Loading...

Cybersecurity & Data — Complete IT Company Guide

PECA 2016, NTISB, NCERT, SBP Cyber Shield & PDPA — all cybersecurity requirements

Share:
Share:

Key Data & Rates

Cybersecurity Laws & Frameworks
Verified May 3, 2026
Law/FrameworkDescriptionAuthorityReference
PECA 2016Electronic crimes — unauthorized access, data theft, cyber terrorismPTA / FIAPECA 2016 PECA 2016
NTISB GuidelinesMandatory cybersecurity standards for ISPs and telcosNTISBNTISB NTISB
NCERTNational Cyber Emergency Response Team — incident reportingNCERTNCERT NCERT
PTA 5G Security GuidelinesSecurity requirements for 5G deploymentsPTAPTA 5G PTA 5G Security
SBP Cyber ShieldBanking sector cybersecurity framework for fintechSBP BPRDBPRD C4/2024 BPRD C4/2024
PDPA 2023 (draft)Personal Data Protection Bill — data privacyMoITTMoITT MoITT
NTC Security StandardsGovernment IT security standards for vendorsNTCNTC NTC
Share:
Share:
Share:

Cybersecurity Compliance Workflow

Steps to achieve cybersecurity compliance in Pakistan

Step 1
PECA 2016 Compliance
Share:

Ensure compliance with Pakistan Electronic Crimes Act — unauthorized access, data theft are criminal offenses.

Step 2
Implement NTISB Controls
Share:

Apply NTISB-recommended cybersecurity controls for ISPs and IT companies.

Step 3
Register with NCERT
Share:

Prepare incident response procedures and register ability to report to NCERT.

Step 4
SBP Cyber Shield (Fintech)
Share:

If handling financial data, implement SBP Cyber Shield requirements per BPRD C4/2024.

Step 5
PDPA Awareness
Share:

Monitor Personal Data Protection Bill progress — prepare for data localization requirements.

Step 6
NTC Compliance (Gov Vendor)
Share:

If a government vendor, comply with NTC security standards for IT procurement.

Details & Regulations

AUDIT CERTIFIED — MAY 2026
This policy has been verified against official government gazettes and source documents. View Audit Log
100% Verified

Cybersecurity & Data — Complete IT Company Guide

Pakistan's cybersecurity framework is governed by PECA 2016, SBP Cyber Shield, NTISB guidelines, and sector-specific regulations. Non-compliance can result in criminal penalties and regulatory action.

1. Why Cybersecurity Compliance MattersSOURCE VERIFIED

significant proportion (verify with current data)SOURCE VERIFIED

of Pakistani organizations experienced cyber incidents in 2024

significant losses (verify with current CERT data)SOURCE VERIFIED

estimated losses from cybercrime in Pakistan (2024)

3 yearsSOURCE VERIFIED

max imprisonment under PECA for unauthorized access

2. Regulatory BodiesSOURCE VERIFIED

BodyRoleWebsiteScope
FIA Cyber Crime WingInvestigation & prosecution of cybercrimescybercrime.gov.pkAll organizations
NCERT (PakCERT)National incident response & threat intelligencepkpkcert.gov.pkAll organizations
NTISB (MoITT)Telco/ISP cybersecurity policy & standardsntisb.gov.pkTelcos, ISPs
PTATelecom sector security regulationpta.gov.pkTelcos, ISPs, VAS
SBPFinancial sector cybersecurity (Cyber Shield, TRM)sbp.org.pkBanks, EMIs, PSOs/PSPs, fintech vendors
NCSA (MoITT)National cybersecurity strategymoitt.gov.pkAll critical infrastructure

3. PECA 2016 — Key Sections for IT CompaniesSOURCE VERIFIED

SectionOffensePenaltyIT Company Relevance
§3Unauthorized access to information systemUp to 3 months or PKR 50,000 fine or bothIf your systems are breached or you breach client systems
§4Unauthorized copying of dataUp to 6 monthsCode/data theft, IP violations
§5Interference with information systemUp to 2 years + PKR 500K fine (Federal — PECA 2016)DDoS, hacking attacks
§7Unauthorized access to critical infrastructureUp to 5 yearsGovernment/telecom systems
§8Electronic fraudUp to 7 years + finePayment fraud, phishing
§9Unauthorized SIM issuanceUp to 3 years + fineIoT/M2M SIM management
§10SpammingUp to 1 month + PKR 50K fine (Federal — PECA 2016 §6)Email/SMS marketing compliance
§10ACyber terrorismUp to 14 years + fineCritical infrastructure attacks
§21Online defamation (2025 amendment)Strengthened penaltiesSocial media, online content
§34Access to critical infrastructureUp to 3 years + fineIf working on govt/telecom systems
§42-43International cooperationMutual legal assistanceCross-border investigations
PECA 2025 Amendments: Online defamation provisions strengthened (Section 21), increased penalties for fake news, PEMRA-licensed channels no longer exempt from PECA. Verify current text with FIA.

4. SBP Cyber Shield & Technology Risk FrameworkSOURCE VERIFIED

Cyber Shield — Cyber Resilience Strategy 2025-2030SOURCE VERIFIED

Per CRMD CL01/2026, SBP has launched Cyber Shield, the first-ever cyber resilience strategy for all SBP-regulated entities. Key requirements:

  • Mandatory alignment: All banks, EMIs, PSOs/PSPs must align internal cybersecurity programs with the Cyber Shield roadmap by 2030
  • Five strategic priorities: Strengthen → Mature → Enhance → Develop — phased milestones through 2030
  • Scope: Prevention, detection, response, and recovery from cyber incidents across the financial sector
IT companies providing services to banks/EMIs must ensure their security practices align with Cyber Shield milestones. Non-compliance by regulated entities attracts penal action.

Technology Risk Management Framework (PSD C4/2025)SOURCE VERIFIED

Per PSD C4/2025, all PSOs/PSPs and EMIs must comply by March 31, 2026. Key requirements for IT companies:

AreaRequirementImpact on IT Companies
Board OversightBoD must have members with technology expertise; Head of IT + Head of InfoSec requiredIT governance must be board-level; staffing mandates
Cyber Risk ManagementTechnology risk policy updated every 3 years; annual VAPT requiredPatch management SLAs enforceable
Digital Fraud PreventionNADRA biometric at signup; device fingerprinting/binding; OTP auto-fetch with sender binding; 2-hour cool-off on device switchFintech apps must implement device binding, OTP controls, biometric verification
Fraud Liability30-minute dispute response SLA; PI liable if complaint channel unavailableMajor operational requirement for payment platforms
Outsourcing7-day advance notice to SBP for material outsourcing; SBP approval for offshore; cloud per BPRD C1/2023IT vendors must comply with SBP cloud outsourcing framework
DR & BCPDefined RTO/RPO; annual BCP testing requiredDisaster recovery capabilities mandatory

Digital Channel Downtime Rules (PSD C1/2023)SOURCE VERIFIED

Per PSD C1/2023:

  • 99.5% uptime SLA for digital channels
  • Planned downtime: Inform customers 2 days in advance; notify SBP 1 week ahead
  • Unplanned downtime >30 min: Immediate customer notification + estimated restoration time; report to SBP
  • Overtime: If planned downtime exceeds 2+ hours, immediately convey to customers and SBP

Digital Lending App Restrictions (PSD C2/2023)SOURCE VERIFIED

Per PSD C2/2023: Banks/EMIs must not provide digital payment services to unauthorized/unlicensed digital lending apps. IT companies building fintech products must verify licensing status from SBP/SECP before integration.

Mobile App Security (PSD CL6/2022)SOURCE VERIFIED

Per PSD CL6/2022: Banks/EMIs/PSOs must implement secure coding practices, VAPT before app launch, certificate pinning, and runtime integrity checks for all mobile applications.

Cyber Shield — Detailed Strategic Priorities (CRMD CL01/2026)SOURCE VERIFIED

Per CRMD CL01/2026, Cyber Shield defines five strategic priorities with specific actions and milestones through 2030 (Federal (SBP)):

#PriorityKey ActionsIT Company Impact
1Strengthen Cyber ResilienceDevelop cyber-testing framework simulating real-world threats; tiered cybersecurity regulations; cybersecurity maturity assessment; Zero Trust Architecture roadmap for critical banking infrastructure; 2-hour RTO for FMIsIT vendors must align security posture with tiered regulations; prepare for Zero Trust requirements; ensure DR capabilities meet 2-hour RTO
2Mature Cybersecurity GovernanceStrengthen CISO and CIO/CTO roles mandate; enhance BoD cyber risk understanding; mandatory board-level cyber risk reportingIT companies serving banks will face stricter third-party governance requirements; CISO role formalized
3Enhance Collaboration & PartnershipsEstablish threat intelligence & information sharing platform; standardized IT/cyber incident reporting framework; FinCERT establishment; multi-year cyber exercising programIT vendors to banks expected to participate in threat intelligence sharing; FinCERT will coordinate financial sector incident response
4Develop Cyber WorkforceQuantify cyber skills gap via survey; develop competency roadmap & training programsOpportunity for IT training companies to deliver SBP-aligned cybersecurity curricula
5Evolve Strategy & ProgramsRegular cybersecurity strategy review; advisories on emerging technologies (AI, quantum); strengthen third-party risk management; annual cyber threat landscape reportThird-party risk oversight tightening — IT vendors must demonstrate compliance through audits, certifications
Zero Trust Architecture: Cyber Shield mandates a roadmap for Zero Trust implementation across critical banking infrastructure. IT companies providing network, identity, or access management solutions to banks should prepare for Zero Trust requirements — no implicit trust based on network location, continuous verification, least-privilege access. (Federal (SBP))
FinCERT: SBP will establish FinCERT (Financial sector Computer Emergency Response Team) as part of the threat intelligence platform. FinCERT will handle incident lifecycle management, coordinate cross-entity response, and provide threat intelligence to regulated entities. IT companies with SOC capabilities may serve as FinCERT partners. (Federal (SBP))

Technology Risk Management Framework — Detailed Requirements (PSD C4/2025)SOURCE VERIFIED

Per PSD C4/2025, the TRM Framework includes granular requirements beyond the summary table above. IT companies building payment/fintech solutions must note: (Federal (SBP))

API Security Requirements

  • Risk assessment required for all third-party API integrations
  • API keys and access tokens must be protected with reasonable expiry timeframes
  • Strong encryption standards and key management for data transmitted via APIs
  • Security testing of all APIs before production deployment
  • API session logging: identity, date, time, transactions, data accessed — available for audit

Data Security & PCI-DSS

  • Comprehensive data leak prevention (DLP) mechanism mandatory
  • Application and database security controls for PII handling
  • PCI-DSS compliance mandatory when storing payment card data
  • Offline, encrypted backups required — must be tested regularly; recovery without loss of transactions or audit trails

Network Security & Monitoring

  • Network segmentation by role, location, environment (production vs testing vs development)
  • SIEM and SOC mandatory for anomaly detection
  • Whitelisting solutions — only permitted applications run; URL blacklists/allowlists
  • Automated anti-malware with regular scanning
  • Network & system logs monitored proactively and centrally

Cyber Threat Intelligence & Incident Response

  • Process to collect, process, analyze cybersecurity-related information for relevance and impact
  • Must participate in cyber threat information-sharing arrangements
  • Cyber-incident response plan must include ransomware procedures and plans for critical system inaccessibility
  • Post-incident root cause analysis mandatory — measures to avoid recurrence
  • Report all tech incidents (cyber-attacks, critical system outage) immediately to SBP per Annexure II template

Designated PIs: 2-Hour RTO

Designated Payment Institutions must minimize Recovery Time Objective (RTO) to 2 hours. DR facility should be geographically diverse from Primary Data Centre. Annual DR drills mandatory — covering total shutdown, complete switchover, and component failure scenarios. Results reported to SBP. (Federal (SBP))

COVID-19 WFH Cybersecurity Controls (Still Active)SOURCE VERIFIED

SBP’s PSD C3/2020 additional security controls for work-from-home scenarios remain applicable and are reinforced by the Cyber Shield strategy: (Federal (SBP))

  • VPN with MFA mandatory for remote access — limit to corporate-trusted devices only
  • Endpoint hardening for all devices connecting to corporate network
  • SPF, DMARC, DKIM for email spoofing prevention
  • Block unapproved USB/CD/DVD media; whitelist allowed web content
  • Administrator accounts must not be used for email, web browsing, video streaming
  • Remote access logging and monitoring mandatory; latest OS & antivirus updates required

5. Data Protection in PakistanSOURCE VERIFIED

Current Legal FrameworkSOURCE VERIFIED

LawStatusKey Provisions
PECA 2016✓ EnactedUnauthorized access, data interference, spam, 2025 amendments for online defamation
Personal Data Protection Bill (PDPB)Draft (2024-25)Consent, data minimization, cross-border transfer restrictions, PKR 500M penalties (Federal — PDPA 2025 draft)
Digital Nation Pakistan Bill 2025Passed both HousesEstablishes Pakistan Digital Authority
PTA Consumer Protection Regulations✓ ActiveTelecom subscriber data protection
SBP Data Security Guidelines✓ ActiveMandatory for banking/fintech — per BPRD C1/2023, PSD C4/2025

Data Localization RequirementsSOURCE VERIFIED

SectorRequirementAuthority
Banking/FinancialMandatory — all financial data in PakistanSBP BPRD C1/2023
TelecomMandatory — CDRs, subscriber data in PakistanPTA
GovernmentMandatory — all government data in PakistanMoITT/NITB
E-commerce (payment data)Partial — payment data in PakistanSBP/FBR
General Private SectorNo strict requirement (may change with PDPB)
After PDPB enactmentDTIAs required for cross-border transfersDraft PDPB provisions

Cross-Border Data Transfer RulesSOURCE VERIFIED

No comprehensive cross-border data transfer law exists yet. However, sectoral restrictions are enforceable:
ScenarioStatusBasis
Pakistani banking/fintech data on intl serversPROHIBITEDSBP Cloud Guidelines
Government client data abroadPROHIBITEDMoITT/NITB Policy
Telecom subscriber data abroadPROHIBITEDPTA Regulations
General international client dataALLOWEDNo restriction
After PDPB enactmentDTIAs requiredDraft PDPB provisions

6. ISO 27001 Implementation GuideSOURCE VERIFIED

Why Get ISO 27001?SOURCE VERIFIED

  • Required for many government tenders (PPRA, PTA)
  • International client requirement and competitive advantage
  • Mandatory for SBP-regulated fintech vendor compliance (Cyber Shield)
  • Demonstrates security maturity

Implementation StepsSOURCE VERIFIED

Step 1: Gap Assessment (2-4 weeks)
Step 2: ISMS Framework Design (4-6 weeks)
Step 3: Risk Assessment (3-4 weeks)
Step 4: Policy & Control Implementation (8-12 weeks)
Step 5: Internal Audit (2 weeks)
Step 6: Certification Audit by accredited body (2-4 weeks)
Company SizeConsultantCertificationTotal (PKR)
Small (5-20 staff)500K-1M300K-500K800K-1.5M
Medium (20-100 staff)1M-3M500K-1M1.5M-4M
Large (100+ staff)3M-8M1M-2M4M-10M

One-time costs. Annual surveillance audit: 30-50% of initial certification cost. Timeline: 6-12 months.

7. Compliance ChecklistSOURCE VERIFIED

Immediate (This Month)SOURCE VERIFIED

Short-term (1-3 Months)SOURCE VERIFIED

Medium-term (3-12 Months)SOURCE VERIFIED

8. Security Tools & CostsSOURCE VERIFIED

Free/Open Source
ToolPurpose
OpenVAS / GreenboneVulnerability scanning
Suricata / SnortIDS/IPS
WazuhSIEM / XDR
Let's EncryptSSL/TLS certificates
ClamAVAnti-malware
OWASP ZAPWeb app security testing
Paid (Production Recommended)
ToolPurposeCost
CrowdStrike FalconEDR/XDR$15-25/endpoint/mo
SentinelOneEDR$10-20/endpoint/mo
CloudflareWAF + CDN + DDoS$20-200/mo
AcunetixWeb vulnerability scanning$2,000-5,000/yr

Key Legal ReferencesSOURCE VERIFIED

ReferenceDescriptionSource
PECA 2016Electronic crimes — criminal penalties for unauthorized access, data theftPTA / FIA
CRMD CL01/2026 (Cyber Shield)Cyber resilience strategy 2025-2030 for all SBP-regulated entitiesSBP
PSD C4/2025 (Tech Risk Framework)Technology risk management for payment institutions — deadline March 2026SBP
PSD C1/202399.5% uptime SLA, downtime reporting requirementsSBP PSD
PSD CL6/2022Mobile app security — secure coding, VAPT, certificate pinningSBP PSD
NTISB GuidelinesMandatory cybersecurity standards for ISPs and telcosNTISB
PTA 5G Security GuidelinesSecurity requirements for 5G deploymentsPTA
PDPB (Draft)Personal Data Protection Bill — pending in ParliamentMoITT

Related PoliciesSOURCE VERIFIED

Cybersecurity Law Updates 2023-2025 (Federal/ICT)SOURCE VERIFIED

PECA 2025 — Social Media Protection Authority (Federal/ICT)

The PECA Amendment 2025 (Act II of 2025), effective Jan 29, 2025, creates the Social Media Protection and Regulatory Authority (SMPRA):

  • Content Regulation: SMPRA can order removal/blocking of "unlawful or offensive content" within 48 hours
  • Platform Registration: All social media platforms accessible from Pakistan must register with SMPRA
  • Blocking Power: SMPRA can partially or fully block non-compliant platforms
  • New offence — Aspersion: Spreading false, reputation-damaging information
  • Social Media Protection Tribunal: New judicial body for appeals
  • IT Company Impact: Platforms and apps with user-generated content must register, comply with takedown orders, and maintain local data presence
PECA Amendment 2025 »
PECA 2023 — Enhanced Child Protection & Cyberbullying (Federal/ICT)
OffencePenalty
Online grooming/solicitation of minors5-10 years + PKR 500K-10M fine (per PECA 2016 §22A)
Commercial sexual exploitation of children14-20 years + PKR 1M+ fine (per PECA 2016 §22B)
Cyber-kidnapping/trafficking of minors14-20 years + PKR 1M+ fine (per PECA 2016 §22C)
Cyberbullying1-5 years + PKR 100K-500K fine (per PECA 2016 §24A)
Child sexual abuse content (enhanced Sec 22)14-20 years (up from 7 years)
PECA Amendment 2023 »
Global Cybersecurity Market Data (2024-2032) (Federal/ICT)

Per PSEB Industry Profile on Cybersecurity:

MetricValue
Global cybersecurity market (2023)USD 172.24 billion
Projected (2032)USD 562.72 billion
CAGR14.3%
Cybercrime increase since COVID300%
CIOs planning to boost cybersecurity spend (2024)80%
Top companiesFortinet (USD 441B), Palo Alto (USD 106.2B), CrowdStrike (USD 77.2B)
First PC virus (1986)Brain virus — created by Pakistani brothers Amjad & Basit Farooq Alvi
PSEB Cybersecurity Profile »
PTA VPN Registration & Online Safety (Federal/ICT)
  • Commercial VPN Registration (2025): PTA introduced streamlined online registration for commercial VPNs — IT firms and freelancers operating VPNs must comply
  • Parental Control Software: PTA published guide listing free and paid parental control tools (Family Safety, Family Link, Apple Parental Controls, Net Nanny, Qustodio)
  • Social Media Community Guidelines: PTA guide references platform-specific guidelines (Snapchat, Discord, TikTok, YouTube, Twitter/X)
PTA Online Safety » | Parental Controls »
Digital Transaction Security & Notification Controls (Updated)
  • PSD CL1/2025 — Enhancing Digitization Measures — Banks directed to achieve 25% digital transaction targets by 2028. Mandates digital onboarding channels, digital fraud prevention controls, merchant QR onboarding, and real-time customer notifications. IT companies providing banking platforms must implement transaction monitoring, fraud detection, and notification APIs.
  • Mandatory Card Acceptance MCC Codes — MCC categories requiring mandatory payment card acceptance infrastructure. IT/acquiring companies must ensure POS and gateway systems handle these merchant categories.
  • Customer Notifications via Mobile Banking — Supplement to PSD C9/2018 security requirements. Free real-time SMS and push notifications mandatory for all digital payment transactions.
Key SBP Cybersecurity Regulations — Full Text PDFs

Complete texts of critical SBP cybersecurity and digital security regulations for IT companies:

  • Regulations for the Security of Internet Banking (PSD C3/2015) — Mandates security risk assessment, two-factor authentication, IDS/IPS deployment, outsourcing security controls, breach reporting within 48 hours, and annual independent security review. IT teams managing banking platforms must implement all administrative, technical, and physical safeguards.
  • Mobile Applications Security Guidelines (PSD CL6/2022) — Comprehensive mobile app security requirements: secure architecture, device binding, authentication, payment data protection, network security, session management, tampering detection, secure coding, and cryptography. All fintech app developers must comply.
  • Regulations for Payment Card Security (PSD C5/2016) — Card security framework, EMV compliance deadlines, PCI DSS requirements, fraud risk management, dispute resolution procedures, and data breach notification within 48 hours. IT companies in card processing must ensure full compliance.
  • FAQs on Security of Digital Payments (PSD C9/2018) — Implementation guidance for third-party VAPT, free transaction alerts, biometric verification for online banking, card on/off controls, and customer compensation. Critical reference for security teams implementing SBP mandates.
Newly Ingested Cybersecurity & Infrastructure Sources from PDF Archive
  • PRISM Operating Rules 2018 (Version 2.0) — RTGS security provisions for IT systems: queue management, message processing requirements, settlement account controls, system availability, and dispute resolution procedures relevant for cybersecurity of high-value payment infrastructure.
  • Raast P2M Payment Acceptance Rules — QR payment security requirements for merchant acceptance, including transaction authentication and fraud prevention controls.
  • Regulatory Approval System (RAS) User ManualSBP portal security: login controls, password policies, and access management for licensing applications.
  • White Label ATM Operator Guidelines — ATM security and physical/logical controls for shared infrastructure operators.
Cybersecurity Compliance Checklist
PECA 2016
Share:
NTISB Guidelines
Share:
NCERT Guidelines
Share:
BPRD C4/2024
Share:
PSEB Guidelines
Share:
MoITT PDPA 2023
Share:
NTC Security Standards
Share:
Checkboxes are saved in your browser
Source Citations (25)
PECA 2016 — Full Text (PDF)
https://na.gov.pk/uploads/documents/1470910659_707.pdf
pk_only 2016 law
https://www.pta.gov.pk/en/telecom-licensing
verified pdf
PSD C3/2015 — Regulations for Security of Internet Banking
https://www.sbp.org.pk/psd/2015/C3.htm
verified 2015 circular
PSD C5/2016 — Regulations for Payment Card Security
https://www.sbp.org.pk/psd/2016/C5.htm
verified 2016 circular
PSD C4/2025 — Technology Risk Management Framework for Payment Institutions
https://www.sbp.org.pk/psd/2025/C4.htm
verified 2025 circular
PSD C5/2016 — Regulations for Payment Card Security
https://www.sbp.org.pk/psd/2016/C5.htm
verified 2016 circular
PSD C9/2018 — Security of Digital Payments
https://www.sbp.org.pk/psd/2018/C9.htm
verified 2018 circular
PSEB IT Industry Profile: Cybersecurity
https://techdestination.com/
restricted 2024 report
PECA Amendment 2023 (Criminal Laws Amendment)
https://www.pta.gov.pk/en/laws/peca-amendment-2023
verified 2023 law
PECA Amendment 2025 — Social Media Regulation
https://www.pta.gov.pk/en/laws/peca-amendment-2025
verified 2025 law
Raast Person-to-Merchant (P2M) Payment Acceptance Rules
https://www.sbp.org.pk/laws/prt_bprd.asp
restricted 2024 pdf
Share: