Support Centre

You have out of 5 free articles left for the month

Signup for a trial to access unlimited content.

Start Trial

Continue reading on DataGuidance with:

Free Member

Limited Articles

Create an account to continue accessing select articles, resources, and guidance notes.

Free Trial

Unlimited Access

Start your free trial to access unlimited articles, resources, guidance notes, and workspaces.

Pakistan: Cybersecurity

Quardia / Essentials collection / istockphoto.com

1. GOVERNING TEXTS

1.1. Legislation

Currently, Pakistan has no specific legislation in place addressing cybersecurity. However, the Ministry of Information Technology and Telecommunications ('MOITT') has prepared a consultation draft titled Personal Data Protection Bill 2021 ('the Bill'). The Bill inter alia provides for the protection of personal data, obligations of the data controller and data processor, data subject rights, the processing of sensitive personal data, exemptions, the establishment of the National Commission for Data Protection (‘NCPDP’), and complaints and offences. This Guidance Note primarily focuses on the provisions of the Bill.

Nevertheless, other cybersecurity-related legislation includes:

Notably, the MOITT has recently issued a consultation draft of its National Cyber Security Policy 2021. One of the significant aspects of the policy is to develop a 'Cyber Security Act', as well as rules and regulations for a national cybersecurity framework. It is expected that, upon finalisation of the policy, work on the drafting of the Cyber Security Act will begin.

1.2. Regulatory authority

As noted above, the Bill provides for the establishment of the NCPDP. Under the Bill, the NCPDP would be responsible for:

  • the protection of the interests of data subjects;
  • the enforcement of data protection;
  • the prevention of any misuse of personal data;
  • the promotion of awareness of data protection; and
  • the handling of complaints.

The NCPDP would also have executive and judicial powers, including the powers vested upon a Civil Court under the Code of Civil Procedure, 1908 last amended by the Code of Civil Procedure (Amendment) Act, 2020 to decide a complaint or pass any order for that purpose.

1.3. Regulatory authority guidance

As the Bill is at a consultation stage, and the NCPDP is not yet established, there is no guidance. However, the NCPDP, under Section 51 of the Bill, would be empowered to make the rules with the approval of the Federal Government of Pakistan ('the Government'). The NCPDP may make rules pertaining to:

  • codes of conduct and ethics by data controllers and processors;
  • compliance, publicity, and enforcement of such codes;
  • consultations with data controllers and processors;
  • interaction and cooperation with international and regional bodies; and
  • setting up or accreditation of bodies to audit the security measures of data controllers and processors.

2. SCOPE OF APPLICATION

As noted above, so far, Pakistan has no specific law on cybersecurity.

The Bill, pertaining to personal data protection, is however applicable when any of the data subject, data controller, or data processer is located in Pakistan. Accordingly, the Bill is applicable to any person who processes, has control over the processing, or authorises the processing of personal data.

Personal data, as per the Bill, means any information that relates directly or indirectly to a data subject, who is identified or identifiable from that information or from that information and other information in the possession of the data controller and/or data processor, including any sensitive personal data. Notably, anonymised or pseudonymised data which is incapable of identifying an individual is not personal data for the purposes of the Bill.

3. DEFINITIONS

Data subject: A natural person who is the subject of personal data.

Data controller: A natural or legal person, or the Government, who either alone or jointly has the authority to make a decision on the collection, obtaining, usage, or disclosure of personal data.

Data processor: A natural or legal person, or the Government, who alone or in conjunction with others processes data on behalf of the data controller.

Processing: Any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure, or destruction.

4. IMPLEMENTATION OF AN INFORMATION MANAGEMENT SYSTEM/FRAMEWORK

4.1. Cybersecurity training and awareness

Sections 33(2)(c) and 33(2)(d) of the Bill provide for the functions of the NCPDP, including:

  • taking steps to create public awareness about personal data protection rights; and
  • engaging, supporting, guiding, facilitating, training, and persuading data controllers and processors to ensure the protection of personal data.

As the NCPDP is not yet in existence at this point in time, there are no requirements in relation to training and awareness.

4.2. Cybersecurity risk assessments

Section 34(2)(c)(v) of the Bill provides that the NCPDP is empowered to formulate a compliance framework for monitoring and enforcement in order to ensure transparency and accountability, which may include measures, such as Data Protection Impact Assessments ('DPIAs').

As the NCPDP is not yet established at this point in time, there are no requirements in relation to conducting risk assessments.

4.3. Vendor management

Section 8.3 of the Bill provides that where the processing of personal data is carried out by a data processor on behalf of the data controller, the data controller must, for the purpose of protecting the personal data from any loss, misuse, modification, unauthorised or accidental access, disclosure, alteration, or destruction, ensure that the data processor undertakes to adopt applicable technical and organisational international security standards, as prescribed by the NCPDP.

Notably, under Section 8.4 of the Bill, the data processor is independently liable to take steps to ensure compliance with such security standards.

Furthermore, to ensure transparency and accountability, the NCPDP may formulate a compliance framework to regulate the processing of personal data by entities other than the data controller (Section 34(2)(c)(ix) of the Bill).

4.4. Accountability/record keeping

In accordance with Section 11 of the Bill, a data controller is required to keep and maintain a record of each application, notice, request, or any other information relating to personal data that has been, or is being processed, by the data controller. The NCPDP is to determine the manner and form in which such record is to be maintained.

The data controller is to intimate to NCPDP, on a regular basis, the type of data collected and processing undertaken on the collected data.

5. DATA SECURITY

Electronic Transactions Ordinance

For the purposes of conducting electronic transactions, Section 2(x) of the Electronic Transactions Ordinance defines the 'security procedure' as a procedure which:

  • is agreed between parties;
  • is implemented in the normal course by a business and which is reasonably secure and reliable; or
  • in relation to a certificate issued by a certification service provider, is specified in its certification practice statement for establishing the authenticity or integrity, or both, of any electronic document, which may require the use of algorithms or codes, identifying words and numbers, encryption, answer back or acknowledgement procedures, software, hardware, or similar security devices.

The Electronic Certification Accreditation Council ('ECAC'), established under Section 18 of the Electronic Transactions Ordinance, is mandated to grant and renew the security procedures of the certification service providers. ECAC grants accreditation to security procedures of those service providers who comply with the criteria for accreditation specified in the relevant regulations.

Section 41(1) of the Electronic Transactions Ordinance also provides that no person shall be compelled to disclose any password, key, or other secret information exclusively within their private knowledge, which enables their use of the security procedure or advanced electronic signature.

Bill

Section 8.1 of the Bill provides that the NCPDP shall, keeping in mind national interest, prescribe best international standards to protect personal data from any loss, misuse, modification, unauthorised or accidental access, or disclosure, alteration, or destruction. Failure to adopt appropriate data security measures attracts the imposition of a fine. All data controllers and data processors are required to adopt necessary security measures within a period of six months from the day the Bill comes into force.

6. NOTIFICATION OF CYBERSECURITY INCIDENTS

Section 13 of the Bill requires the data controller to report, within 72 hours of a data breach, to the NCPDP and the data subject. The exception is where the personal data breach is unlikely to result in a risk to the rights and freedoms of the data subject.

In case the notification is made beyond 72 hours, the notification must state valid reasons for the delay.

The notification must contain the following information:

  • description of the nature of the personal data breach, including, where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned;
  • name and contact details of the data protection officer ('DPO') or another contact point where more information can be obtained;
  • likely consequences of the personal data breach; and
  • measures adopted or proposed to be adopted by the data controller to address the personal data breach, including, where appropriate, measures to mitigate its possible adverse effects.

7. REGISTRATION WITH AUTHORITY

The Bill empowers the NCPDP to devise a registration mechanism for data controllers and data processors.

8. APPOINTMENT OF A SECURITY OFFICER

The Bill does not have an express requirement to appoint a DPO or a security officer. However, the Bill empowers the NCPDP to formulate a compliance framework for monitoring and enforcement with respect to the responsibilities of a DPO. It follows that, on promulgation of the Bill, the NCPDP would devise rules for the appointment of a DPO and their responsibilities.

9. SECTOR-SPECIFIC REQUIREMENTS

Financial services

The following cybersecurity-related regulations apply to the financial sector:

General requirements

Section 70 of the Payment Systems Act provides that a financial institution or any other authorised party shall not divulge any information relating to electronic fund transfer, affairs, or account of its consumer.

Regulation 4.2(i) of the Regulations for Payment Card Security requires that card service providers must ensure the confidentiality of consumers' data in storage, transmission, and processing.

Regulation 2.2.3(c) of the Regulations for the Security of Internet Banking requires that customer information shall not be transferred to unauthorised storage or access medium.

Risk assessment

The SBP, through Circular No. 09, instructed all the banks/microfinance banks to carry out an extensive vulnerability assessment and penetration testing to identify potential weaknesses. In addition to internal assessment, the banks/microfinance banks are to arrange an independent third-party review/assessment of their payment systems.

Breach notification

For the banking sector, the Regulations for Payment Card Security requires that, in case of a security breach, a detailed report is to be submitted within 14 days to the SBP. In addition, the Regulations for the Security of Internet Banking provide that all established security breaches should be reported to the SBP on a quarterly basis. The impact of a security breach on banks' business, systems, applications, and customers is also required to be submitted.

Telecommunications

The Telecom Security Regulations are applicable to all PTA licensees for the security of critical telecom data and critical telecom infrastructure related to the telecommunications sector. The Telecom Security Regulations place certain obligations on the licensees, including:

  • constituting a steering committee of high-level representation from key operational areas;
  • ensuring physical and environmental security;
  • putting in place automated network monitoring systems;
  • protecting critical telecom infrastructure against malicious software activity;
  • ensuring the privacy of critical telecom data stored by the licensee;
  • ensuring the protection of critical telecom infrastructure;
  • backup maintenance;
  • reporting to a computer emergency response team; and
  • ensuring service and cybersecurity continuity and carrying out quarterly reviews of cybersecurity measures for analysis and improvement.

Regulation 16 of the Telecom Consumers Regulations requires that telecom services operators and their employees maintain the confidentiality of information about consumers.

Regulation 5(2)(xxi) of the Mobile Banking Regulations requires that a service-level agreement between third-party service providers, telecom operators, and authorised financial institutions shall be covered in a statement of online privacy that consumer information obtained as a result of mobile banking is collected, used, disclosed, and retained as committed or agreed.

Employment

Not applicable.

Education

Not applicable.

Insurance

Not applicable.

10. PENALTIES

Offence


Punishment

Nature

Payment Systems Act

Any financial institution or service provider who wilfully fails to comply with the provisions of the Payment Systems Act or rules, circulars, directions, orders, or by-laws issued under the Payment Systems Act


A fine that may extend to PKR 1 million (approx. €4,651). In case of failure to pay the fine, the SBP may suspend or revoke the license of the service provider or the financial institution.

Civil

The Telecom Act

Contravention of any rules or regulations issued under the Pakistan Telecommunication (Re-organization) Act, 1996 ('the Telecom Act')


Imprisonment for three years or fine of PKR 10 million (approx. €46,512), or both.

Criminal

The Bill

A data controller not ceasing the processing of personal data after withdrawal of consent by the data subject

Fine up to PKR 5 million (approx. €23,256).

Criminal

Anyone who processes or causes to be processed, disseminates, or discloses personal data in violation of the Bill

Fine up to PKR 15 million (approx. €69,767) and, in case of subsequent unlawful processing, the fine may be raised up to PKR 25 million (approx. €116,279). In case of sensitive data, the fine may be raised to PKR 25 million (approx. €116,279).

Civil

Failure to adopt the security measures that are necessary to ensure data security

Fine up to PKR 5 million (approx. €23,256).

Civil

Failure to comply with the orders of the NCPDP or the court

Fine up to PKR 2.5 million (approx. €11,628).

Civil

Failure to respond to a notice issued by the NCPDP, failure to satisfy the NCPDP about any alleged contravention, or failure to remedy any contravention within the time allowed by the NCPDP

Fine up to PKR 250 million (approx. €1.16 million).

Civil

Corporate liability on a legal person


Fine not exceeding 1% of its annual gross revenue in Pakistan or PKR 30 million (approx. €139,535), whichever is higher.


Civil

PECA

Unauthorised access to information system or data

Imprisonment up to three months or fine up to PKR 50,000 (approx. €233), or both.

Criminal

Unauthorised copying or transmission of data

Imprisonment up to six months or fine up to PKR 100,000 (approx. €465), or both.

Criminal

Interference with information system or data

Imprisonment up to two years or fine up to PKR 500,000 (approx. €2,326), or both.

Criminal

Unauthorised access to critical infrastructure information system or data

Imprisonment up to three years or fine up to PKR 1 million (approx. €4,651), or both.

Criminal

Unauthorised copying or transmission of critical infrastructure data

Imprisonment up to five years or fine up to PKR 5 million (approx. €23,256), or both.

Criminal

Interference with critical infrastructure information system or data

Imprisonment up to seven years or fine up to PKR 10 million (approx. €46,512), or both.

Criminal

Electronic forgery

Imprisonment up to three years or fine up to PKR 250,000 (approx. €1,163), or both.

Criminal

Electronic forgery in relation to critical infrastructure information system or data

Imprisonment up to seven years or fine up to PKR 5 million (approx. €23,256), or both.

Criminal

Unauthorised use of identity information

Imprisonment up to three years or fine up to PKR 5 million (approx. €23,256), or both.

Criminal

Compensation

The court may, in addition to the above punishments, make an order for payment of compensation for any damage or loss caused to the victim.


Criminal


11. OTHER AREAS OF INTEREST

Right of complaint

In Section 48 of the Bill, it is provided that any individual or relevant person may file a complaint before the NCPDP against any violation of personal data protection rights, the conduct of any data controller, and data processor of their processes, involving the following:

  • a breach of the data subject's consent to process their data;
  • a breach of the obligations of the data controller or the data processor during the performance of their functions;
  • a provision of incomplete, misleading, or false information while taking consent of the data subject; and
  • any other matter relating to the protection of personal data.

The NCPDP is required to provide an answer to the complaint within 30 days of its receipt or within such an extended time, for reasons to be recorded in writing, as reasonably determined by it.

Appeals against the decisions of the NCPDP are to lie with the High Court or to any other Tribunal established by the Government for the purpose in the manner prescribed by the High Court.

Network and information systems

The term 'network' is not defined. However, 'information system' is defined, in Section 2(p) of the Electronic Transactions Ordinance and in Section 2(xx) of PECA, as an electronic system for creating, generating, sending, receiving, storing, reproducing, displaying, recording, or processing information.

Electronic transactions

The provisions of the Electronic Transactions Ordinance are applicable, by virtue of Section 32, notwithstanding the matters being the subject hereof occurring outside Pakistan in so far as they are directly or indirectly connected to information systems within the territorial jurisdiction of Pakistan.

Section 13(1)(c) of the Electronic Transactions Ordinance provides that an electronic communication shall be deemed to be that of the originator if it was sent by an information system programmed by, or on behalf of, the originator.

Section 15 of the Electronic Transactions Ordinance provides the source rules for the determination of the time and place of dispatch and receipt of the electronic communication, unless otherwise agreed between the originator and the addressee. The dispatch occurs when the electronic communication enters an information system outside the control of the originator. The receipt of an electronic communication occurs at the time which the electronic communication enters the information system designated by the addressee, or when the addressee retrieves the same from an information system that is not the designated information system. In case the addressee has not designated an information system, the receipt occurs when the electronic communication enters an information system of the addressee.

The place of dispatch or receipt of electronic communication is not dependent upon the place of location of the information system, but, unless otherwise agreed between the originator and the addressee, is the place where the originator or addressee ordinarily resides or has their place of business.

PECA

Sections 3 and 5 of PECA provide that unauthorised access and interference with an information system is an offence punishable with imprisonment, or a fine, or both (see section 10 above for further information).

Section 27 of PECA provides that any offence, under this law or any other law, shall not be denied legal recognition and enforcement for the sole reason of the offence being committed in relation to or through the use of an information system. Furthermore, reference to 'property' in any law creating an offence in relation to or concerning property shall include information system.

Section 33 of PECA provides the process to be followed by the authorised officer with the seizure of the information system.

Critical information infrastructure operators

Sections 2(x) and 2(xi) of PECA respectively define 'critical infrastructure' and 'critical infrastructure information system or data' as follows:

'Critical infrastructure' means critical elements of infrastructure namely assets, facilities, systems, networks, or processes the loss or compromise of which could result in:

  • major detrimental impact on the availability, integrity, or delivery of essential services, including those services, whose integrity, if compromised, could result in significant loss of life or casualties, taking into account significant economic or social impacts; or
  • significant impact on national security, national defence, or the functioning of the State.

In this regard, the Government may designate any private or government infrastructure as critical infrastructure as may be prescribed under PECA.

Furthermore, 'critical infrastructure information system or data' means an information system, programme, or data that supports or performs a function with respect to critical infrastructure.

Sections 6, 7, and 8 of PECA provide that unauthorised access, copying, transmission, and interference with a critical information system or data is an offence punishable with imprisonment, or a fine, or both (see section 10 above for further information).

Section 13(2) of PECA provides that committing electronic forgery in relation to a critical infrastructure information system is an offence punishable with imprisonment, or a fine, or both (see section 10 above for further information).

Section 49 of PECA empowers the Government to constitute one or more computer emergency response teams to respond to any threat or attack on any critical infrastructure information system or critical infrastructure data, or any widespread attack on information systems in Pakistan.

Finally, under the Telecom Security Regulations, any equipment/assets whether physical or virtual, which are vital for the provisions of telecom licensed services and for sorting, processing, and transferring data is defined as 'Critical Telecom Infrastructure' (please see section 9 above for further information).

Digital service providers

Section 2(zi) of the Payment Systems Act defines the 'service provider' as an operator or any other electronic fund transfer service provider.

Regulation 2(1)(xxviii) of the Mobile Banking Regulation defines 'Third Party Service Provider ('TPSPs') as a Class Applications Service Provider for technical support of mobile banking services, licenced by the PTA and authorised by the SBP to provide technical services for channelling, routing, and switching transactions for branchless/mobile banking only. It should be noted that TPSPs shall be used for interoperability purposes within branchless banking domain, whereas Payment System Operators ('PSOs') and Payment Service Providers ('PSPs') shall provide an electronic platform for clearing, processing, routing, and switching or electronic transactions under rules for PSOs and PSPs issued, and as amended, by the SBP from time to time.

Saifullah Khan Managing Partner
[email protected]
Saeed Hasan Khan Partner
[email protected]
S.U.Khan Associates Corporate & Legal Consultants, Islamabad

Feedback