"\u003chtml xmlns:v=\"urn:schemas-microsoft-com:vml\"\r\nxmlns:o=\"urn:schemas-microsoft-com:office:office\"\r\nxmlns:w=\"urn:schemas-microsoft-com:office:word\"\r\nxmlns:st1=\"urn:schemas-microsoft-com:office:smarttags\"\r\nxmlns=\"http://www.w3.org/TR/REC-html40\"\u003e\r\n\r\n\u003chead\u003e\r\n\u003cmeta http-equiv=Content-Type content=\"text/html; charset=windows-1252\"\u003e\r\n\u003cmeta name=ProgId content=Word.Document\u003e\r\n\u003cmeta name=Generator content=\"Microsoft Word 11\"\u003e\r\n\u003cmeta name=Originator content=\"Microsoft Word 11\"\u003e\r\n\u003clink rel=File-List href=\"2024J3_files/filelist.xml\"\u003e\r\n\u003ctitle\u003e305\u003c/title\u003e\r\n\u003co:SmartTagType namespaceuri=\"urn:schemas-microsoft-com:office:smarttags\"\r\n name=\"country-region\"/\u003e\r\n\u003co:SmartTagType namespaceuri=\"urn:schemas-microsoft-com:office:smarttags\"\r\n name=\"PlaceType\"/\u003e\r\n\u003co:SmartTagType namespaceuri=\"urn:schemas-microsoft-com:office:smarttags\"\r\n name=\"PlaceName\"/\u003e\r\n\u003co:SmartTagType namespaceuri=\"urn:schemas-microsoft-com:office:smarttags\"\r\n name=\"place\"/\u003e\r\n\u003c!--[if gte mso 9]\u003e\u003cxml\u003e\r\n \u003co:DocumentProperties\u003e\r\n \u003co:Author\u003efarhan\u003c/o:Author\u003e\r\n \u003co:Template\u003eNormal\u003c/o:Template\u003e\r\n \u003co:LastAuthor\u003eUser\u003c/o:LastAuthor\u003e\r\n \u003co:Revision\u003e2\u003c/o:Revision\u003e\r\n \u003co:TotalTime\u003e1\u003c/o:TotalTime\u003e\r\n \u003co:LastPrinted\u003e2023-12-29T06:05:00Z\u003c/o:LastPrinted\u003e\r\n \u003co:Created\u003e2024-05-07T14:11:00Z\u003c/o:Created\u003e\r\n \u003co:LastSaved\u003e2024-05-07T14:11:00Z\u003c/o:LastSaved\u003e\r\n \u003co:Pages\u003e4\u003c/o:Pages\u003e\r\n \u003co:Words\u003e1189\u003c/o:Words\u003e\r\n \u003co:Characters\u003e6781\u003c/o:Characters\u003e\r\n \u003co:Lines\u003e56\u003c/o:Lines\u003e\r\n \u003co:Paragraphs\u003e15\u003c/o:Paragraphs\u003e\r\n \u003co:CharactersWithSpaces\u003e7955\u003c/o:CharactersWithSpaces\u003e\r\n \u003co:Version\u003e11.5606\u003c/o:Version\u003e\r\n \u003c/o:DocumentProperties\u003e\r\n\u003c/xml\u003e\u003c![endif]--\u003e\u003c!--[if gte mso 9]\u003e\u003cxml\u003e\r\n \u003cw:WordDocument\u003e\r\n \u003cw:ActiveWritingStyle Lang=\"EN-US\" VendorID=\"64\" DLLVersion=\"131077\"\r\n NLCheck=\"1\"\u003e1\u003c/w:ActiveWritingStyle\u003e\r\n \u003cw:ActiveWritingStyle Lang=\"EN-GB\" VendorID=\"64\" DLLVersion=\"131077\"\r\n NLCheck=\"1\"\u003e1\u003c/w:ActiveWritingStyle\u003e\r\n \u003cw:ActiveWritingStyle Lang=\"EN-US\" VendorID=\"64\" DLLVersion=\"131078\"\r\n NLCheck=\"1\"\u003e1\u003c/w:ActiveWritingStyle\u003e\r\n \u003cw:DrawingGridHorizontalSpacing\u003e9.35 pt\u003c/w:DrawingGridHorizontalSpacing\u003e\r\n \u003cw:DisplayVerticalDrawingGridEvery\u003e2\u003c/w:DisplayVerticalDrawingGridEvery\u003e\r\n \u003cw:ValidateAgainstSchemas/\u003e\r\n \u003cw:SaveIfXMLInvalid\u003efalse\u003c/w:SaveIfXMLInvalid\u003e\r\n \u003cw:IgnoreMixedContent\u003efalse\u003c/w:IgnoreMixedContent\u003e\r\n \u003cw:AlwaysShowPlaceholderText\u003efalse\u003c/w:AlwaysShowPlaceholderText\u003e\r\n \u003cw:Compatibility\u003e\r\n \u003cw:SelectEntireFieldWithStartOrEnd/\u003e\r\n \u003cw:UseWord2002TableStyleRules/\u003e\r\n \u003c/w:Compatibility\u003e\r\n \u003cw:BrowserLevel\u003eMicrosoftInternetExplorer4\u003c/w:BrowserLevel\u003e\r\n \u003c/w:WordDocument\u003e\r\n\u003c/xml\u003e\u003c![endif]--\u003e\u003c!--[if gte mso 9]\u003e\u003cxml\u003e\r\n \u003cw:LatentStyles DefLockedState=\"false\" LatentStyleCount=\"156\"\u003e\r\n \u003c/w:LatentStyles\u003e\r\n\u003c/xml\u003e\u003c![endif]--\u003e\u003c!--[if !mso]\u003e\u003cobject\r\n classid=\"clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D\" id=ieooui\u003e\u003c/object\u003e\r\n\u003cstyle\u003e\r\nst1\\:*{behavior:url(#ieooui) }\r\n\u003c/style\u003e\r\n\u003c![endif]--\u003e\r\n\u003cstyle\u003e\r\n\u003c!--\r\n /* Font Definitions */\r\n @font-face\r\n\t{font-family:\"Tms Rmn\";\r\n\tpanose-1:2 2 6 3 4 5 5 2 3 4;\r\n\tmso-font-charset:0;\r\n\tmso-generic-font-family:roman;\r\n\tmso-font-format:other;\r\n\tmso-font-pitch:variable;\r\n\tmso-font-signature:3 0 0 0 1 0;}\r\n@font-face\r\n\t{font-family:\"MS Mincho\";\r\n\tpanose-1:2 2 6 9 4 2 5 8 3 4;\r\n\tmso-font-alt:\"?l?r ?? fc\";\r\n\tmso-font-charset:128;\r\n\tmso-generic-font-family:roman;\r\n\tmso-font-format:other;\r\n\tmso-font-pitch:fixed;\r\n\tmso-font-signature:1 134676480 16 0 131072 0;}\r\n@font-face\r\n\t{font-family:Tahoma;\r\n\tpanose-1:2 11 6 4 3 5 4 4 2 4;\r\n\tmso-font-charset:0;\r\n\tmso-generic-font-family:swiss;\r\n\tmso-font-pitch:variable;\r\n\tmso-font-signature:1627421319 -2147483648 8 0 66047 0;}\r\n@font-face\r\n\t{font-family:\"CG Times\";\r\n\tpanose-1:0 0 0 0 0 0 0 0 0 0;\r\n\tmso-font-alt:\"Times New Roman\";\r\n\tmso-font-charset:0;\r\n\tmso-generic-font-family:roman;\r\n\tmso-font-format:other;\r\n\tmso-font-pitch:variable;\r\n\tmso-font-signature:3 0 0 0 1 0;}\r\n@font-face\r\n\t{font-family:\"\\@MS Mincho\";\r\n\tpanose-1:0 0 0 0 0 0 0 0 0 0;\r\n\tmso-font-charset:128;\r\n\tmso-generic-font-family:roman;\r\n\tmso-font-format:other;\r\n\tmso-font-pitch:fixed;\r\n\tmso-font-signature:1 134676480 16 0 131072 0;}\r\n@font-face\r\n\t{font-family:Verdana;\r\n\tpanose-1:2 11 6 4 3 5 4 4 2 4;\r\n\tmso-font-charset:0;\r\n\tmso-generic-font-family:swiss;\r\n\tmso-font-pitch:variable;\r\n\tmso-font-signature:536871559 0 0 0 415 0;}\r\n@font-face\r\n\t{font-family:BookmanSSK;\r\n\tmso-font-alt:\"Courier10 Win95BT\";\r\n\tmso-font-charset:0;\r\n\tmso-generic-font-family:auto;\r\n\tmso-font-pitch:variable;\r\n\tmso-font-signature:131 0 0 0 9 0;}\r\n /* Style Definitions */\r\n p.MsoNormal, li.MsoNormal, div.MsoNormal\r\n\t{mso-style-parent:\"\";\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\nh1\r\n\t{mso-style-next:Normal;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:1;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-font-kerning:0pt;\r\n\tfont-weight:normal;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\nh2\r\n\t{mso-style-next:Normal;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:2;\r\n\ttab-stops:.5in;\r\n\tfont-size:16.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tfont-weight:normal;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\nh3\r\n\t{mso-style-next:Normal;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:3;\r\n\ttab-stops:.5in;\r\n\tfont-size:16.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-bidi-font-weight:normal;\r\n\tfont-style:italic;\r\n\tmso-bidi-font-style:normal;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\nh4\r\n\t{mso-style-next:Normal;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:4;\r\n\ttab-stops:.5in 1.0in 88.3pt 1.5in 1.75in 2.0in 2.5in 3.0in 3.5in 4.0in 4.5in 5.0in 5.5in 6.0in 6.5in;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"Tms Rmn\";\r\n\tcolor:black;\r\n\tlayout-grid-mode:line;\r\n\tmso-bidi-font-weight:normal;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\nh5\r\n\t{mso-style-next:Normal;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:5;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tfont-weight:normal;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\nh6\r\n\t{mso-style-next:Normal;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:6;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-bidi-font-weight:normal;\r\n\tmso-bidi-font-style:italic;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\np.MsoHeading7, li.MsoHeading7, div.MsoHeading7\r\n\t{mso-style-next:Normal;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:7;\r\n\tfont-size:14.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tfont-weight:bold;\r\n\tmso-bidi-font-weight:normal;}\r\np.MsoHeading8, li.MsoHeading8, div.MsoHeading8\r\n\t{mso-style-next:Normal;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:8;\r\n\tfont-size:10.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";\r\n\tfont-weight:bold;}\r\np.MsoHeading9, li.MsoHeading9, div.MsoHeading9\r\n\t{mso-style-next:Normal;\r\n\tmargin-top:0in;\r\n\tmargin-right:1.45pt;\r\n\tmargin-bottom:0in;\r\n\tmargin-left:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:right;\r\n\ttext-indent:.5in;\r\n\tmso-pagination:widow-orphan;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:9;\r\n\tmso-layout-grid-align:none;\r\n\tpunctuation-wrap:simple;\r\n\ttext-autospace:none;\r\n\tfont-size:12.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:Arial;\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-ansi-language:EN-GB;\r\n\tfont-weight:bold;\r\n\tmso-bidi-font-weight:normal;}\r\np.MsoFootnoteText, li.MsoFootnoteText, div.MsoFootnoteText\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.MsoHeader, li.MsoHeader, div.MsoHeader\r\n\t{mso-style-noshow:yes;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\ttab-stops:.5in center 3.0in right 6.0in;\r\n\tfont-size:16.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";}\r\np.MsoFooter, li.MsoFooter, div.MsoFooter\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\ttab-stops:center 3.0in right 6.0in;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\nspan.MsoFootnoteReference\r\n\t{mso-style-noshow:yes;\r\n\tvertical-align:super;}\r\np.MsoTitle, li.MsoTitle, div.MsoTitle\r\n\t{margin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:20.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:Arial;\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.MsoBodyText, li.MsoBodyText, div.MsoBodyText\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:16.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.MsoBodyTextIndent, li.MsoBodyTextIndent, div.MsoBodyTextIndent\r\n\t{mso-style-noshow:yes;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:0in;\r\n\tmargin-left:.5in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:justify;\r\n\tline-height:13.9pt;\r\n\tmso-line-height-rule:exactly;\r\n\tmso-pagination:widow-orphan;\r\n\tmso-layout-grid-align:none;\r\n\ttext-autospace:none;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.MsoBodyText2, li.MsoBodyText2, div.MsoBodyText2\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:center;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\np.MsoBodyText3, li.MsoBodyText3, div.MsoBodyText3\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:14.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tletter-spacing:-.15pt;}\r\np.MsoBlockText, li.MsoBlockText, div.MsoBlockText\r\n\t{mso-style-noshow:yes;\r\n\tmargin-top:0in;\r\n\tmargin-right:63.0pt;\r\n\tmargin-bottom:0in;\r\n\tmargin-left:1.0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\ttab-stops:.5in;\r\n\tfont-size:16.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\na:link, span.MsoHyperlink\r\n\t{mso-style-noshow:yes;\r\n\tcolor:blue;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\na:visited, span.MsoHyperlinkFollowed\r\n\t{mso-style-noshow:yes;\r\n\tcolor:purple;\r\n\ttext-decoration:underline;\r\n\ttext-underline:single;}\r\np.MsoPlainText, li.MsoPlainText, div.MsoPlainText\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"Courier New\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.MsoAcetate, li.MsoAcetate, div.MsoAcetate\r\n\t{mso-style-noshow:yes;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:8.0pt;\r\n\tfont-family:Tahoma;\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.style5, li.style5, div.style5\r\n\t{mso-style-name:style5;\r\n\tmso-style-parent:\"Plain Text\";\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Courier New\";}\r\np.AltC, li.AltC, div.AltC\r\n\t{mso-style-name:Alt+C;\r\n\tmso-style-parent:style5;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Courier New\";\r\n\tletter-spacing:.2pt;\r\n\tmso-bidi-font-weight:bold;}\r\np.AltA, li.AltA, div.AltA\r\n\t{mso-style-name:Alt+A;\r\n\tmso-style-parent:Alt+C;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:justify;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Courier New\";\r\n\tletter-spacing:.2pt;\r\n\tmso-bidi-font-weight:bold;}\r\np.AltB, li.AltB, div.AltB\r\n\t{mso-style-name:Alt+B;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:.5in;\r\n\ttext-align:justify;\r\n\ttext-indent:-.3in;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";\r\n\tletter-spacing:.2pt;}\r\np.AltDCenter, li.AltDCenter, div.AltDCenter\r\n\t{mso-style-name:\"Alt+D Center\";\r\n\tmso-style-parent:\"Heading 2\";\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:2;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";\r\n\tletter-spacing:.2pt;}\r\np.AltK, li.AltK, div.AltK\r\n\t{mso-style-name:Alt+K;\r\n\tmso-style-parent:style5;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\ttext-indent:.2in;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Courier New\";\r\n\tletter-spacing:.2pt;}\r\np.AltR, li.AltR, div.AltR\r\n\t{mso-style-name:Alt+R;\r\n\tmso-style-parent:Alt+C;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\ttab-stops:.5in right 4.4in;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Courier New\";\r\n\tletter-spacing:.2pt;\r\n\tmso-bidi-font-weight:bold;}\r\np.Alt-1, li.Alt-1, div.Alt-1\r\n\t{mso-style-name:Alt-1;\r\n\tmso-style-parent:\"Alt+D Center\";\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:2;\r\n\tfont-size:8.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:Arial;\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\ttext-transform:uppercase;\r\n\tletter-spacing:.2pt;\r\n\tfont-weight:bold;}\r\np.Alt-O, li.Alt-O, div.Alt-O\r\n\t{mso-style-name:Alt-O;\r\n\tmso-style-parent:\"Alt+D Center\";\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\tmso-outline-level:2;\r\n\tfont-size:8.0pt;\r\n\tmso-bidi-font-size:10.0pt;\r\n\tfont-family:Arial;\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\ttext-transform:uppercase;\r\n\tletter-spacing:.2pt;\r\n\tfont-weight:bold;}\r\np.HeaderFooter, li.HeaderFooter, div.HeaderFooter\r\n\t{mso-style-name:\"Header \u0026 Footer\";\r\n\tmso-style-parent:Alt+C;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\ttab-stops:.5in center 2.2in right 315.35pt;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Courier New\";\r\n\tletter-spacing:.2pt;\r\n\tmso-bidi-font-weight:bold;}\r\np.style2, li.style2, div.style2\r\n\t{mso-style-name:style2;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:0in;\r\n\ttext-align:center;\r\n\ttext-indent:.2in;\r\n\tmso-pagination:widow-orphan;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";}\r\np.style3, li.style3, div.style3\r\n\t{mso-style-name:style3;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:6.0pt;\r\n\tmargin-left:.5in;\r\n\ttext-align:justify;\r\n\ttext-indent:-.3in;\r\n\tmso-pagination:widow-orphan;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tmso-bidi-font-size:12.0pt;\r\n\tfont-family:\"CG Times\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";}\r\np.AltQ, li.AltQ, div.AltQ\r\n\t{mso-style-name:Alt+Q;\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:0in;\r\n\ttext-align:justify;\r\n\tmso-pagination:none;\r\n\tpage-break-after:avoid;\r\n\ttab-stops:.5in;\r\n\tfont-size:10.0pt;\r\n\tfont-family:BookmanSSK;\r\n\tmso-fareast-font-family:\"MS Mincho\";\r\n\tmso-bidi-font-family:\"Times New Roman\";\r\n\tfont-weight:bold;\r\n\tmso-bidi-font-weight:normal;\r\n\tfont-style:italic;}\r\np.PageXofY, li.PageXofY, div.PageXofY\r\n\t{mso-style-name:\"Page X of Y\";\r\n\tmso-style-parent:\"\";\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\nspan.grame\r\n\t{mso-style-name:grame;}\r\nspan.spelle\r\n\t{mso-style-name:spelle;}\r\np.byline, li.byline, div.byline\r\n\t{mso-style-name:byline;\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:justify;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:12.0pt;\r\n\tfont-family:Arial;\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.Lastprinted, li.Lastprinted, div.Lastprinted\r\n\t{mso-style-name:\"Last printed\";\r\n\tmso-style-parent:\"\";\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.Style1, li.Style1, div.Style1\r\n\t{mso-style-name:\"Style 1\";\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:none;\r\n\tmso-layout-grid-align:none;\r\n\ttext-autospace:none;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\np.Style20, li.Style20, div.Style20\r\n\t{mso-style-name:\"Style 2\";\r\n\tmargin-top:0in;\r\n\tmargin-right:.1in;\r\n\tmargin-bottom:0in;\r\n\tmargin-left:0in;\r\n\tmargin-bottom:.0001pt;\r\n\ttext-align:justify;\r\n\tline-height:112%;\r\n\tmso-pagination:none;\r\n\ttext-autospace:none;\r\n\tfont-size:11.5pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";}\r\nspan.CharacterStyle1\r\n\t{mso-style-name:\"Character Style 1\";\r\n\tmso-style-parent:\"\";\r\n\tmso-ansi-font-size:11.5pt;\r\n\tmso-bidi-font-size:11.5pt;}\r\nspan.CharacterStyle2\r\n\t{mso-style-name:\"Character Style 2\";\r\n\tmso-style-parent:\"\";\r\n\tmso-ansi-font-size:10.0pt;\r\n\tmso-bidi-font-size:10.0pt;}\r\np.Style30, li.Style30, div.Style30\r\n\t{mso-style-name:\"Style 3\";\r\n\tmargin-top:0in;\r\n\tmargin-right:0in;\r\n\tmargin-bottom:.1in;\r\n\tmargin-left:.1in;\r\n\tline-height:16.2pt;\r\n\tmso-line-height-rule:exactly;\r\n\tmso-pagination:none;\r\n\ttext-autospace:none;\r\n\tfont-size:13.0pt;\r\n\tfont-family:Verdana;\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tmso-bidi-font-family:\"Times New Roman\";}\r\np.Default, li.Default, div.Default\r\n\t{mso-style-name:Default;\r\n\tmso-style-parent:\"\";\r\n\tmargin:0in;\r\n\tmargin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tmso-layout-grid-align:none;\r\n\ttext-autospace:none;\r\n\tfont-size:12.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-fareast-font-family:\"Times New Roman\";\r\n\tcolor:black;}\r\n /* Page Definitions */\r\n @page\r\n\t{mso-footnote-separator:url(\"2024J3_files/header.htm\") fs;\r\n\tmso-footnote-continuation-separator:url(\"2024J3_files/header.htm\") fcs;\r\n\tmso-endnote-separator:url(\"2024J3_files/header.htm\") es;\r\n\tmso-endnote-continuation-separator:url(\"2024J3_files/header.htm\") ecs;\r\n\tmso-facing-pages:yes;}\r\n@page Section1\r\n\t{size:7.0in 11.0in;\r\n\tmargin:.5in .5in .5in .5in;\r\n\tmso-header-margin:1.1in;\r\n\tmso-footer-margin:123.85pt;\r\n\tmso-page-numbers:1;\r\n\tmso-title-page:yes;\r\n\tmso-even-header:url(\"2024J3_files/header.htm\") eh1;\r\n\tmso-paper-source:0;}\r\ndiv.Section1\r\n\t{page:Section1;}\r\n /* List Definitions */\r\n ol\r\n\t{margin-bottom:0in;}\r\nul\r\n\t{margin-bottom:0in;}\r\n--\u003e\r\n\u003c/style\u003e\r\n\u003c!--[if gte mso 10]\u003e\r\n\u003cstyle\u003e\r\n /* Style Definitions */\r\n table.MsoNormalTable\r\n\t{mso-style-name:\"Table Normal\";\r\n\tmso-tstyle-rowband-size:0;\r\n\tmso-tstyle-colband-size:0;\r\n\tmso-style-noshow:yes;\r\n\tmso-style-parent:\"\";\r\n\tmso-padding-alt:0in 5.4pt 0in 5.4pt;\r\n\tmso-para-margin:0in;\r\n\tmso-para-margin-bottom:.0001pt;\r\n\tmso-pagination:widow-orphan;\r\n\tfont-size:10.0pt;\r\n\tfont-family:\"Times New Roman\";\r\n\tmso-ansi-language:#0400;\r\n\tmso-fareast-language:#0400;\r\n\tmso-bidi-language:#0400;}\r\n\u003c/style\u003e\r\n\u003c![endif]--\u003e\u003c!--[if gte mso 9]\u003e\u003cxml\u003e\r\n \u003co:shapedefaults v:ext=\"edit\" spidmax=\"3074\"/\u003e\r\n\u003c/xml\u003e\u003c![endif]--\u003e\u003c!--[if gte mso 9]\u003e\u003cxml\u003e\r\n \u003co:shapelayout v:ext=\"edit\"\u003e\r\n \u003co:idmap v:ext=\"edit\" data=\"1\"/\u003e\r\n \u003c/o:shapelayout\u003e\u003c/xml\u003e\u003c![endif]--\u003e\r\n\u003c/head\u003e\r\n\r\n\u003cbody lang=EN-US link=blue vlink=purple style=\u0027tab-interval:.5in\u0027\u003e\r\n\r\n\u003cdiv class=Section1\u003e\r\n\r\n\u003cp class=AltDCenter style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cb\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eSTRENGTHENING THE LEGAL FRAMEWORK \u003cbr\u003e\r\nFOR CYBERSECURITY IN \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place w:st=\"on\"\u003ePAKISTAN\u003c/st1:place\u003e\u003c/st1:country-region\u003e:\r\nTHE COMPUTER EMERGENCY RESPONSE TEAM RULES, 2023\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/b\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltDCenter style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eBy\u003cbr\u003e\r\n\u003ci\u003eKamran Adil, Police Service of \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place\r\n w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e\u003co:p\u003e\u003c/o:p\u003e\u003c/i\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cb\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eI-\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eINTRODUCTION\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/b\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltC style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\";letter-spacing:.1pt\u0027\u003eLinking the concept of\r\ncybersecurity with geo-politics, the Global Cybersecurity Outlook Report, 2023\r\nnoted that 91% of the respondents (that included business and cyber leaders)\r\nfeared that \u0027global geopolitical instability\u0027 might result in \u0027a far reaching,\r\ncatastrophic cyber event\u0027 in the \u0027next two years\u0027.\u003ca style=\u0027mso-footnote-id:\r\nftn1\u0027 href=\"#_ftn1\" name=\"_ftnref1\" title=\"\"\u003e\u003c/a\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e1\u003c/span\u003e With this type of forecast, one can surmise\r\nthat the land-scape of the global state of cybersecurity is far from ideal. In\r\nthis context, exploring the legal and regulatory framework of the cybersecurity\r\nin \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e\r\nmay be useful. For this, the point of departure can be the working definition\r\nof the concept of cybersecurity, which has been defined by the Cybersecurity\r\nand Infrastructure Security Agency of the US (CISA) as:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\";letter-spacing:0pt\u0027\u003e\u003cspan style=\u0027mso-tab-count:\r\n1\u0027\u003e \u003c/span\u003e\u0026quot;Cybersecurity is the art of protecting networks,\r\ndevices, and data from unauthorized access, or criminal use and the practice of\r\nensuring confidentiality, integrity, and availability of information.\u0026quot;\u003ca\r\nstyle=\u0027mso-footnote-id:ftn2\u0027 href=\"#_ftn2\" name=\"_ftnref2\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e2\u003c/span\u003e\u003c/a\u003e\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltC style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eThe definition, in its totality, is very wide.\r\nContrary to the conventional understanding of preventive and preemptory nature\r\nof the cybersecurity, it encompasses the \u0027rights\u0027 dimension of the\r\ncybersecurity by stating to take into account the \u0027criminal use\u0027 of computers.\r\nWith this expansive dimension in mind, let us explore different aspects of the\r\nlegal and regulatory framework of the cybersecurity in \u003cst1:country-region\r\nw:st=\"on\"\u003e\u003cst1:place w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e.\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cb\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eII-\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eTHE\r\nLEGAL FRAMEWORK\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/b\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltC style=\u0027margin-bottom:5.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\";letter-spacing:.1pt\u0027\u003eLike many countries in the\r\nworld, technology led the law making in \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place\r\n w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e. After the advancements in\r\nthe telecommunications, the Pakistan Telecommunication (Re-organization) Act,\r\n1996 was enacted. It established the Pakistan Telecommunication Authority\r\n(PTA), a statutory body to regulate the licensing and competitive regime within\r\nthe telecommunication sector\u003ca style=\u0027mso-footnote-id:ftn3\u0027 href=\"#_ftn3\"\r\nname=\"_ftnref3\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e3\u003c/span\u003e\u003c/a\u003e. Under\r\nthe governance scheme, as stated in the Rules of Business for the Federal\r\nGovernment in \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e,\r\nthe PTA works under the Cabinet Division and is placed there with other\r\nregulatory authorities for providing competitive field\u003ca style=\u0027mso-footnote-id:\r\nftn4\u0027 href=\"#_ftn4\" name=\"_ftnref4\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e4\u003c/span\u003e\u003c/a\u003e.\r\nLater, in 2002, two new laws titled as the Electronic Transactions Ordinance,\r\n2002 (ETO) and the Pakistan Electronic Media Regulatory Authority Ordinance,\r\n2002 (PEMRA) were enacted. The former was to provide legal cover to the\r\nelectronic transactions whereas the latter provided for regulation of\r\ncompetition in media industry for electronic media. On the criminal side, after\r\ninitial temporary legislation, the Prevention of Electronic Crimes Act, 2016\r\n(PECA) was promulgated. The law settled many important issues especially\r\nrelated to the social media regulation\u003ca style=\u0027mso-footnote-id:ftn5\u0027\r\nhref=\"#_ftn5\" name=\"_ftnref5\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e5\u003c/span\u003e\u003c/a\u003e,\r\nthe cybercrimes\u003ca style=\u0027mso-footnote-id:ftn6\u0027 href=\"#_ftn6\" name=\"_ftnref6\"\r\ntitle=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e6\u003c/span\u003e\u003c/a\u003e and for the\r\ncybersecurity\u003ca style=\u0027mso-footnote-id:ftn7\u0027 href=\"#_ftn7\" name=\"_ftnref7\"\r\ntitle=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e7\u003c/span\u003e\u003c/a\u003e.\u003cspan\r\nstyle=\u0027mso-spacerun:yes\u0027\u003e \u003c/span\u003eThus, after the promulgation of the PECA, it\r\nis to be treated as the master legal framework in \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place\r\n w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e that is applicable to\r\ncyberspace. It may, however, be noted that at the federal level, the\r\nenforcement of the PECA falls under the responsibility of the Ministry of\r\nInterior under the Rules of Business for the Government of Pakistan\u003ca\r\nstyle=\u0027mso-footnote-id:ftn8\u0027 href=\"#_ftn8\" name=\"_ftnref8\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e8\u003c/span\u003e\u003c/a\u003e. This entrustment to the Ministry of\r\nInterior, however, is shared with the Ministry of Information Technology and\r\nTelecommunications\u003ca style=\u0027mso-footnote-id:ftn9\u0027 href=\"#_ftn9\" name=\"_ftnref9\"\r\ntitle=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e9\u003c/span\u003e\u003c/a\u003e. \u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB\u003e\u003cb\u003e\u003cspan style=\u0027font-size:12.0pt;font-family:\"Times New Roman\"\u0027\u003eIII-\u003cspan\r\nstyle=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eTHE COMPUTER EMERGENCY RESPONSE TEAM RULES,\r\n2023\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/b\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltC\u003e\u003cspan style=\u0027font-size:12.0pt;font-family:\"Times New Roman\";\r\nletter-spacing:0pt\u0027\u003eThe PECA empowers the federal government as well as the PTA\r\nto prevent cybercrimes\u003ca style=\u0027mso-footnote-id:ftn10\u0027 href=\"#_ftn10\"\r\nname=\"_ftnref10\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e10\u003c/span\u003e\u003c/a\u003e.\r\nConversely, it criminalizes non-compliance of orders for prevention of breaches\r\nof cybersecurity\u003ca style=\u0027mso-footnote-id:ftn11\u0027 href=\"#_ftn11\" name=\"_ftnref11\"\r\ntitle=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e11\u003c/span\u003e\u003c/a\u003e. In addition, the PECA\r\nrequires that the federal government may constitute the Computer Emergency\r\nResponse Teams (CERT)\u003ca style=\u0027mso-footnote-id:ftn12\u0027 href=\"#_ftn12\"\r\nname=\"_ftnref12\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e12\u003c/span\u003e\u003c/a\u003e. In\r\npursuance of the statutory responsibility, the federal government, on 26th\r\nSeptember, 2023, framed Rules for the computer emergency response team\u003ca\r\nstyle=\u0027mso-footnote-id:ftn13\u0027 href=\"#_ftn13\" name=\"_ftnref13\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e13\u003c/span\u003e\u003c/a\u003e. The salient features of the Rules \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:12.0pt;font-family:\"Times New Roman\";letter-spacing:.1pt\u0027\u003eare:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK\u003e\u003cspan style=\u0027font-size:12.0pt;font-family:\"Times New Roman\"\u0027\u003ea.\u003cspan\r\nstyle=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eESTABLISHMENT OF CERTs:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\";letter-spacing:.1pt\u0027\u003e\u003cspan style=\u0027mso-tab-count:\r\n1\u0027\u003e \u003c/span\u003eThe Rules establish CERTs at three levels: a) National level,\r\nb)\u0026nbsp;Sector-wise, and c) Organizational level\u003ca style=\u0027mso-footnote-id:ftn14\u0027\r\nhref=\"#_ftn14\" name=\"_ftnref14\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e14\u003c/span\u003e\u003c/a\u003e.\r\nThe Rules establish a central CERT Council that shall oversee the working and\r\nperformance of all the CERTs. The CERT Council, primarily, has a coordination\r\nrole. It shall oversee the working of the National CERT, the Critical\r\nInformation Infrastructure CERT, the Sectoral CERT, and the Provincial CERTs.\r\nThe CERT Council is an inter-ministerial body having representatives from all\r\nthe relevant ministries including the Ministry of Interior\u003ca style=\u0027mso-footnote-id:\r\nftn15\u0027 href=\"#_ftn15\" name=\"_ftnref15\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e15\u003c/span\u003e\u003c/a\u003e. It is assumed that the representative\r\nof the Ministry of Interior will stir kinetic response from the law enforcement\r\nagencies including the civil armed forces and the representative of the\r\nMinistry of Defence shall coordinate response from the armed forces.\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eb.\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eFUNCTIONING\r\nOF CERTs:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eThree\r\ntypes of functions\u003ca style=\u0027mso-footnote-id:ftn16\u0027 href=\"#_ftn16\"\r\nname=\"_ftnref16\" title=\"\"\u003e\u003cspan class=MsoFootnoteReference\u003e16\u003c/span\u003e\u003c/a\u003e are\r\nrequired from CERTs under the Rules; these are:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003ei.\u003cspan\r\nstyle=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eProactive Function\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eii.\u003cspan\r\nstyle=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eResponsive function\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eiii.\u003cspan\r\nstyle=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eSustenance functioning\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eEach\r\nfunction is further expanded in the Rules. The Proactive Function includes real\r\ntime announcements and dissemination of information, technology watch, security\r\naudits, intrusion detection, malware analysis, and inclusion of academia. The\r\nResponsive Function covers incident management and vulnerability management.\r\nThe Sustenance Function is not clearly spelled out, however, security quality\r\nmanagement is added to explain it in the Rules. The elaborate functioning\r\nsystem in the Rules, if implemented, can be very effective.\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:7.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003ec.\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eESSENTIAL\r\nCOMPONENTS OF THE CERTs:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eThe\r\nRules provide for four essential components of each CERT, which are: i)\r\nSecurity Operations and Compliance Centre, ii) Coordination and \u003cst1:place\r\nw:st=\"on\"\u003e\u003cst1:PlaceName w:st=\"on\"\u003eCapacity\u003c/st1:PlaceName\u003e \u003cst1:PlaceType\r\n w:st=\"on\"\u003eBuilding\u003c/st1:PlaceType\u003e \u003cst1:PlaceType w:st=\"on\"\u003eCenter\u003c/st1:PlaceType\u003e\u003c/st1:place\u003e,\r\niii) Technology Development Teams, and iv) Supporting Labs. The Security Operations\r\ncomponent is supposed to work 24/7 and must cover the Governance, Risk\r\nCompliance (GRC) and the Operations and Monitoring functions. The Rules provide\r\nadequate legal cover to the cyber threat intelligence system with criminal\r\njustice grade requirements like timestamps and Autonomous System Number (ASN)\u003ca\r\nstyle=\u0027mso-footnote-id:ftn17\u0027 href=\"#_ftn17\" name=\"_ftnref17\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e17\u003c/span\u003e\u003c/a\u003e. The timestamps and ASNs can be\r\neffectively used by forensic experts to prosecute an offender for cybercrimes.\r\nIt may be noted that these features are particularly useful for tracing and\r\nreverse tracking counter terrorism financing and money laundering cases. The\r\nRules also require establishment of a Digital Forensic Lab\u003ca style=\u0027mso-footnote-id:\r\nftn18\u0027 href=\"#_ftn18\" name=\"_ftnref18\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e18\u003c/span\u003e\u003c/a\u003e that will surely help in prosecuting\r\nterritorial and extra-territorial law enforcement actions. The Rules may be\r\nfurther refined in future to specify the ownership and management for Digital\r\nForensic Lab for its accreditation and for its smooth and neutral functioning.\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003ed.\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eOPERATIONALIZATION:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eThe\r\nRules have attended to operationalization aspects of the CERTs. The Rules\r\nrequire that every CERT must designate a Point of Contact (PoC). The\r\nnon-compliance of the orders of the National CERT has been made consequential\r\nby providing a procedure for ensuring timely action by all CERTs.\u003cspan\r\nclass=MsoFootnoteReference\u003e \u003ca style=\u0027mso-footnote-id:ftn19\u0027 href=\"#_ftn19\"\r\nname=\"_ftnref19\" title=\"\"\u003e19\u003c/a\u003e\u003c/span\u003e \u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003ee.\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eKEY\r\nPERFORMANCE INDICATORS:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003e\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eFinally,\r\nthe Rules provide for a National CERT Capability Maturity Model that specifies\r\nminimum standards for start-ups, formative entities, established organizations.\r\nThe capability model has been built into the Key Performance Indicators that\r\nwill be used for monitoring of different entities for cybersecurity\u003ca\r\nstyle=\u0027mso-footnote-id:ftn20\u0027 href=\"#_ftn20\" name=\"_ftnref20\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e20\u003c/span\u003e\u003c/a\u003e.\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltK style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cb\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eIV-\u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003eWAY\r\nFORWARD\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/b\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltC style=\u0027margin-bottom:9.0pt\u0027\u003e\u003cspan style=\u0027font-size:12.0pt;\r\nfont-family:\"Times New Roman\"\u0027\u003eThe newly framed Rules cover but a part of the\r\nwhole spectrum of \u003cbr\u003e\r\nthe cybersecurity for \u003cst1:country-region w:st=\"on\"\u003e\u003cst1:place w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e.\r\nThere is scope to further strengthening the legal framework by specifying and\r\nsynchronizing the governmental structures with the Rules and with the National\r\nCyber Security Policy, 2021. This alignment must also take into account\r\nmainstreaming of the technical information technology prowess with the criminal\r\njustice system that protects the rights of people. The unregulated areas of the\r\nvirtual and crypto-assets must be properly regulated and special rules for\r\ncollection, handling, processing and proving digital evidence forensically may\r\nbe introduced to ensure dissuasive deterrent justice sector response to evolving\r\ntechnological challenges. \u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote-list\u0027\u003e\u003c![if !supportFootnotes]\u003e\u003cbr clear=all\u003e\r\n\r\n\u003chr align=left size=1 width=\"33%\"\u003e\r\n\r\n\u003c![endif]\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn1\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn1\u0027 href=\"#_ftnref1\" name=\"_ftn1\" title=\"\"\u003e\u003c/a\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e1\u003c/span\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eGlobal Security Outlook\r\nReport, 2023 available at:\u003co:p\u003e\u003c/o:p\u003e\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003e\u003cspan style=\u0027mso-tab-count:\r\n1\u0027\u003e \u003c/span\u003e\u003c/span\u003e\u003cspan style=\u0027font-size:8.0pt;mso-bidi-font-size:\r\n12.0pt;letter-spacing:0pt\u0027\u003e\u003ca\r\nhref=\"https://www3.weforum.org/docs/WEF_Global_Security_Outlook_Report_2023.pdf\"\u003ehttps://www3.weforum.org/docs/WEF_Global_Security_Outlook_Report_2023.pdf\u003c/a\u003e.\r\n\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn2\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn2\u0027 href=\"#_ftnref2\" name=\"_ftn2\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e2\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003ehttps://www.cisa.gov/news-events/news/what-cybersecurity\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn3\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn3\u0027 href=\"#_ftnref3\" name=\"_ftn3\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e3\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eSection 4 of the \u003cst1:country-region\r\nw:st=\"on\"\u003e\u003cst1:place w:st=\"on\"\u003ePakistan\u003c/st1:place\u003e\u003c/st1:country-region\u003e\r\nTelecommunication (Re-organization) Act, 1996\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn4\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn4\u0027 href=\"#_ftnref4\" name=\"_ftn4\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e4\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eItem 83 of Cabinet Division\r\nof the Schedule II of the Rules of Business, 1973 (protected and framed under\r\nArticles 90 and 99 of the Constitution of Pakistan, 1973)\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn5\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn5\u0027 href=\"#_ftnref5\" name=\"_ftn5\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e5\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eThe Removal and Blocking of\r\nUnlawful Online Content (Procedure, Oversight and Safeguards) Rules, 2021\r\nframed under sections 37 and 51 of the Prevention of Electronic Crimes Act,\r\n2016.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn6\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn6\u0027 href=\"#_ftnref6\" name=\"_ftn6\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e6\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eSections 3 to 26 of the\r\nPrevention of Electronic Crimes Act, 2016.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn7\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn7\u0027 href=\"#_ftnref7\" name=\"_ftn7\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e7\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eSections 48 and 49 of the\r\nPrevention of Electronic Crimes Act, 2016.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn8\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn8\u0027 href=\"#_ftnref8\" name=\"_ftn8\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e8\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eItems 31 and 32 of the\r\nInterior Division of the Schedule II of the Rules of Business, 1973.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn9\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn9\u0027 href=\"#_ftnref9\" name=\"_ftn9\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e9\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eItem 1 of the Information\r\nTechnology and Telecommunications of the Schedule\u0026nbsp;II of the Rules of\r\nBusiness, 1973.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn10\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn10\u0027 href=\"#_ftnref10\" name=\"_ftn10\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e10\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eSection 48 of the Prevention\r\nof Electronic Crimes Act, 2016.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn11\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn11\u0027 href=\"#_ftnref11\" name=\"_ftn11\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e11\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eSection 48(2) of the\r\nPrevention of Electronic Crimes Act, 2016.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn12\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn12\u0027 href=\"#_ftnref12\" name=\"_ftn12\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e12\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eSection 49 of the Prevention\r\nof Electronic Crimes Act, 2016.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn13\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn13\u0027 href=\"#_ftnref13\" name=\"_ftn13\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e13\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eThe Computer Emergency\r\nResponse Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn14\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn14\u0027 href=\"#_ftnref14\" name=\"_ftn14\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e14\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 3 of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn15\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn15\u0027 href=\"#_ftnref15\" name=\"_ftn15\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e15\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 4(3) of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn16\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn16\u0027 href=\"#_ftnref16\" name=\"_ftn16\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e16\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 11 of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn17\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn17\u0027 href=\"#_ftnref17\" name=\"_ftn17\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e17\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 13(1) of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn18\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn18\u0027 href=\"#_ftnref18\" name=\"_ftn18\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e18\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 13(4) of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn19\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn19\u0027 href=\"#_ftnref19\" name=\"_ftn19\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e19\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 26 of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003cdiv style=\u0027mso-element:footnote\u0027 id=ftn20\u003e\r\n\r\n\u003cp class=AltB style=\u0027margin-bottom:0in;margin-bottom:.0001pt\u0027\u003e\u003ca\r\nstyle=\u0027mso-footnote-id:ftn20\u0027 href=\"#_ftnref20\" name=\"_ftn20\" title=\"\"\u003e\u003cspan\r\nclass=MsoFootnoteReference\u003e20\u003c/span\u003e\u003c/a\u003e \u003cspan style=\u0027mso-tab-count:1\u0027\u003e \u003c/span\u003e\u003cspan\r\nstyle=\u0027font-size:8.0pt;mso-bidi-font-size:12.0pt\u0027\u003eRule 12 of the Computer\r\nEmergency Response Team Rules, 2023.\u003c/span\u003e\u003c/p\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003c/div\u003e\r\n\r\n\u003c/body\u003e\r\n\r\n\u003c/html\u003e\r\n"