SJTubrazy Cyber Lawyer

shahid jamal tubrazy cyber lawyer

SJTubrazy Cyber Lawyer started his cyberlaw practice in 2005. From his start, he was interested in computer and internet laws.  At that time there was no registered cyberlaw course available to learn. Therefore, He started to research every term and phrase relating cyber laws, consequently, his tireless hard work reformed into compiling reference cyber law books.  His cyber law books recognized as first-ever locally authored books in Pakistan. The details of his published books locally and at an international level are given hereunder;

Electronic Transaction Laws:

The Electronic Transaction Laws authored by SJTubrazy Cyber Lawyer, this book with up to date commentary, explains Electronic Transaction Ordinance 2002 with relevant law precedents. It aims to provide for the legal framework so that legal sacredness is harmonized to all electronic records and other activities carried out by electronic means. This clearly stipulates an acceptance of the contract may be expressed by electronic means of communication and the same shall have legal validity and enforceability. ETO 2002 provides a mechanism to apprehend cybercrime against the privacy of information systems and damage to the information systems.

https://www.amazon.com/Electronic-Transaction-Laws-Pakistan-Admissibility-ebook/dp/B01INZ4NOC

Prevention of Electronic Crimes 2008:

This ordinance was passed in 2008. There were a lot of technical terms and computer phrases, hence, SJTubrazy explained every term with reference to the settled precedent of court orders and judgments.  A detailed account of commentary by SJTubrazy Cyber Lawyer made this book more explanatory.

Cyber Jurisprudence:

A large part of this book contained principles and theories elaborated by SJTubrazy Cyber Lawyer. Through the start of digital telecommunication technology, computer, and the internet various types of issues and concerns are being faced by human beings today. Earlier, these issues never ever were met up by a man in the physical world. The concerns relating to the computer and the internet in fact are new phenomena of cyberspace and in the real-world as well. The existence and form of things in cyberspace may be different while the rights and liabilities may be the same. The legal electronic empire is being developed, the rights and liabilities have to be fixed, legal electronic documents are being formed. Jurisdiction and court venues are being determined and online ethics is being emphasized etc, all these required a specific philosophy of law to evolve all the issues and propositions of cyberspace that would be cyber jurisprudence.

https://www.amazon.com/Cyber-Jurisprudence-Theories-Concepts-Principles-ebook/dp/B01JOAX8JQ

Discovery of Digital Forensic Laws 2014:

This book is also the first-ever published in Pakistan. There are details of settled principles and practices to collect digital evidence. There is a well-explained commentary of Statutory law (amended articles) e.g. Qanon – e – Shahadat Order 1984.A detailed account of commentary by SJTubrazy Cyber Lawyer made this book more explanatory.

Cyber Secure Women in Pakistan:

Endeavor in this booklet, to suggest the maximum measures of online safety and security to women. Information technology is a tool in the hands of criminals to become a potential threat against women. The best practical way to save women online is to set up security precautions while being or communicating on the internet. A detailed account of commentary by SJTubrazy Cyber Lawyer made this book more explanatory.

https://www.amazon.com/Cyber-Secure-Women-Pakistan-Security/dp/1544783701

Cyber Defamation  Laws:

Cyber defamation is not a specific criminal offense, misdemeanor, or tort, but rather defamation or slander conducted via digital media, usually through the Internet. Penalties for “cyber defamation” vary from country to country, but the fundamental rights covered in the UN Declaration of Human Rights and European Union Fundamental Human Rights. Stopping or addressing defamation can be difficult. If the person has no serious grudge, then a cease and desist letter may stop the behavior and get the statements removed from the Internet. On the other hand, if the person is acting out of spite, it may be necessary to file a complaint with the court depending on local law.

https://www.amazon.com/Cyber-Defamation-Laws-Practices-Pakistan/dp/153545167X

Law of Digital Forensic :

This book provides details on how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative discovery section of the book provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Interception Investigation. Digital evidence is a type of evidence that is stored on or transmitted by computers which can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Nevertheless, an aggregate number of criminals are using computers and computer networks, few investigators are familiar with the evidentiary, technical, and legal issues related to digital evidence.

https://www.amazon.com/Electronic-Evidence-Discovery-Forensic-Laws/dp/1508452024

Cyber Security for Lawyers and Judges:

Unauthorized online access to the Mossack Fonseca law firm in the year of 2016, resulting in the worldwide release of what has become known as the Panama leaks, it has an extraordinary impact upon its vast clientele list. Law firms have been identified by security hackers as a rich source of information that might be more difficult to access elsewhere. Lawyers keep sensitive client information that can be of value to not just criminals but to other communities as well. In this book, a complete mechanism of cybersecurity has been given to ensure the online security and safety of law-related professions.

https://www.amazon.com/Cybersecurity-Lawyers-Judges-International-Principles/dp/1797885189

  Cybercrimes Investigation:

In the book, the first part of the process of registration of cybercrime report/complaint is elaborated in simple language avoiding lengthy legal lexicon with the aim to assist the layman as guidelines to get help, a good detail part of cyber cross-examination is included for lawyers and judges to understand what type and form may be of cross-examination in the court. The following groups and individuals are considered to be the objective reader of this book, police organizations or law enforcement agencies including prosecutors, lawyers, and courts conducting cyber-criminal investigation and trial, staff members of organizations conducting similar professional duties. Staff members investigating organization misdeeds, persons who have knowledge relating to the criminal investigation but who do not do when confronted with the term “cybercrime”, law students, and persons who conduct research/development/instruction in the program, which train cybercrime investigation and can exhibit a high level of effectiveness in a short period of time.

https://www.amazon.com/Cyber-Crimes-Investigation-Procedure-Practices/dp/1095623613

Theorem of Electronic Access:

Generally, access means of approaching, entering, exiting, communicating with, but technically programs can access memory, which means they read data from or write data to main memory. A user can access files, directories, computers, or peripheral devices. Particularly, access often means to read data from or write data to a mass storage digital device. The word access has become more qualified with digital communication as unlike the word “act” in the physical world is determinant of any activity irrespective lawful and unlawful, the word “access” is the genesis of any action in the cyberspace world. The theorem of access in the digital world being an auxiliary to any digital system may be analyzed on practical methodology.

https://www.amazon.com/Theorem-Electronic-Access-theory-computer/dp/1544645104

Law Define Data Processing:

Data controllers and processors are responsible for ensuring that they take all necessary measures to ensure that they comply with the law. It is not sufficient that they comply with the law, but they must clearly elucidate how they are compliant to demonstrate, that processing is performed in accordance with the law. Data controllers and data processors implement appropriate technical and organizational measures to ensure and to be able to demonstrate, that processing is performed in accordance with the law. A detailed account of commentary by SJTubrazy Cyber Lawyer made this book more explanatory.

Law Defines Data:

Local laws need to define data in good detail and with extensive interpretation. Most data collection is concentrated on electronic data, and since this type of data collection covers so much information, it usually crosses into the realm of big data, which yet to define according to its implication. In this book, data has been defined practically and legally with its repercussion. This book may be a helpful tool for info-tech students, lawyers, judiciary members, and personals of law enforcement agencies. A detailed account of commentary by SJTubrazy Cyber Lawyer made this more explanatory.

https://www.amazon.com/Law-Defines-Data-Protection-Pakistan-ebook/dp/B07NLH26KS

Investigation of Fair Trial Act 2013:

The Investigation for Fair Trial Act 2013 provides a mechanism for conducting lawful, transparent investigations using modern means, which constitute an integral basis for trial and ensure evidence is collected in accordance with the law while balancing the rights of privacy of individuals with effective administration of justice. The legislation has incorporated offenses under the Private Military Organizations Abolition and Prohibition Act 1974, Prevention of Anti-National Activities Act 1974, Pakistan Nuclear Regulatory Authority Ordinance 2001, and National Command Authority Act 2010 as well. A detailed account of commentary by SJTubrazy Cyber Lawyer made this more explanatory.

https://www.amazon.com/Investigation-Fair-Trial-Act-2013/dp/148276931X

Digital evidence in Canada and USA:

S J Tubrazy Cyber Lawyer, in this book, delivers an introduction to the topic of Digital Forensics, covering theoretical, practical, and legal aspects with reference to Canada and the US legal system. The first part of the book focuses on the history of digital forensics as a discipline and discusses the mannerisms and requirements needed to become a forensic analyst. The middle portion of the book constitutes a general guide to a digital forensic investigation, mostly focusing on computers. It finishes with a discussion of the legal aspects of digital forensics as well as some other observations for managers or other interested parties. This book provides details on how to conduct digital investigations in both criminal and civil contexts, and how to locate and utilize digital evidence on computers, networks, and embedded systems. Specifically, the Investigative discovery section of the book provides expert guidance in the three main areas of practice: Forensic Analysis, Electronic Discovery, and Interception Investigation.

https://www.amazon.com/Digital-Evidence-Forensic-Laws-Canada/dp/1541343379

Role of Processors in Data Protection Law:

This book by SJTubrazy Cyber Lawyer, explains responsibility and execution are solutions to the success of the protection of personal data. The law should clearly recognize the parties accountable for observing with the law, as well as their obligations and duties to warrant compliance and protection of the rights of individuals. The law defines data controllers and processors and provides clear responsibilities, obligations, and liability for both. The law also addresses the relationship between controllers and processors and specifies clear requirements as to what is expected of each of them. Controllers and processors are subject to record-keeping obligations, security obligations, and data breach notification prerequisites.

https://www.amazon.com/Role-Processors-Protection-International-Practices-ebook/dp/B07PQ2CGW4

Manual of Cyber Laws in Pakistan:

The book (Manual of Cyber Laws, Practice and Procedure in Pakistan by S J Tubrazy cyber lawyer) is an anthology of four major electronic laws of the land in Pakistan, Electronic Transaction Ordinance 2002, Payment Systems Electronic Funds Transfer Act 2007, Prevention of Electronic Crime Ordinance 2008, and Domain Name Dispute Resolution Policy 1999. This book along with comprehensive relevant up to date case laws commentary of all enactments and laws is a perfect description that presents clear explanations of the legal principles, practice, and procedure under governing the rights, duties, and liabilities.

https://www.amazon.com/Manual-Cyber-Laws-Pakistan-Procedure/dp/1482382458

Drafting Terms and Conditions of Websites:

This book focused on the concept of how to write or draft the terms and conditions of websites from a legal perspective in different areas. S J Tubrazy cyber lawyer provided a detailed account of principles to understand the rationale of the website’s terms and conditions.

Cybercrimes Help

Cybercrimes Lawyer

Scroll to Top