified by
the Court.
35. Powers of an authorized officer.— (1) Subject to provisions of this Act, an authorized
officer shall have the powers to—
(a) have access to and inspect the operation of any specified information system;
(b) use or cause to be used any specified information system to search any specified
data contained in or available to such system;
(c) obtain and copy only relevant data, use equipment to make copies and obtain an
intelligible output from an information system;
Page 16 of 26
(d) have access to or demand any information in readable and comprehensible
format or plain version;
(e) require any person by whom or on whose behalf, the authorized officer has
reasonable cause to believe, any information system has been used to grant
access to any data within an information system within the control of such
person;
(f) require any person having charge of or otherwise concerned with the operation
of any information system to provide him reasonable technical and other
assistance as the authorized officer may require for investigation of an offence
under this Act; and
(2) In exercise of the power of search and seizure of any information system, program or data
the authorized officer at all times shall,—
(b) take all precautions to maintain integrity and secrecy of the information system
and data in respect of which a warrant for search or seizure has been issued;
(c) not disrupt or interfere with the integrity or running and operation of any
information system or data that is not the subject of the offences identified in
the application for which a warrant for search or seizure has been issued;
(d) avoid disruption to the continued legitimate business operations and the
premises subjected to search or seizure under this Act; and
(e) avoid disruption to any information system, program or data not connected with
the information system that is not the subject of the offences identified in the
application for which a warrant has been issued or is not necessary for the
investigation of the specified offence in respect of which a warrant has been
issued.
(3) When seizing or securing any data or information system, the authorized officer shall make
all efforts to use technical measures to maintain its integrity and chain of custody. The authorized
officer shall seize an information system, data, device or articles, in part or in whole, as a last resort
only in the event where it is not possible under the circumstances to use such technical measures or
where use of such technical measures by themselves shall not be sufficient to maintain the integrity
and chain of custody of the data or information system being seized.
Page 17 of 26
(4) Where an authorized officer seizes or secures any data or information system, the
authorized officer shall ensure that data or information system while in the possession or in the access
of the authorized officer is not released to any other person including competitors or public at large
and details including log of any action performed on the information system or data is maintained in a
manner prescribed under this Act.
36. Dealing with seized data or information system.— (1) If any data or information system
has been seized or secured following a search or seizure under this Act, the authorized officer who
undertook the search or seizure shall, at the time of the seizure,—
(a) make a list of what has been seized or rendered inaccessible, with the date and
time of seizure; and
(iii) the person from whose possession the data or information system has
been seized, in a prescribed manner in the presence of two witnesses.
(2) The authorized officer, upon an application of the owner of the data or information system
or an authorized agent of the owner and on payment of prescribed costs, shall provide forensic image
of the data or information system to the owner or his authorized agent within a time prescribed under
this Act.
(3) If the authorized officer has reasons to believe that providing forensic image of the data or
information system to the owner under sub-section (2) may prejudice,—
(a) the investigation in connection with which the search was carried out; or
(c) any criminal proceedings that are pending or that may be brought in relation to
any of those investigations, the authorized officer shall, within seven days of
receipt of the application under sub-section (2), approach the Court for seeking
an order not to provide copy of the seized data or information system.
(4) The Court, upon receipt of an application from an authorized officer under sub-section (3),
may after recording reasons in writing pass such order as deemed appropriate in the circumstances of
the case.
(5) The costs associated with the exercise of rights under this section shall be borne by the
person exercising these rights.
37. Unlawful on-line content.— (1) The Authority shall have the power to remove or block
or issue directions for removal or blocking of access to an information through any information system
if it considers it necessary in the interest of the glory of Islam or the integrity, security or defence of
Page 18 of 26
Pakistan or any part thereof, public order, decency or morality, or in relation to contempt of court or
commission of or incitement to an offence under this Act.
(2) The Authority shall, with the approval of the Federal Government, prescribe rules
providing for, among other matters, safeguards, transparent process and effective oversight mechanism
for exercise of powers under sub-section (1).
(3) Until such rules are prescribed under sub-section (2), the Authority shall exercise its powers
under this Act or any other law for the time being in force in accordance with the directions issued by
the Federal Government not inconsistent with the provisions of this Act.
(4) Any person aggrieved from any order passed by the Authority under sub-section (1), may
file an application with the Authority for review of the order within thirty days from the date of passing
of the order.
(5) An appeal against the decision of the Authority in review shall lie before the High Court
within thirty days of the order of the Authority in review.
38. Limitation of liability of service providers.— (1) No service provider shall be subject to
any civil or criminal liability, unless it is established that the service provider had specific actual
knowledge and willful intent to proactively and positively participate, and not merely through omission
or failure to act, and thereby facilitated, aided or abetted the use by any person of any information
system, service, application, online platform or telecommunication system maintained, controlled or
managed by the service provider in connection with a contravention of this Act or rules made
thereunder or any other law for the time being in force:
Provided that the burden to prove that a service provider had specific actual knowledge, and
willful intent to proactively and positively participate in any act that gave rise to any civil or criminal
liability shall be upon the person alleging such facts and no interim or final orders, or directions shall
be issued with respect to a service provider by any investigation agency or Court unless such facts have
so been proved and determined:
Provided further that such allegation and its proof shall clearly identify with specificity the
content, material or other aspect with respect to which civil or criminal liability is claimed including
but not limited to unique identifiers such as the Account Identification (Account ID), Uniform
Resource Locator (URL), Top Level Domain (TLD), Internet Protocol Addresses (IP Addresses), or
other unique identifier and clearly state the statutory provision and basis of the claim.
(2) No service provider shall under any circumstance be liable under this Act, rules made
thereunder or any other law for maintaining and making available the provision of their service in good
faith.
(3) No service provider shall be subject to any civil or criminal liability as a result of informing
a subscriber, user or end-users affected by any claim, notice or exercise of any power under this Act,
rules made thereunder or any other law:
Provided that the service provider, for a period not exceeding fourteen days, shall keep
confidential and not disclose the existence of any investigation or exercise of any power under this Act
when a notice to this effect is served upon it by an authorized officer, which period of confidentiality
may be extended beyond fourteen days if, on an application by the authorized officer, the Court
Page 19 of 26
authorizes an extension for a further specified period upon being satisfied that reasonable cause for
such extension exists.
(4) No service provider shall be liable under this Act, rules made thereunder or any other law
for the disclosure of any data or other information that the service provider discloses only to the extent
of the provisions of this Act.
(5) No service provider shall be under any obligation to proactively monitor, make inquiries
about material or content hosted, cached, routed, relayed, conduit, transmitted or made available by
such intermediary or service provider.
39. Real-time collection and recording of information.— (1) If a Court is satisfied on the
basis of information furnished by an authorized officer that there are reasonable grounds to believe
that the content of any information is reasonably required for the purposes of a specific criminal
investigation, the Court may order, with respect to information held by or passing through a service
provider, to a designated agency as notified under the Investigation for Fair Trial Act, 2013 (I of 2013)
or any other law for the time being in force having capability to collect real time information, to collect
or record such information in real-time in coordination with the investigation agency for provision in
the prescribed manner:
Provided that such real-time collection or recording shall not be ordered for a period beyond
what is absolutely necessary and in any event for not more than seven days.
(2) Notwithstanding anything contained in any law to the contrary the information so collected
under sub-section (1) shall be admissible in evidence.
(3) The period of real-time collection or recording may be extended beyond seven days if, on
an application, the Court authorizes an extension for a further specified period.
(4) The Court may also require the designated agency to keep confidential the fact of the
execution of any power provided for in this section and any information relating to it.
(5) The application under sub-sections (1) and (2) shall in addition to substantive grounds and
reasons also,—
(a) explain why it is believed that the data sought will be available with the person
in control of an information system;
(b) identify and explain with specificity the type of information likely to be found
on such information system;
(c) identify and explain with specificity the identified offence made out under this
Act in respect of which the warrant is sought;
(d) if authority to seek real-time collection or recording on more than one occasion
is needed, explain why and how many further disclosures are needed to achieve
the purpose for which the warrant is to be issued;
(e) specify what measures shall be taken to prepare and ensure that the real-time
collection or recording is carried out whilst maintaining the privacy of other
Page 20 of 26
users, customers and third parties and without the disclosure of information of
any person not part of the investigation;
(f) explain why the investigation may be frustrated or seriously prejudiced unless
the real time collection or recording is permitted; and
(g) why, to achieve the purpose for which the warrant is being applied, real time
collection or recording by the person in control of the information system is
necessary.
Provided that the burden of proof of any defense taken by an accused service provider or an
authorized officer that he was acting in good faith, shall be on such a service provider or the authorized
officer, as the case may be.
CHAPTER IV
INTERNATIONAL COOPERATION
42. International cooperation.— (1) The Federal Government may upon receipt of a request,
through the designated agency under this Act, extend such cooperation to any foreign government, 24
x 7 network, any foreign agency or any international organization or agency for the purposes of
investigations or proceedings concerning offences related to information systems, electronic
communication or data or for the collection of evidence in electronic form relating to an offence or
obtaining expeditious preservation and disclosure of data by means of an information system or real-
time collection of data associated with specified communications or interception of data under this
Act.
(2) The Federal Government may forward to a foreign government, 24x7 network, any foreign
agency or any international agency or organization any information obtained from its own
investigations if it considers that the disclosure of such information might assist the other government,
agency or organization etc., as the case be, in initiating or carrying out investigations or proceedings
concerning any offence under this Act.
(3) The Federal Government shall require the foreign government, 24 x 7 network, any foreign
agency or any international organization or agency to keep the information provided confidential and
use it strictly for the purposes it is provided.
Page 21 of 26
(4) The Federal Government may, through the designated agency, send and answer requests
for mutual assistance the execution of such requests or their transmission to the authorities competent
for their execution.
(5) The Federal Government may refuse to accede to any request made by a foreign
government, 24 x 7 network, any foreign agency or any international organization or agency, if,—
(a) it is of the opinion that the request, if granted, would prejudice sovereignty,
security, public order or other essential public interest of Pakistan;
(b) the offence is regarded by the Federal Government as being of a political nature;
(c) there are substantial grounds for believing that the request for assistance has
been made for the purpose of prosecuting a person on account of that person's
race, sex, religion, nationality, ethnic origin or political opinions or that that
person's position may be prejudiced for any of those reasons;
(d) the request relates to an offence the prosecution of which in the requesting State
may be incompatible with the laws of Pakistan;
(e) the assistance requested requires the Federal Government to carry out
compulsory measures that may be inconsistent with the laws or practices of
Pakistan had the offence been the subject of investigation or prosecution under
its own jurisdiction; or
(f) the request concerns an offence which may prejudice an ongoing investigation
or trial or rights of its citizens guaranteed under the Constitution.
(g) Where the Federal Government decides to provide the requested cooperation,
the relevant requirements and safeguards provided under this Act and rules
framed thereunder shall be followed.
(7) The designated agency shall maintain a register of requests received from any foreign
government, 24 x 7 network, any foreign agency or any international organization or agency under this
Act and action taken thereon.
_____________
CHAPTER - V
43. Offences to be compoundable and non-cognizable.— (1) All offences under this Act,
except the offences under sections 10, 21 and 22 and abetment thereof, shall be non-cognizable,
bailable and compoundable:
Provided that offences under section 17 shall be cognizable by the investigation agency on a
written complaint by the Authority.
(2) Offences under sections 10, 21 and 22 and abetment thereof shall be non-bailable, non-
Page 22 of 26
compoundable and cognizable by the investigation agency.
44. Cognizance and trial of offences.— (1) The Federal Government, in consultation with
the Chief Justice of respective High Court, shall designate presiding officers of the Courts to try
offences under this Act at such places as deemed necessary.
(2) The Federal Government shall, in consultation with the Chief Justice of respective High
Court, arrange for special training of the presiding officers of the Court to be conducted by an entity
notified by the Federal Government for training on computer sciences, cyber forensics, electronic
transactions and data protection.
(3) Prosecution and trial of an offence under this Act committed by a minor shall be conducted
under the Juvenile Justice System Ordinance, 2000 (XXII of 2000).
(4) To the extent not inconsistent with this Act, the procedure laid down under the Code and
the Qanoon-e-Shahadat, 1984 (P.O.No.X of 1984), shall be followed.
45. Order for payment of compensation.— (1) The Court may, in addition to award of any
punishment including fine under this Act, make an order for payment of compensation to the victim
for any damage or loss caused and the compensation so awarded shall be, recoverable as arrears of
land revenue:
Provided that the compensation awarded by the Court shall not prejudice any right to a civil
remedy for the recovery of damages beyond the amount of compensation so awarded.
46. Appointment of amicus curiae and seeking expert opinion.—The Court may appoint
amicus curiae or seek independent expert opinion on any matter connected with a case pending before
it.
47. Appeal.— An appeal against the final judgment or order of a Court shall , within thirty
days from the date of provision of its certified copy free of cost, lie—
(a) to the High Court concerned against such judgment or order if passed by a court
of sessions; or
(b) to the court of sessions concerned against such judgment or order if passed by a
magistrate.
CHAPTER VI
PREVENTIVE MEASURES
48. Prevention of electronic crimes.— (1) The Federal Government or the Authority, as the
case may be, may issue directives to be followed by the owners of the designated information systems
or service providers in the interest of preventing any offence under this Act.
(2) Any owner of the information system who is not a licensee of the Authority and violates
the directives issued under sub-section (1) shall be guilty of an offence punishable, if committed for
the first time, with fine which may extend to ten million rupees and upon any subsequent conviction
shall be punishable with imprisonment which may extend to six months or with fine or with both:
Page 23 of 26
Provided that where the violation is committed by a licensee of the Authority, the same shall
be deemed to be a violation of the terms and conditions of the licensee and shall be treated as such
under the Pakistan Telecommunication (Re-organization) Act, 1996.
49. Computer emergency response teams.—(1) The Federal Government may constitute one
or more computer emergency response teams to respond to any threat against or attack on any critical
infrastructure information systems or critical infrastructure data, or widespread attack on information
systems in Pakistan.
(2) A computer emergency response team constituted under sub-section (1) may comprise of
technical experts of known expertise officers of any intelligence or agency or any sub-set thereof.
(3) A computer emergency response team shall respond to a threat or attack without causing
any undue hindrance or inconvenience to the use and access of the information system or data as may
be prescribed.
CHAPTER VII
MISCELLANEOUS
50. Relation of the Act with other laws.— (1) The provisions of this Act shall have effect
not in derogation of the Pakistan Penal Code, 1860 (Act XLV of 1860), the Code of Criminal
Procedure, 1898 (Act V of 1898), the Qanoon-e-Shahadat, 1984 (P.O. No. X of 1984), the Protection
of Pakistan Act, 2014 (X of 2014) and the Investigation for Fair Trial Act, 2013 (I of 2013).
(2) Subject to sub-section (1), the provisions of this Act shall have effect notwithstanding
anything to the contrary contained in any other law on the subject for the time being in force.
51. Power to make rules.— (1) The Federal Government may, by notification in the official
Gazette, make rules for carrying out purposes of this Act.
(2) Without prejudice to the generality of the foregoing powers, such rules may specify,—
(a) qualifications and trainings of the officers and staff of the investigation agency
and prosecutors;
(b) powers, functions and responsibilities of the investigation agency, its officers
and prosecutors;
(d) mode and manner in which record of investigation under this Act may be
maintained;
(e) manner to deal with the seized data, information system, device or other articles;
Page 24 of 26
(g) requirements for seeking permission of the Authority to change, alter or
re-programme unique device identifier of any communication equipment by any
person for research or any other legitimate purpose;
(h) procedure for seeking appropriate orders of the Authority for removal,
destruction or blocking access to information under this Act;
(i) constitution of computer emergency response team and the standard operating
procedure to be adopted by such team;
(k) manner of coordination between the investigation agency and other law
enforcement and intelligence agencies including designated agency;
(m) qualifications and trainings of the officers, experts and staff of the forensic
laboratory;
(n) powers, functions and responsibilities of the forensic laboratory, its officers,
experts and staff;
(o) standard operating procedures of the forensic laboratory to interact with the
investigation agency;
52. Removal of difficulties.— If any difficulty arises in giving effect to the provisions of this
Act, the Federal Government may, within two years of the commencement of this Act and by order
published in the official Gazette, make such provisions not inconsistent with the provisions of this Act
as may appear to be necessary for removing the difficulty.
53. Report to Parliament.— The agency designated or established under section 29 of the
Act shall submit a half yearly report to both houses of the Parliament for consideration by the relevant
Committee in camera, in respect of its activities, without disclosing identity information, in a manner
as prescribed under this Act.
54. Amendment of Electronic Transactions Ordinance, 2002 (LI of 2002) and pending
proceedings.— (1) Sections 36 and 37 of the Electronic Transactions Ordinance, 2002 (LI of 2002)
are omitted.
(2) Any action taken by or with the approval of the Authority or proceedings pending under
the provisions of the Electronic Transactions Ordinance, 2002 (LI of 2002) repealed by sub-section
(1), shall continue and be deemed to have been taken or initiated under this Act.
Page 25 of 26
55. Savings of powers.— Nothing in this Act shall affect, limit or prejudice the duly
authorized and lawful powers and functions of the institutions controlled by the Governments exercised
and performed in good faith.
Page 26 of 26