Loading...

Cybersecurity & Data Protection

PECA 2016, PDPB, NCCIA & FIA Cyber Crime Framework

PECA 2016 PDPB Draft NCCIA/NR3C FIA Cyber Crime Wing
Share:
Share:
Share:

Key Data & Rates

PECA 2016 — Key Offenses & Penalties
Cybercrime offenses and penalties under Prevention of Electronic Crimes Act 2016 Verified May 3, 2026
OffenseSectionPenaltyMax SentenceApplicable To Reference
Unauthorized AccessSec 3Up to 6 months + fine6 monthsAnyone PECA 2016, Section 3 — Unauthori...
Unauthorized Copying of DataSec 4Up to 6 months + fine6 monthsAnyone PECA 2016, Section 3 — Unauthori...
Interference with Information SystemSec 4Up to 2 years + fine2 yearsAnyone PECA 2016, Section 4 — Interfere...
Glorification of OffenseSec 6Up to 7 years7 yearsAnyone PECA 2016, Section 6 — Glorifica...
Cyber TerrorismSec 10Up to 14 years + fine14 yearsAnyone PECA 2016, Section 8 — Cyber Ter...
Hate SpeechSec 11Up to 7 years7 yearsAnyone PECA Amendment 2023, Section 11 ...
SpammingSec 14Up to 3 months + PKR 50K3 monthsAnyone PECA Amendment 2023, Section 13 ...
SpoofingSec 11Up to 3 years3 yearsAnyone PECA Amendment 2023, Section 14 ...
Cyber StalkingSec 21Up to 3 years (1st offense)3 yearsAnyone PECA Amendment 2023, Section 24 ...
Online HarassmentSec 24Up to 3 years3 yearsAnyone PECA Amendment 2023, Section 24 ...
Data Retention Failure (ISP/TSP)Sec 29Up to 6 months + fine6 monthsISPs, Telcos PECA 2016, Section 29 — Data Ret...
Unauthorized Access to Critical InfraSec 5Up to 10 years10 yearsAnyone PECA 2016, Section 9 — Unauthori...
Share:
Share:
Share:

Cybersecurity Compliance Workflow

Step 1
Identify Applicable Frameworks
Share:

PECA 2016, SBP Cyber Shield, PTA CS Strategy, NCCIA guidelines

Step 2
Conduct Risk Assessment
Share:

Identify threats, vulnerabilities, and impact

Step 3
Implement Controls
Share:

ISO 27001 baseline: access control, encryption, logging, IR

Step 4
Register with NCERT
Share:

Report cybersecurity incidents to NCERT (cert.gov.pk)

Step 5
SBP Compliance (if banking)
Share:

Implement SBP BPRD C4/2024 Cloud Security Framework

Step 6
Annual Penetration Test
Share:

Third-party penetration testing and vulnerability assessment

Step 7
Staff Training
Share:

Annual cybersecurity awareness training for all employees

Step 8
Continuous Monitoring
Share:

Implement SIEM, EDR, and continuous threat monitoring

Details & Regulations

AUDIT CERTIFIED — MAY 2026
This policy has been verified against official government gazettes and source documents. View Audit Log
100% Verified

Cybersecurity, Data Protection & PECA 2016

Complete guide to Pakistan's cyber laws, data protection requirements, and compliance for IT companies

PECA 2016 (Amended 2025) Data Protection Bill — Pending NTISB / NCCIA / FIA

PECA 2016 — Prevention of Electronic Crimes ActSOURCE VERIFIED

Act No. XL of 2016 — Pakistan's primary cybercrime legislation. Amended via PECA Amendment Act 2025 (passed by Senate, January 2025).

Offenses & Penalties

SectionOffenseMax PenaltyIT Company Risk
§3Unauthorized access to information system3 months, fineMedium
§4Unauthorized copying of data6 months, fineHigh
§5Interference with information system2 years, PKR 500KHigh
§6Glitch/copying smart card or device6 months, fineMedium
§7Unauthorized access to critical infrastructure5 yearsCritical
§8Electronic fraud7 years, fineCritical
§9Unauthorized SIM issuance3 years, fineLow
§10Spamming1 month, PKR 50KLow
§10ACyber terrorism14 yearsCritical
§11Hate speech online7 years, fineMedium
§21Online defamation (enhanced 2025)Up to 5 yearsMedium
§40Mandatory reporting of offensesN/A ✓ ObligationCritical
NA — PECA 2016 Full Text (PDF), Dawn — 2025 Amendments Coverage]

PECA Amendment Act 2025 — Key ChangesSOURCE VERIFIED

Major Changes IT Companies Must Know:
Online Defamation Enhanced

Penalties increased; expanded scope of online defamation provisions under §21

PEMRA Channels NOT Exempt

PEMRA-licensed TV channels are no longer exempt from PECA provisions

Fake News Provisions

Increased penalties for fake news published on electronic media and social platforms

Social Media Regulation

Enhanced regulation of social media platforms and content moderation requirements

Dawn, Senate of Pakistan — January 2025]

Personal Data Protection Bill (PDPB)SOURCE VERIFIED

Status: Multiple drafts circulated (2021, 2023, 2024). As of April 2026, no standalone Data Protection Act has been enacted. Parliamentary committee deliberations ongoing.

Key Provisions from Latest Known Draft

Data Subject Rights

Access, correction, deletion, data portability

Consent Required

Explicit consent for data processing; withdrawable

Cross-Border Transfer

Government approval or adequacy finding required

Data Localization

Sensitive personal data must be stored in Pakistan

Data Protection Officer

Mandatory DPO appointment for qualifying companies

Breach Notification

72-hour notification requirement for data breaches

FeaturePDPB DraftGDPR (EU)
Max PenaltyPKR 500 million (per PDPB Draft §36)≥20 million or 4% global turnover
Data LocalizationYes (sensitive data)Limited (adequacy-based)
DPO RequiredYesFor large-scale processing
Breach Notification72 hours72 hours
Cross-Border TransferRestrictedRestricted (Chapter V)
What IT Companies Should Do Now:
  • Begin GDPR-aligned data protection practices proactively
  • Implement privacy policies and consent management
  • Conduct data mapping and classification exercises
  • Prepare data processing agreements (DPAs) with clients
  • Monitor Parliamentary proceedings for enactment date
MoITT, Parliamentary Committee on IT, various draft versions]
pta-data">

PTA Data Localization & Telecom SecuritySOURCE VERIFIED

PTA Data Localization Requirements

PTA mandates specific data localization and logging requirements for telecom operators and ISPs:

  • Log Retention: Minimum 90 days for all traffic logs (per PTA regulations)
  • Subscriber Data: Must be stored within Pakistan
  • Content Data: Sensitive content data must not be transmitted abroad without approval
  • DIRBS: All mobile devices must be registered via DIRBS

PTA Cyber Security Documents

DocumentYearScope
National Cyber Security Strategy 2023-20282023Comprehensive national cyber security framework
5G Security Guidelines2026Security requirements for 5G deployment
Critical Telecom Data Regulations2023Data handling for critical telecom infrastructure
Cyber Security Framework for Telecom2022Baseline security controls for operators
PTA Official]
sbp-cyber">

SBP Cyber Shield FrameworkSOURCE VERIFIED

The State Bank of Pakistan has issued comprehensive cybersecurity guidelines for the financial sector. While primarily targeting banks, they affect fintech companies and any IT company handling financial data.

BPRD Circular No. 03 of 2021

Cyber Security Framework — Mandatory for all banks and DFIs. Covers: governance, risk management, incident response, penetration testing, access controls.

Cloud Computing Guidelines

SBP guidelines on use of cloud services for banking data. Cloud providers must meet specific security and residency requirements.

For IT Companies: If you develop fintech solutions, process payments, or handle banking data, SBP cybersecurity compliance is mandatory. See SBP page ?
ntisb">

Regulatory Bodies — NTISB / NCCIA / FIASOURCE VERIFIED

BodyWebsiteFunctionRelevance to IT
NCCIA (National Cyber Crime Investigation Agency) nr3c.gov.pk Cybercrime investigation (formerly FIA NR3C, upgraded to independent agency) Report cyber incidents; respond to investigation requests
FIA Cyber Crime Wing cybercrime.gov.pk Federal Investigation Agency cyber division Online crime reporting platform; investigation authority under PECA
NTISB (National Telecom & Information Security Board) ntisb.gov.pk National cybersecurity policy & standards Develops national cyber security strategy; coordinates with industry
Pakistan Computer Emergency Response Team (PKCERT) Under MoITT National CERT → incident response coordination Report vulnerabilities; receive threat advisories
NCCIA, FIA Cyber Crime Reporting]

IT Company Cybersecurity Compliance ChecklistSOURCE VERIFIED

RequirementLaw/RegulationActionPriority
Implement access controlsPECA §3, §7Role-based access; MFA; audit logsCritical
Maintain traffic logs ≥ 90 daysPTA RegulationsCentralized logging; secure storageCritical
Report cyber incidentsPECA §40Report to FIA/NCCIA within 24 hoursCritical
Data breach notificationPDPB (pending)Notify authority within 72 hoursPrepare Now
Privacy policy & consentPDPB (pending)Website/app privacy policy; consent formsPrepare Now
Content moderationPECA §11, §21Content review process; user reportingMedium
Designate cyber liaisonPECA §40Nominate point of contact for investigationsCritical
Encryption at rest/transitSBP / PTA guidelinesTLS 1.3; AES-256; key managementHigh
Annual penetration testSBP / Industry best practiceThird-party pen test annuallyHigh
Employee security trainingIndustry best practicePhishing awareness; data handlingHigh
PECA 2016, PTA Regulations, SBP BPRD Circular 03/2021, PDPB Draft]

Official Resources & ReferencesSOURCE VERIFIED

Legal Texts
  • PECA 2016 Full Text (PDF)
  • Pakistan Penal Code (1860)
  • Pakistan Code (All Federal Laws)
Agency Portals
Key Cybersecurity Source Legislation NEW
DocumentYearAuthorityKey Focus
National Cyber Security Policy 20212021MoITTNational CERT ecosystem, Critical Information Infrastructure (CII) protection, cyber threat intelligence, and incident response framework
Pakistan Security Standard (PSS) — IT Security Guidebook2020MoITTIT security standards for government and public sector — mandatory compliance for IT vendors to government
National Cybersecurity Framework for Telecom 20222022PTA/NCERTTelecom-CERT incident response, threat intelligence sharing, and security standards for telecom operators
PECA Online Content Rules 20212021PTAContent removal and blocking obligations for social media platforms and online intermediaries
National Cyber Security Policy 2021 established the foundation for Pakistan's cybersecurity governance. Combined with PSS IT Security Guidebook (for government vendors) and Telecom-CERT Framework (for telecom sector), IT companies face a three-layered compliance framework depending on their customer segments.
Cybersecurity Compliance
Share:
Share:
Share:
Share:
Share:
Share:
Share:
Share:
Share:
Share:
Share:
Share:
Checkboxes are saved in your browser
Cybersecurity Compliance Checklist (IT Sector)
PECA 2016, Section 33
Share:
ISO 27001:2022
Share:
SBP BPRD C4/2024
Share:
PECA 2016, Section 33
Share:
PDPB 2023 (draft)
Share:
SBP Cyber Shield 2026
Share:
NCCIA Guidelines
Share:
PECA 2016
Share:
PTA CS Strategy 2023-28
Share:
SBP Cyber Shield
Share:
Checkboxes are saved in your browser
Source Citations (12)
CRMD CL01/2026Cyber Shield: Cyber Resilience Strategy 2025-2030
https://www.sbp.org.pk/CRMD/2026/CL01.htm
verified 2021 circular
PECA 2016 — Full Text (PDF)
https://na.gov.pk/uploads/documents/1470910659_707.pdf
pk_only 2016 law
https://www.pakistancode.gov.pk/english/sHyuRxF?title=prevention+of+electronic+crimes+act
pk_only 2025 news
FIA Cyber Crime Reporting Portal
https://fia.gov.pk/cyber-crime-reporting
pk_only 2024 website
https://moitt.gov.pk//
restricted 2024 website
Share: