TITLE

Pakistan faces legal vacuum as cybercrimes ordinance lapsed

PUB. DATE
October 2012
SOURCE
Flare (Pakistan);10/15/2012, p37
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the legal operations of the users of information and communication technology (ICT) in Pakistan following the lapse of the Prevention and Control of Cyber Crimes Ordinance in 2009. It states that the improvement in ICT led to advantages and opportunities as well as threats and risks in cyber disputes and cybercrimes. It says that Islamabad highlighted an effective legal mechanism and general awareness on cybercrimes at a roundtable held at the Institute of Policy Studies.
ACCESSION #
82764759

 

Related Articles

  • Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data. Ablon, Lillian; Libicki, Martin // Defense Counsel Journal;Apr2015, Vol. 82 Issue 2, p143 

    The article looks at the growth in the cyber black markets that may includes computer-hacking tools and services to enable and carry out cybercrime attacks, byproducts from those attacks such as the stolen credit cards, personally identifiable information, and intellectual property. Topics...

  • Bill prepared to address cyber related crimes.  // Flare (Pakistan);Jan2014, p74 

    The article reports that the Pakistan Ministry of Information Technology and Telecommunications is preparing the draft for the Prevention of Electronic Crimes Bill (PECB)-2013 which is aiming to address the cyber related crimes.

  • CYBER WARFARE. SOLIS, GARY D. // Military Law Review;Spring2014, Vol. 219, p1 

    The article focuses the threat of cyber warfare in 2014. Topics include the laws of armed conflict (LOAC), how LOAC applies to cyber issues, and the International Court of Justice's (ICJ) treatment of international cybercrime. Information is provided on international humanitarian law (IHL) and...

  • The Slippery Slope of Enterprise Security. Bielatan, Jennifer // Information Executive;Mar/Apr2002, Vol. 6 Issue 2, p6 

    Focuses on the solutions to the limitation of security programs to protect business data from hackers. Creation of obstacles protecting corporate-critical information from intrusion; Concept of the software Security Wellness Continuum from RedSiren Technologies Inc.; Institution of the firewall...

  • Hunting down the hackers. Bird, Jane // Management Today;Jul94, p64 

    Provides information on how computer crime is solved in the United Kingdom. Steven Bellovin as a computer hacker; Facts from a DTI; Reason for the growth in computer crime; Diversion of funds as the often goal of organized hackers; Number of viruses in circulation according to IBM; Passwords as...

  • Diminishing Cyber Risk. Denes, Shary // Rural Telecommunications;Jul/Aug2002, Vol. 21 Issue 4, p9 

    Discusses the steps that should be taken by companies to protect themselves for cyber attacks. Recognition of security vigilance; Way to protect the confidentiality, integrity and availability of network-based assets.

  • Access denied. Sheehy, Don; Trites, Gerald // CA Magazine;Sep95, Vol. 128 Issue 7, p50 

    Discusses computer security. Results of the survey of Ernst & Young on losses arising from breach of information security; Protection of local area networks; Data privacy through Data Encryption Standard (DES); Rivest, Shamir and Alderman algorithm (RSA); Development of passwords.

  • Tracking an attack often provides little benefit; top deterrent is secure systems everywhere. McClure, Stuart; Scambray, Joel // InfoWorld;06/26/2000, Vol. 22 Issue 26, p94 

    Comments on the importance of a secure computer system in deterring a hacker attack. Disadvantages of tracking down port scans; Strategy used by hackers in attacking a computer system; Attacking Windows NT software.

  • FBI Center to Fight Net Fraud.  // Air Conditioning, Heating & Refrigeration News;05/15/2000, Vol. 210 Issue 3, p61 

    Reports on the United States government's launched of the Internet Fraud Complaint Center to combat the increasing fraud on the Internet. Handling of the complaint center operation by the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center; Web site; Total...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics