PEC Bill Criticism 9. Glorification of an offence and hate speech. Whoever prepares or Every accused is to disseminates intelligence, through any information system or device, where be presumed the commission or threat is with the intent to:innocent unless proven guilty. (a) glorify an offence or the person accused or convicted of a crime; Therefore, there is (b) support terrorism or activities of proscribed organizations; and no justification for (c) advance religious, ethnic or sectarian hatred making shall be punished with imprisonment for a term which may extend to five glorification of an years or with fine up to ten million rupees or with both. accused an offence. Justification In order to ensure fair trial as guaranteed under Article 10-A of the Constitution, it is important that media trial of any accused is avoided. Similarly media projection of any accused also need to be avoided for fair trial. Many countries prohibit discussions on sub judice matters and this provision is therefore in line with the international best practices. Explanation: “Glorification” includes depiction of any form of praise or celebration in a desirable manner “In a 2001 Joint Statement, the UN, OSCE and OAS Special Mandates on the right to freedom of expression set out a number of conditions which hate speech laws should respect: No one should be penalised for statements which are true No one should be penalised for the dissemination of hate speech unless it has been shown that they did so with the intention of inciting discrimination, hostility or violence The right of journalists to decide how best to communicate information and ideas to the public should be respected, particularly when they are reporting on racism and intolerance No one should be subject to prior 1 censorship Any imposition of sanctions by courts should be in strict conformity with the principle of proportionality. These provide a good basis for assessing the legitimacy of any particular hate speech law.” The aforementioned legal standards are taken from the UNHRCm after the ECHR case Jersild v Denmark. These standards are a good reference point as to what the international standard should be, and show that Sec 9 is actually not entirely aligned to international standards. The provision in this section can be seen as disproportional, taking away from the right of a journalist to decide how and what to report, and limiting opinion on ongoing cases. In cases where a fair trial could be influenced by the media, the courts already have the power to stop the media from reporting. However, it is not the job or objective of the media to be fair and unbiased, but it IS the job of the courts. Therefore, this provision seems to put the onus on the media, while doubting the integrity of the judicial systems. 2 14. Unauthorised use of identity information.-(1) Whoever obtains, sells, Identity possesses, transmits or uses another person’s identity information without information is not authorisation shall be punished with imprisonment for a term which may defined. extend to three years or with fine up to five million rupees, or with both. (2) Any person whose identity information is obtained, sold, possessed, used or transmitted may apply to the Authority for securing, destroying, blocking access or preventing transmission of identity information referred to in subsection (1) and the Authority on receipt of such application may take such measures as deemed appropriate for securing, destroying or preventing transmission of such identity information. Identity information is clearly defined in Chapter I as: “identity information” means an information which may authenticate or identify an individual or an information system and enable access to any data or information system; According to the definition of identity information as provided, it extends the scope of this section to phone numbers and email addresses and other such correspondence. This opens the floodgates for arrest and litigation, for a simple sharing of a phone number and/or email address or the likes. Therefore, this section has to be reworded for the intent to be clarified as followed: 1. The defendant willfully obtained someone else's personal identifying information; 2. The defendant willfully used that information for an unlawful purpose; AND 3. The defendant used the information without the consent of the person whose identifying information (he/she) was using. Someone commits an act willfully when he or she does it willingly or on purpose. 3 An unlawful purpose includes unlawfully (obtaining/ [or] attempting to obtain) (credit[,]/ [or] goods[,]/ [or] services[,]/ [or] medical information) in the name of the other person. (California Criminal Law 2040. Unauthorized use of personal identifying information) This clarifies that the provision will only be used against a person committing an UNLAWFUL act, through UNLAWFUL means, limiting the scope and addressing the real problem. 17. Unauthorised interception.- Whoever intentionally commits Ethical hacking has Ethical or white hat hacking is done with unauthorised interception by technical means of:been criminalized. permission of the network/system owner. Therefore, the same is not unauthorized (a) any transmission that is not intended to be and is not open to the public, and does not constitute an offence under from or within an information system; or the proposed law. (b) electromagnetic emissions from an information system that are carrying data, To limit the scope of abuse, it must be: a) Clarified that ethical hacking is shall be punished with imprisonment of either description for a term which NOT criminalized may extend to two years or with fine up to five hundred thousand rupees or b) Create legal language to protect with both. ethical hackers from litigation c) Create a standard/procedure that must be used to prove that UNETHICAL hacking has taken place. “An analysis must be done to identify these requirements and to develop solutions. A set of controls and 4 instructions should be drafted to capture these requirements and provide clear instructions to the ethical hacker. Everyone involved in the process should be informed about all requirements, and continuous monitoring should be put into place to ensure compliance. Ethical hackers not employed by the company should execute a written agreement to act within those requirements and agree to indemnify the company for any breach of these promises.” An excerpt from the American Bar Association. This clearly shows the need to not only identify ethical hacking, but also create standards, requirements and procedures. Ethical hacking is important for the development of industry and therefore those in the industry need to be protected. 5 18. Offences against dignity of natural person- (1) Whoever intentionally publicly exhibits or displays or transmits any false intelligence, which is likely to harm or intimidate the reputation or privacy of a natural person shall be punished with imprisonment for a term which may extend to three years or with fine up to one million rupees or with both: Provided, nothing under this sub-section (1) shall apply to anything aired by a broadcast media or distribution service licensed under Pakistan Electronic Media Regulatory Authority Ordinance, 2002 (XIII of 2002). (2) Any aggrieved person or his guardian, where such person is a minor, may apply to the Authority for passing of such orders for removal, destruction or blocking access to such intelligence referred to in sub-section (1) and the Authority on receipt of such application, may take such measures as deemed appropriate for securing, destroying, blocking access or preventing transmission of such intelligence. Facebook messages or tweets may also be criminalized under this provision. Dignity of man is inviolable under Article 14 of the Constitution. The proposed provision is pertaining to false information only and any fair comments, criticism, opinion etc do not fall under this provision. It is merely a transformation of an identical provision relating to criminal intimidation. Section 503 of PPC Criminal Intimidation: Whoever threatens another with any injury to his person, reputation or property, or to the person or reputation of any one in whom that person is interested, with intent to cause alarm to that person, or to cause that person to do any act which he is not legally bound to do, or to omit to do any act which that person is legally entitled to do, as the means of avoiding the execution of such threat, commits criminal intimidation. Explanation: A threat to injure the reputation of any deceased person in whom the person threatened is interested, is within this section. 6 The problem with the section is that it makes the law very subjective. What constitutes harm to one may not constitute harm to another. And with defamation laws already present in Pakistan, it renders this section useless and actually weak compared to the defamation law in Pakistan. “likely to cause harm” “likely to intimidate the reputation” means very little when looking at the law from an objective point of view. In fact, while most statements on mediums like Twitter or Facebook, while being false and unsubstantiated, objectively looking, are unimportant and HIGHLY unlikely to cause a damage to reputation. In such events, courts all over the world are not likely to accept a claim of defamation. Therefore in order to truly make this section count, one must remove these provisions, and punishments, and create a system that allows a complainant to register a complain, and after investigation, if necessary, courts simply issue a take down notice. This was also suggested in: As the author of the article Remedies for Web Defamation and lawyer by trade, Neville L. Johnson, suggests: “One possible solution to the problem of 7 Internet defamation is to amend section 230 to more closely resemble the Digital Millennium Copyright Act, with its system of notice and take-down procedures to regulate copyrighted material online. (See 17 U.S.C. § 101.)” 21. Cyber stalking.- (1) Whoever with the intent to coerce or intimidate or harass any person uses information system, information system network, the Internet, website, electronic mail, intelligence or any other similar means of communication to:(a) communicate obscene, vulgar, contemptuous, or indecent intelligence; or (b) make any suggestion or proposal of an obscene nature; or (c) threaten to commit any illegal or immoral act; or (d) take a picture or photograph of any person and display or distribute without his consent or knowledge in a manner that harms a person; or (e) display or distribute information in a manner that substantially increases the risk of harm or violence to any person, commits the offence of cyber stalking. Uploading a photograph of another person without permission has been criminalized. There are extensive legislations in many developed countries regarding personal data protection and cyber stalking. EU Personal Data Protection Directive 1995 is one such example. Even most of the social sites get a confirmation from the person uploading a photo whether he is authorized the photo or not. Privacy of home is protected as a fundamental right under Article 14 of the Constitution. 8 (2) Whoever commits the offence specified in sub-section (1) shall be punishable with imprisonment for a term which may extend to two years or with fine up to one million rupees, or with both: Provided that if the victim of the cyber stalking under sub-section (1) is a minor the punishment may extend to five years or with fine upto ten million rupees, or with both. (3) Any aggrieved person may apply to the Authority for issuance of appropriate orders for removal or destruction of, or blocking access to such intelligence as referred to in sub-section (1) and the Authority upon receipt of such application may take such measures as deemed appropriate for removal or destruction of, or blocking access to, such intelligence. Cyber stalking cannot and does not, in any parts of the world, constitute a onetime behavior. It is a continuous, obsessive and repetitive behavior. The clause must be amended to include the term “repeatedly” and “obsessively”, Cyber Stalking must be clearly defined. An example of a good definition: “At its most basic legal definition, “cyberstalking is a repeated course of conduct that’s aimed at a person designed to cause emotional distress and fear of physical harm,” said Danielle Citron, a professor at the University of Maryland’s Francis King Carey School of Law. Citron is an expert in the area of cyber-stalking, and recently published the book called Hate Crimes in Cyberspace”. 9 22. Spamming.- (1) Whoever intentionally transmits harmful, fraudulent, misleading, illegal or unsolicited intelligence to any person without the express permission of the recipient, or causes any information system to show any such intelligence commits the offence of spamming. Explanation.- “Unsolicited intelligence” does not include: i. ii. Marketing authorized under the law; or Intelligence which has not been specifically unsubscribed by the recipient. (2) A person engaged in direct marketing shall provide the option to the recipient of direct marketing to block or subscribe such marketing. (3) Whoever commits the offence of spamming as described in sub-section (1) or engages in direct marketing in violation of sub-section (2), for the first time, shall be punished with fine not exceeding fifty thousand rupees and for every subsequent violation shall be punished with imprisonment for a term which may extend to three months or with fine up to one million rupees or with both. Criminalizing “unsolicited” messages, is very harsh and may hamper various economic and social activities. Using the basic legal definition provided by Danielle Citron; it shows a clear design and direction to take cyberstalking, instead of just “intent to coerce or intimidate or harass any person”. Term “unsolicited intelligence” has been explained in the same provision and it does not include any intelligence which has not been specifically unsubscribed. It means that any intelligence shall only be considered unsolicited when the recipient has specifically unsubscribed to it. Spamming becomes redundant to address if spoofing is included. It bears no weight and in fact confuses the law. Most email providers and other such correspondence have the options of “block”, phones have in built spam protections. In Pakistan, spamming is mostly done as either a (i) marketing scheme or (ii) fraudulently acquire funds from naïve citizens. To counter this, i) the term whoever is replaced with TeleComs be removed to stop unsubscribed messages from reaching people. The term person removed and replaced with company, thereby distancing citizens from falling under this law. ii) a PSA would suffice telling citizens not to fall for it, and 10 criminalizing such behavior under spoofing would suffice However, most countries have separate spamming laws and it is NOT categorized under cyber bill. A good example would be the Canadian Anti Spam Law: https://sendgrid.com/blog/canadiananti-spam-law-need-know/ 23. Spoofing.- (1) Whoever dishonestly, establishes a website or sends any Spoofing appears intelligence with a counterfeit source intended to be believed by the to criminalize recipient or visitor of the website, to be an authentic source commits satire. spoofing. (2) Whoever commits spoofing shall be punished with imprisonment for a term which may extend to three years, or with fine up to five hundred thousand rupees or with both. It clearly gives exclusion to normal mass emails while emphasizing that a mass email that is of commercial nature or invites to engage in a commercial activity would be spam. Please refer to the link above that simply explains the Spam Laws. Spoofing is synonym to using a forged document as genuine. Satire is not covered under this offence as counterfeiting a source with dishonest intentions and using it as authentic and making people to believe it is authentic is not satire. Satire means the use of humour, irony, exaggeration, or ridicule to expose and criticize people's stupidity or vices, particularly in the context of contemporary politics and other topical issues. A proper explanation of what “spoofing” is: “an automated form of social engineering, 11 criminals use the Internet to fraudulently extract sensitive information from businesses and individuals, often by impersonating legitimate web sites. It is a technique of pulling out confidential information from the bank/financial institution account holders by deceptive means. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of financial institutions, requesting them to enter their username, password or other personal information to access their account for some reason. The term phishing is a general term for the creation and use by criminals of e-mails and websites – designed to look like they come from well-known, legitimate and trusted businesses, financial institutions and government agencies – in an attempt to gather personal, financial and sensitive information” Therefore, the intent should not be “to be believed by recipient” but in fact, the intent must be to “fraudulently extract sensitive/confidential information, or fraudulently extract funds from users via misrepresentation online” and include under misrepresentation, “setting up false 12 website, sending out emails containing false information or using a forged IP address to trick recipient’s computer to believe it is from a trusted source”. 29. Retention of traffic data.---(1) A service provider shall, within its existing or required technical capability, retain its traffic data for a minimum period of one year or such period as the Authority may notify from time to time and provide that data to the investigation agency or the authorised officer whenever so required. (1) Deletion of internet browser (2) The service providers shall retain the traffic data under sub section history has been (1) by fulfilling all the requirements of data retention and its originality as stopped. provided under sections 5 and 6 of the Electronic Transaction Ordinance, 2002 (LI of 2002). (2) Cost of service provision will (3) Any person who contravenes the provisions of this section shall be increase. punished with imprisonment for a term which may extend to six months or with fine up to five hundred thousand rupees or with both. By simplifying the intent of the act, it opens the floodgates to civil suits. It must be clarified that the intent is not just to dupe the recipient but to cause a financial loss or illegal information gathering (The requirement of retaining traffic data added in agreement with ISPAK and PASHA). (1) The requirement of retaining traffic data is applicable only to the service providers and a subscriber/user of service can delete his browser history or any traffic data as no such obligation has been put on him. (2) Retention of traffic data for a period of one year will not have any impact on cost of services as it is already a part of the licence terms and conditions of the service providers. In other countries there are also similar obligations on service providers for data retention. For example under EU Data Retention Directive, operators are also obliged to retain traffic data for a minimum of one year. According to Centre for Internet & Society (India) under Indian ISP License, there are eight categories of records that service providers are required 13 (3) Privacy has been compromised. to retain for security purposes that pertain to customer information or transactions. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the records must be made available and provided. (3) In order to ensure that traffic data so retained is not misused/unlawfully accessed, requirement of obtaining prior warrant from the court has been provided in the bill. The real question is why is data retention so important. Massive surveillance cannot take place without cause. There is no evidence supporting the idea that retention of data has caused a decrease in terroristic activities; please see: http://www.abc.net.au/news/2015-0210/bradley-the-case-for-data-retentionstill-hasnt-been-made/6075684. In fact, this provision just seems to be opening up way to extend territorial scopes; as long as communications is between Pakistanis, when one could be anywhere in the world, their data is being stored. It is a Jurisdictional reach, beyond the scope of ability of law. Research shows that countries like Austria, Belgium, Bulgaria, Germany, Greece, Romania and Sweden, have rejected it. These countries continue 14 to tackle serious crime without undermining their citizens’ civil liberties through blanket data retention. 15 34. Power to manage intelligence and issue directions for removal or blocking of access of any intelligence through any information system: (1) The Authority is empowered to manage intelligence and issue directions for removal or blocking of access of any intelligence through any information system. The Authority or any officer authorised by it in this behalf may direct any service provider, to remove any intelligence or block access to such intelligence, if it considers it necessary in the interest of the glory of Islam or the integrity, security or defence of Pakistan or any part thereof, friendly relations with foreign states, public order, decency or morality, or in relation to contempt of court or commission of or incitement to an offence under this Act. Government or PTA shall have the control to block any online content. Any political content or criticism on the government may also be blocked. This power already exists under the Pakistan Telecommunication (Reorganization) Act, 1996 and is currently be exercised by PTA. Exercise of such power by PTA has been endorsed and even required by the Honourable Superior courts. (2) The Authority may prescribe rules for adoption of standards and procedure to manage intelligence, block access and entertain complaints. This provision merely ensures that PTA develops proper legal framework for exercise of this power and exercises the power strictly in accordance with the Constitution. Political comment or criticism on the government cannot be blocked under this provision. (3) Until such procedure and standards are prescribed, the Authority shall exercise its powers under this Act or any other law for the time being in force in accordance with the directions issued by the Federal Government not inconsistent with the provisions of this Act. It is factually incorrect to say that under the PTA Act, PTA has the power to block. PTA must be given the right to censorship through legislation with SEC 34 is doing. The wordings in this provision do NOT merely give PTA the directive to create a legal framework. In fact, the term in (2) “may prescribe rules” means that there is no need to prescribe rules, just that they have the ability to, which is reemphasized in (3). The Federal Government had already made a statement giving the PTA authority to censorship; soon after WordPress was banned. While language has been borrowed from 16 Article 19, the very important term “reasonable restrictions” has been forgotten. “Reasonable restrictions” are found in precedence; as such no precedence or standard is present in Pakistan law. Therefore, it would be important here to not only incorporate the term “reasonable restrictions” but also to justify these restrictions. In order for this provision to be MERELY a provision urging for framework and in accordance to our Constitution, there should be clear mentions of all types of speech that is not allowed. It is unclear what constitutes integrity of Pakistan, or friendly relations with foreign states. These need to be clarified, a standard to meet this clarification to be created and exceptions to be established. Till then, this section needs to be removed in its entirety because is actually a clear violation of the Universal Declaration of Human Rights, and international practice. Any law that violates international HR standards cannot and should not be formulated in to law. Please refer to case: Yildirim v.Turkey 17