{"id":1691,"date":"2007-08-23T00:00:00","date_gmt":"2007-08-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/23\/minister-for-information-technology-awais-ahmad-khan-leghari\/"},"modified":"2021-12-30T11:39:49","modified_gmt":"2021-12-30T11:39:49","slug":"minister-for-information-technology-awais-ahmad-khan-leghari","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/23\/minister-for-information-technology-awais-ahmad-khan-leghari\/","title":{"rendered":"Minister for Information Technology Awais Ahmad Khan Leghari"},"content":{"rendered":"<p>Minister for Information Technology Awais Ahmad Khan Leghari Thursday said the adoption of cyber crime bill by the federal cabinet was a major step towards ensuring a secure business environment and<br \/>\npromotion of e-commerce.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The minister was addressing a press conference a day after the federal cabinet approved the Prevention of Electronic Crime Bill 2007. The Federal Investigation Agency (FIA) has been given the mandate to probe<br \/>\ncases falling under the preview of the e-crime law.<\/p>\n<p>Awais Leghari said the proposed law titled as Prevention of Electronic Crimes Bill 2007 offers penalties ranging from six months to 10 years of punishment for 17 types of cyber crimes, including cyber terrorism,<br \/>\nhacking of websites and criminal access to secure data. Thirteen of the crimes listed under the law are bailable. <\/p>\n<p>http:\/\/www.paktribune.com\/news\/index.shtml?187463<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1691","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1691"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1691\/revisions"}],"predecessor-version":[{"id":4178,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1691\/revisions\/4178"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}