The Effectiveness Of Pakistan Electronic Crime Act (PECA) In Combating of CyberCrime.
The effectiveness of cybercrime law in Pakistan while introducing (PECA) is a positive step towards tackling to cybercrime in Pakistan.
Cyber crimes are known as computer crimes, refer to illegal activities or offenses committed using digital networks. The main law that deals with cybercrime in Pakistan is the prevention of electronic crimes act. This act is to protect the rights and interests of citizens, business, and government from cybercrime and cyber threats, such as hacking, identity theft, cyber terrorism, hate speech, child pornography cyber stalking, spamming and more. This act also establishes an investigation agency and a forensic laboratory to deal with cybercrime act cases.
Details of Some crimes are given below which are mentioned in PECA;
Unauthorized Access: the hacking into any computer, website, network or device without permission or beyond the allowed limit. Copying or sending any data that belongs to someone else without their consent reason.
CYBER TERRORISM; is when someone uses electronic means to intimidate or coerce a government. this can include hacking into government websites, spreading, propaganda, or disrupting essential services such as power grids or communication networks.
SPAMMING; is when someone sends you unwanted messages or emails that you did not fraudulent, misleading or illegal. For instance; if you receive an email that calms you have won a prize but asks for your bank account details, its likely to be spam. If someone is found guilty of spamming, they can be punished with imprisonment for up to three years or a fine of up to one million rupees or both.
The digital networks or technologies are playing essential role now in this era. Someone can easily hack your computer or mobile data and your account by the help of digital network. The Specialized techniques and tools to examine digital devices, network, and storage media to uncover of cybercrime, data breaches and other digital incidents. There are four main parts of digital forensics used to forensic cybercrime included are WORK COMPUTER, MOBILE DEVICE, NETWORK and CLOUD FORENSICS, also it is known as ITF (INFORMATION TECHNOLOGY FORENSICS). Today’s digital age to help investigators understand the who, what, where and how of cybercrime and hold those responsible accountable for their actions. The digital forensic plays an important role in legal issues like digital forensic investigations can raise legal issues, included privacy concerns, chain of custody, and admissibility of evidence. Specialists must be familiar with the legal landscape and ensure that their investigations comply with legal requirements.